| 1 | 2026-01-14T21:22:37.565Z | INFO | test_vpc_firewall: setting up simulated sidecar
slot = sidecar 0
|
| 2 | 2026-01-14T21:22:37.565Z | INFO | test_vpc_firewall: simulated SP UDP socket bound
bind_addr = [::1]:0
local_addr = [::1]:42263
slot = sidecar 0
type = simulated
|
| 3 | 2026-01-14T21:22:37.565Z | INFO | test_vpc_firewall: simulated SP UDP socket bound
bind_addr = [::1]:0
local_addr = [::1]:52072
slot = sidecar 0
type = simulated
|
| 4 | 2026-01-14T21:22:37.565Z | INFO | test_vpc_firewall (ereport-sim): simulated SP UDP socket bound
bind_addr = [::1]:0
local_addr = [::1]:64631
slot = sidecar 0
type = simulated
|
| 5 | 2026-01-14T21:22:37.565Z | INFO | test_vpc_firewall (ereport-sim): simulated SP UDP socket bound
bind_addr = [::1]:0
local_addr = [::1]:63944
slot = sidecar 0
type = simulated
|
| 6 | 2026-01-14T21:22:37.565Z | INFO | test_vpc_firewall (ereport-sim): configuring sim ereports
metadata = {"baseboard_part_number": String("SimSidecarSp"), "baseboard_serial_number": String("SimSidecar0"), "hubris_archive_id": String("asdfasdfasdf")}
n_ereports = 1
restart_id = 0d3e464a-666e-4687-976f-90e31238be8b
slot = sidecar 0
|
| 7 | 2026-01-14T21:22:37.565Z | INFO | test_vpc_firewall: setting up simulated sidecar
slot = sidecar 1
|
| 8 | 2026-01-14T21:22:37.565Z | INFO | test_vpc_firewall: simulated SP UDP socket bound
bind_addr = [::1]:0
local_addr = [::1]:32904
slot = sidecar 1
type = simulated
|
| 9 | 2026-01-14T21:22:37.565Z | INFO | test_vpc_firewall: simulated SP UDP socket bound
bind_addr = [::1]:0
local_addr = [::1]:63596
slot = sidecar 1
type = simulated
|
| 10 | 2026-01-14T21:22:37.565Z | INFO | test_vpc_firewall (ereport-sim): simulated SP UDP socket bound
bind_addr = [::1]:0
local_addr = [::1]:44780
slot = sidecar 1
type = simulated
|
| 11 | 2026-01-14T21:22:37.566Z | INFO | test_vpc_firewall (ereport-sim): simulated SP UDP socket bound
bind_addr = [::1]:0
local_addr = [::1]:42849
slot = sidecar 1
type = simulated
|
| 12 | 2026-01-14T21:22:37.566Z | INFO | test_vpc_firewall (ereport-sim): configuring sim ereports
metadata = {"baseboard_part_number": String("SimSidecarSp"), "baseboard_serial_number": String("SimSidecar1"), "hubris_archive_id": String("asdfasdfasdf")}
n_ereports = 0
restart_id = dd866547-794b-4bcc-93b2-656b13d29f97
slot = sidecar 1
|
| 13 | 2026-01-14T21:22:37.566Z | INFO | test_vpc_firewall: setting up simulated gimlet
slot = gimlet 0
|
| 14 | 2026-01-14T21:22:37.566Z | INFO | test_vpc_firewall: simulated SP UDP socket bound
bind_addr = [::1]:0
local_addr = [::1]:37600
slot = gimlet 0
type = simulated
|
| 15 | 2026-01-14T21:22:37.566Z | INFO | test_vpc_firewall: simulated SP UDP socket bound
bind_addr = [::1]:0
local_addr = [::1]:45944
slot = gimlet 0
type = simulated
|
| 16 | 2026-01-14T21:22:37.566Z | INFO | test_vpc_firewall (ereport-sim): simulated SP UDP socket bound
bind_addr = [::1]:0
local_addr = [::1]:39692
slot = gimlet 0
type = simulated
|
| 17 | 2026-01-14T21:22:37.566Z | INFO | test_vpc_firewall (ereport-sim): simulated SP UDP socket bound
bind_addr = [::1]:0
local_addr = [::1]:42390
slot = gimlet 0
type = simulated
|
| 18 | 2026-01-14T21:22:37.566Z | INFO | test_vpc_firewall (ereport-sim): configuring sim ereports
metadata = {"baseboard_part_number": String("SimGimletSp"), "baseboard_serial_number": String("SimGimlet00"), "hubris_archive_id": String("ffffffff"), "hubris_version": String("0.0.2")}
n_ereports = 5
restart_id = af1ebf85-36ba-4c31-bbec-b9825d6d9d8b
slot = gimlet 0
|
| 19 | 2026-01-14T21:22:37.566Z | INFO | test_vpc_firewall (SpComponent { id: "sp3-host-cpu" }): bound fake serial console to TCP port
addr = [::1]:0
slot = gimlet 0
|
| 20 | 2026-01-14T21:22:37.566Z | INFO | test_vpc_firewall: setting up simulated gimlet
slot = gimlet 1
|
| 21 | 2026-01-14T21:22:37.566Z | INFO | test_vpc_firewall: simulated SP UDP socket bound
bind_addr = [::1]:0
local_addr = [::1]:54292
slot = gimlet 1
type = simulated
|
| 22 | 2026-01-14T21:22:37.566Z | INFO | test_vpc_firewall: simulated SP UDP socket bound
bind_addr = [::1]:0
local_addr = [::1]:48255
slot = gimlet 1
type = simulated
|
| 23 | 2026-01-14T21:22:37.566Z | INFO | test_vpc_firewall (ereport-sim): simulated SP UDP socket bound
bind_addr = [::1]:0
local_addr = [::1]:56922
slot = gimlet 1
type = simulated
|
| 24 | 2026-01-14T21:22:37.566Z | INFO | test_vpc_firewall (ereport-sim): simulated SP UDP socket bound
bind_addr = [::1]:0
local_addr = [::1]:35358
slot = gimlet 1
type = simulated
|
| 25 | 2026-01-14T21:22:37.566Z | INFO | test_vpc_firewall (ereport-sim): configuring sim ereports
metadata = {"baseboard_part_number": String("SimGimletSp"), "baseboard_serial_number": String("SimGimlet01"), "hubris_archive_id": String("ffffffff"), "hubris_version": String("0.0.2")}
n_ereports = 1
restart_id = 55e30cc7-a109-492f-aca9-735ed725df3c
slot = gimlet 1
|
| 26 | 2026-01-14T21:22:37.566Z | INFO | test_vpc_firewall (SpComponent { id: "sp3-host-cpu" }): bound fake serial console to TCP port
addr = [::1]:0
slot = gimlet 1
|
| 27 | 2026-01-14T21:22:37.566Z | INFO | test_vpc_firewall: setting up gateway server
|
| 28 | 2026-01-14T21:22:37.566Z | DEBG | test_vpc_firewall: successfully registered DTrace USDT probes
|
| 29 | 2026-01-14T21:22:37.566Z | INFO | test_vpc_firewall: Setting rack_id
rack_id = c19a698f-c6f9-4a17-ae30-20d711b8f7dc
|
| 30 | 2026-01-14T21:22:37.566Z | DEBG | test_vpc_firewall (dropshot): registered endpoint
local_addr = [::1]:59250
method = GET
path = /ignition
versions = all starting from 2.0.0
|
| 31 | 2026-01-14T21:22:37.566Z | DEBG | test_vpc_firewall (dropshot): registered endpoint
local_addr = [::1]:59250
method = GET
path = /ignition
versions = from 1.0.0 to 2.0.0
|
| 32 | 2026-01-14T21:22:37.566Z | DEBG | test_vpc_firewall (dropshot): registered endpoint
local_addr = [::1]:59250
method = GET
path = /ignition/{type}/{slot}
versions = all starting from 2.0.0
|
| 33 | 2026-01-14T21:22:37.566Z | DEBG | test_vpc_firewall (dropshot): registered endpoint
local_addr = [::1]:59250
method = GET
path = /ignition/{type}/{slot}
versions = from 1.0.0 to 2.0.0
|
| 34 | 2026-01-14T21:22:37.566Z | DEBG | test_vpc_firewall (dropshot): registered endpoint
local_addr = [::1]:59250
method = POST
path = /ignition/{type}/{slot}/{command}
versions = all
|
| 35 | 2026-01-14T21:22:37.566Z | DEBG | test_vpc_firewall (dropshot): registered endpoint
local_addr = [::1]:59250
method = GET
path = /local/all-sp-ids
versions = all
|
| 36 | 2026-01-14T21:22:37.566Z | DEBG | test_vpc_firewall (dropshot): registered endpoint
local_addr = [::1]:59250
method = GET
path = /local/switch-id
versions = all
|
| 37 | 2026-01-14T21:22:37.567Z | DEBG | test_vpc_firewall (dropshot): registered endpoint
local_addr = [::1]:59250
method = POST
path = /recovery/host-phase2
versions = all
|
| 38 | 2026-01-14T21:22:37.567Z | DEBG | test_vpc_firewall (dropshot): registered endpoint
local_addr = [::1]:59250
method = GET
path = /sp/{type}/{slot}
versions = all
|
| 39 | 2026-01-14T21:22:37.567Z | DEBG | test_vpc_firewall (dropshot): registered endpoint
local_addr = [::1]:59250
method = GET
path = /sp/{type}/{slot}/component
versions = all
|
| 40 | 2026-01-14T21:22:37.567Z | DEBG | test_vpc_firewall (dropshot): registered endpoint
local_addr = [::1]:59250
method = GET
path = /sp/{type}/{slot}/component/{component}
versions = all
|
| 41 | 2026-01-14T21:22:37.567Z | DEBG | test_vpc_firewall (dropshot): registered endpoint
local_addr = [::1]:59250
method = GET
path = /sp/{type}/{slot}/component/{component}/active-slot
versions = all
|
| 42 | 2026-01-14T21:22:37.567Z | DEBG | test_vpc_firewall (dropshot): registered endpoint
local_addr = [::1]:59250
method = POST
path = /sp/{type}/{slot}/component/{component}/active-slot
versions = all
|
| 43 | 2026-01-14T21:22:37.567Z | DEBG | test_vpc_firewall (dropshot): registered endpoint
local_addr = [::1]:59250
method = GET
path = /sp/{type}/{slot}/component/{component}/caboose
versions = all
|
| 44 | 2026-01-14T21:22:37.567Z | DEBG | test_vpc_firewall (dropshot): registered endpoint
local_addr = [::1]:59250
method = GET
path = /sp/{type}/{slot}/component/{component}/cfpa
versions = all
|
| 45 | 2026-01-14T21:22:37.567Z | DEBG | test_vpc_firewall (dropshot): registered endpoint
local_addr = [::1]:59250
method = POST
path = /sp/{type}/{slot}/component/{component}/clear-status
versions = all
|
| 46 | 2026-01-14T21:22:37.567Z | DEBG | test_vpc_firewall (dropshot): registered endpoint
local_addr = [::1]:59250
method = GET
path = /sp/{type}/{slot}/component/{component}/cmpa
versions = all
|
| 47 | 2026-01-14T21:22:37.567Z | DEBG | test_vpc_firewall (dropshot): registered endpoint
local_addr = [::1]:59250
method = GET
path = /sp/{type}/{slot}/component/{component}/hash/{firmware_slot}
versions = all
|
| 48 | 2026-01-14T21:22:37.567Z | DEBG | test_vpc_firewall (dropshot): registered endpoint
local_addr = [::1]:59250
method = POST
path = /sp/{type}/{slot}/component/{component}/hash/{firmware_slot}
versions = all
|
| 49 | 2026-01-14T21:22:37.567Z | DEBG | test_vpc_firewall (dropshot): registered endpoint
local_addr = [::1]:59250
method = POST
path = /sp/{type}/{slot}/component/{component}/reset
versions = all
|
| 50 | 2026-01-14T21:22:37.567Z | DEBG | test_vpc_firewall (dropshot): registered endpoint
local_addr = [::1]:59250
method = GET
path = /sp/{type}/{slot}/component/{component}/rot-boot-info
versions = all
|
| 51 | 2026-01-14T21:22:37.567Z | DEBG | test_vpc_firewall (dropshot): registered endpoint
local_addr = [::1]:59250
method = GET
path = /sp/{type}/{slot}/component/{component}/serial-console/attach
versions = all
|
| 52 | 2026-01-14T21:22:37.567Z | DEBG | test_vpc_firewall (dropshot): registered endpoint
local_addr = [::1]:59250
method = POST
path = /sp/{type}/{slot}/component/{component}/serial-console/detach
versions = all
|
| 53 | 2026-01-14T21:22:37.567Z | DEBG | test_vpc_firewall (dropshot): registered endpoint
local_addr = [::1]:59250
method = POST
path = /sp/{type}/{slot}/component/{component}/update
versions = all
|
| 54 | 2026-01-14T21:22:37.568Z | DEBG | test_vpc_firewall (dropshot): registered endpoint
local_addr = [::1]:59250
method = POST
path = /sp/{type}/{slot}/component/{component}/update-abort
versions = all
|
| 55 | 2026-01-14T21:22:37.568Z | DEBG | test_vpc_firewall (dropshot): registered endpoint
local_addr = [::1]:59250
method = GET
path = /sp/{type}/{slot}/component/{component}/update-status
versions = all
|
| 56 | 2026-01-14T21:22:37.568Z | DEBG | test_vpc_firewall (dropshot): registered endpoint
local_addr = [::1]:59250
method = POST
path = /sp/{type}/{slot}/ereports
versions = all
|
| 57 | 2026-01-14T21:22:37.568Z | DEBG | test_vpc_firewall (dropshot): registered endpoint
local_addr = [::1]:59250
method = DELETE
path = /sp/{type}/{slot}/host-phase2-progress
versions = all
|
| 58 | 2026-01-14T21:22:37.568Z | DEBG | test_vpc_firewall (dropshot): registered endpoint
local_addr = [::1]:59250
method = GET
path = /sp/{type}/{slot}/host-phase2-progress
versions = all
|
| 59 | 2026-01-14T21:22:37.568Z | DEBG | test_vpc_firewall (dropshot): registered endpoint
local_addr = [::1]:59250
method = DELETE
path = /sp/{type}/{slot}/ipcc/installinator-image-id
versions = all
|
| 60 | 2026-01-14T21:22:37.568Z | DEBG | test_vpc_firewall (dropshot): registered endpoint
local_addr = [::1]:59250
method = PUT
path = /sp/{type}/{slot}/ipcc/installinator-image-id
versions = all
|
| 61 | 2026-01-14T21:22:37.568Z | DEBG | test_vpc_firewall (dropshot): registered endpoint
local_addr = [::1]:59250
method = GET
path = /sp/{type}/{slot}/power-state
versions = all
|
| 62 | 2026-01-14T21:22:37.568Z | DEBG | test_vpc_firewall (dropshot): registered endpoint
local_addr = [::1]:59250
method = POST
path = /sp/{type}/{slot}/power-state
versions = all
|
| 63 | 2026-01-14T21:22:37.568Z | DEBG | test_vpc_firewall (dropshot): registered endpoint
local_addr = [::1]:59250
method = GET
path = /sp/{type}/{slot}/sensor/{sensor_id}/value
versions = all
|
| 64 | 2026-01-14T21:22:37.568Z | DEBG | test_vpc_firewall (dropshot): registered endpoint
local_addr = [::1]:59250
method = GET
path = /sp/{type}/{slot}/startup-options
versions = all
|
| 65 | 2026-01-14T21:22:37.569Z | DEBG | test_vpc_firewall (dropshot): registered endpoint
local_addr = [::1]:59250
method = POST
path = /sp/{type}/{slot}/startup-options
versions = all
|
| 66 | 2026-01-14T21:22:37.569Z | DEBG | test_vpc_firewall (dropshot): registered endpoint
local_addr = [::1]:59250
method = GET
path = /sp/{type}/{slot}/task-dump
versions = all
|
| 67 | 2026-01-14T21:22:37.569Z | DEBG | test_vpc_firewall (dropshot): registered endpoint
local_addr = [::1]:59250
method = GET
path = /sp/{type}/{slot}/task-dump/{task_dump_index}
versions = all
|
| 68 | 2026-01-14T21:22:37.569Z | INFO | test_vpc_firewall (dropshot): listening
local_addr = [::1]:59250
|
| 69 | 2026-01-14T21:22:37.569Z | DEBG | test_vpc_firewall (dropshot): successfully registered DTrace USDT probes
local_addr = [::1]:59250
|
| 70 | 2026-01-14T21:22:37.569Z | DEBG | test_vpc_firewall (ManagementSwitch): attempting initial SP discovery
discovery_addr = [::1]:42263
interface = fake-switch0
|
| 71 | 2026-01-14T21:22:37.569Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch0
request = Message { header: Header { version: 22, message_id: 1 }, kind: MgsRequest(Discover) }
|
| 72 | 2026-01-14T21:22:37.569Z | DEBG | test_vpc_firewall (ManagementSwitch): attempting initial SP discovery
discovery_addr = [::1]:32904
interface = fake-switch1
|
| 73 | 2026-01-14T21:22:37.569Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch1
request = Message { header: Header { version: 22, message_id: 1 }, kind: MgsRequest(Discover) }
|
| 74 | 2026-01-14T21:22:37.569Z | DEBG | test_vpc_firewall (ManagementSwitch): attempting initial SP discovery
discovery_addr = [::1]:37600
interface = fake-sled0
|
| 75 | 2026-01-14T21:22:37.569Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 1 }, kind: MgsRequest(Discover) }
|
| 76 | 2026-01-14T21:22:37.569Z | DEBG | test_vpc_firewall (ManagementSwitch): attempting initial SP discovery
discovery_addr = [::1]:54292
interface = fake-sled1
|
| 77 | 2026-01-14T21:22:37.569Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 1 }, kind: MgsRequest(Discover) }
|
| 78 | 2026-01-14T21:22:37.569Z | DEBG | test_vpc_firewall (sensor-poller): waiting for SP discovery to complete...
elapsed = 76.029\u{b5}s
error = discovery process not yet complete
|
| 79 | 2026-01-14T21:22:37.569Z | WARN | test_vpc_firewall (producer-server): using development metrics configuration overrides!
bind_loopback = true
nexus_address = None
|
| 80 | 2026-01-14T21:22:37.569Z | DEBG | test_vpc_firewall (producer-server): rebinding producer server on new IP
collection_interval = 10s
current_ip = None
new_ip = ::1
producer_id = 68c474de-b69c-4ed4-9617-6414d5323f17
|
| 81 | 2026-01-14T21:22:37.569Z | DEBG | test_vpc_firewall (producer-server): registered DTrace probes
|
| 82 | 2026-01-14T21:22:37.569Z | DEBG | test_vpc_firewall (dropshot): registered endpoint
local_addr = [::1]:35398
method = GET
path = /{producer_id}
versions = all
|
| 83 | 2026-01-14T21:22:37.569Z | INFO | test_vpc_firewall (dropshot): listening
file = /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.6/src/server.rs:328
local_addr = [::1]:35398
|
| 84 | 2026-01-14T21:22:37.569Z | DEBG | test_vpc_firewall (dropshot): successfully registered DTrace USDT probes
local_addr = [::1]:35398
|
| 85 | 2026-01-14T21:22:37.569Z | DEBG | test_vpc_firewall (producer-server): Requested any available port, Dropshot server has been bound to [::1]:35398
|
| 86 | 2026-01-14T21:22:37.569Z | DEBG | test_vpc_firewall (producer-server): Nexus IP not provided, will use DNS to resolve it
|
| 87 | 2026-01-14T21:22:37.569Z | INFO | test_vpc_firewall (internal-dns-resolver): new DNS resolver
addresses = [[::1:0:0:0:1]:53, [::2:0:0:0:1]:53, [::3:0:0:0:1]:53]
file = internal-dns/resolver/src/resolver.rs:144
|
| 88 | 2026-01-14T21:22:37.569Z | DEBG | test_vpc_firewall (producer-server): starting producer registration task
|
| 89 | 2026-01-14T21:22:37.569Z | INFO | test_vpc_firewall (producer-server): starting oximeter metric producer server
address = [::1]:35398
file = oximeter/producer/src/lib.rs:279
interval = 10s
producer_id = 68c474de-b69c-4ed4-9617-6414d5323f17
|
| 90 | 2026-01-14T21:22:37.569Z | INFO | test_vpc_firewall (producer-server): bound metrics producer server
address = [::1]:35398
collection_interval = 10s
producer_id = 68c474de-b69c-4ed4-9617-6414d5323f17
|
| 91 | 2026-01-14T21:22:37.570Z | DEBG | test_vpc_firewall (producer-registration-task): registering as oximeter producer with Nexus
registration_count = 0
|
| 92 | 2026-01-14T21:22:37.570Z | TRAC | test_vpc_firewall (internal-dns-resolver): lookup_socket_v6 srv
dns_name = _nexus._tcp.control-plane.oxide.internal
|
| 93 | 2026-01-14T21:22:37.570Z | DEBG | test_vpc_firewall: received discover; sending response
sender = Sender { addr: [::1]:51843, vid: One }
slot = sidecar 0
|
| 94 | 2026-01-14T21:22:37.570Z | DEBG | test_vpc_firewall: received discover; sending response
sender = Sender { addr: [::1]:53557, vid: One }
slot = sidecar 1
|
| 95 | 2026-01-14T21:22:37.570Z | DEBG | test_vpc_firewall: received discover; sending response
sender = Sender { addr: [::1]:34841, vid: One }
slot = gimlet 0
|
| 96 | 2026-01-14T21:22:37.570Z | DEBG | test_vpc_firewall: received discover; sending response
sender = Sender { addr: [::1]:51238, vid: One }
slot = gimlet 1
|
| 97 | 2026-01-14T21:22:37.592Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 1 }
interface = fake-switch0
response = Discover(DiscoverResponse { sp_port: One })
|
| 98 | 2026-01-14T21:22:37.593Z | INFO | test_vpc_firewall (ManagementSwitch): initial discovery complete
addr = [::1]:42263
interface = fake-switch0
|
| 99 | 2026-01-14T21:22:37.593Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 1 }
interface = fake-switch1
response = Discover(DiscoverResponse { sp_port: One })
|
| 100 | 2026-01-14T21:22:37.593Z | INFO | test_vpc_firewall (ManagementSwitch): initial discovery complete
addr = [::1]:32904
interface = fake-switch1
|
| 101 | 2026-01-14T21:22:37.593Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 1 }
interface = fake-sled0
response = Discover(DiscoverResponse { sp_port: One })
|
| 102 | 2026-01-14T21:22:37.593Z | INFO | test_vpc_firewall (ManagementSwitch): initial discovery complete
addr = [::1]:37600
interface = fake-sled0
|
| 103 | 2026-01-14T21:22:37.593Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 1 }
interface = fake-sled1
response = Discover(DiscoverResponse { sp_port: One })
|
| 104 | 2026-01-14T21:22:37.593Z | INFO | test_vpc_firewall (ManagementSwitch): initial discovery complete
addr = [::1]:54292
interface = fake-sled1
|
| 105 | 2026-01-14T21:22:37.593Z | WARN | test_vpc_firewall (producer-registration-task): failed to register with Nexus, will retry
count = 0
delay = 27.985364ms
error = "proto error: io error: No route to host (os error 148)"
file = oximeter/producer/src/lib.rs:371
|
| 106 | 2026-01-14T21:22:37.593Z | INFO | test_vpc_firewall (ManagementSwitch): received discovery response (not used for location)
interface = (direct socket handle)
sp_port = One
|
| 107 | 2026-01-14T21:22:37.593Z | INFO | test_vpc_firewall (ManagementSwitch): received discovery response (not used for location)
interface = (direct socket handle)
sp_port = One
|
| 108 | 2026-01-14T21:22:37.593Z | INFO | test_vpc_firewall (ManagementSwitch): received discovery response (used for location)
interface = (direct socket handle)
pos = 0
sp_port = One
|
| 109 | 2026-01-14T21:22:37.593Z | INFO | test_vpc_firewall (ManagementSwitch): received discovery response (used for location)
interface = (direct socket handle)
pos = 0
sp_port = One
|
| 110 | 2026-01-14T21:22:37.593Z | DEBG | test_vpc_firewall (ManagementSwitch): received location determination response
interface = (direct socket handle)
refined_locations = {"switch0"}
|
| 111 | 2026-01-14T21:22:37.593Z | INFO | test_vpc_firewall (sensor-poller): starting to poll SP sensor data every 1s
|
| 112 | 2026-01-14T21:22:37.593Z | INFO | test_vpc_firewall (sensor-poller): found a new little friend!
chassis_type = Switch
sp_slot = 1
|
| 113 | 2026-01-14T21:22:37.593Z | INFO | test_vpc_firewall (sensor-poller): found a new little friend!
chassis_type = Switch
sp_slot = 0
|
| 114 | 2026-01-14T21:22:37.593Z | INFO | test_vpc_firewall (sensor-poller): found a new little friend!
chassis_type = Sled
sp_slot = 0
|
| 115 | 2026-01-14T21:22:37.593Z | INFO | test_vpc_firewall (sensor-poller): found a new little friend!
chassis_type = Sled
sp_slot = 1
|
| 116 | 2026-01-14T21:22:37.614Z | TRAC | test_vpc_firewall (sensor-poller): interval elapsed, polling SP...
chassis_type = Switch
sp_slot = 1
|
| 117 | 2026-01-14T21:22:37.614Z | TRAC | test_vpc_firewall (sensor-poller): interval elapsed, polling SP...
chassis_type = Switch
sp_slot = 0
|
| 118 | 2026-01-14T21:22:37.614Z | TRAC | test_vpc_firewall (sensor-poller): interval elapsed, polling SP...
chassis_type = Sled
sp_slot = 0
|
| 119 | 2026-01-14T21:22:37.614Z | TRAC | test_vpc_firewall (sensor-poller): interval elapsed, polling SP...
chassis_type = Sled
sp_slot = 1
|
| 120 | 2026-01-14T21:22:37.614Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch1
request = Message { header: Header { version: 22, message_id: 2 }, kind: MgsRequest(SpState) }
|
| 121 | 2026-01-14T21:22:37.614Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch0
request = Message { header: Header { version: 22, message_id: 2 }, kind: MgsRequest(SpState) }
|
| 122 | 2026-01-14T21:22:37.614Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 2 }, kind: MgsRequest(SpState) }
|
| 123 | 2026-01-14T21:22:37.614Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 2 }, kind: MgsRequest(SpState) }
|
| 124 | 2026-01-14T21:22:37.652Z | DEBG | test_vpc_firewall: received state request
reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) }
slot = sidecar 0
|
| 125 | 2026-01-14T21:22:37.652Z | DEBG | test_vpc_firewall: received state request
reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) }
slot = sidecar 1
|
| 126 | 2026-01-14T21:22:37.652Z | DEBG | test_vpc_firewall: received state request
reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) }
slot = gimlet 0
|
| 127 | 2026-01-14T21:22:37.653Z | DEBG | test_vpc_firewall: received state request
reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) }
slot = gimlet 1
|
| 128 | 2026-01-14T21:22:38.081Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 2 }
interface = fake-switch0
response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
|
| 129 | 2026-01-14T21:22:38.082Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 2 }
interface = fake-switch1
response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
|
| 130 | 2026-01-14T21:22:38.082Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 2 }
interface = fake-sled0
response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
|
| 131 | 2026-01-14T21:22:38.082Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 2 }
interface = fake-sled1
response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
|
| 132 | 2026-01-14T21:22:38.083Z | TRAC | test_vpc_firewall (internal-dns-resolver): lookup_socket_v6 srv
dns_name = _nexus._tcp.control-plane.oxide.internal
|
| 133 | 2026-01-14T21:22:38.083Z | DEBG | test_vpc_firewall (sensor-poller): our little friend seems to have changed in some kind of way
chassis_type = Switch
current_state = SpUnderstanding { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0 }
known_state = None
new_hubris_archive_id = 0000000000000000
new_model = FAKE_SIM_SIDECAR
new_serial = SimSidecar0
sp_slot = 0
|
| 134 | 2026-01-14T21:22:38.084Z | DEBG | test_vpc_firewall (sensor-poller): our little friend seems to have changed in some kind of way
chassis_type = Switch
current_state = SpUnderstanding { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0 }
known_state = None
new_hubris_archive_id = 0000000000000000
new_model = FAKE_SIM_SIDECAR
new_serial = SimSidecar1
sp_slot = 1
|
| 135 | 2026-01-14T21:22:38.084Z | DEBG | test_vpc_firewall (sensor-poller): our little friend seems to have changed in some kind of way
chassis_type = Sled
current_state = SpUnderstanding { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0 }
known_state = None
new_hubris_archive_id = 0000000000000000
new_model = i86pc
new_serial = SimGimlet00
sp_slot = 0
|
| 136 | 2026-01-14T21:22:38.084Z | DEBG | test_vpc_firewall (sensor-poller): our little friend seems to have changed in some kind of way
chassis_type = Sled
current_state = SpUnderstanding { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0 }
known_state = None
new_hubris_archive_id = 0000000000000000
new_model = i86pc
new_serial = SimGimlet01
sp_slot = 1
|
| 137 | 2026-01-14T21:22:38.085Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch0
request = Message { header: Header { version: 22, message_id: 3 }, kind: MgsRequest(Inventory { device_index: 0 }) }
|
| 138 | 2026-01-14T21:22:38.085Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch1
request = Message { header: Header { version: 22, message_id: 3 }, kind: MgsRequest(Inventory { device_index: 0 }) }
|
| 139 | 2026-01-14T21:22:38.086Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 3 }, kind: MgsRequest(Inventory { device_index: 0 }) }
|
| 140 | 2026-01-14T21:22:38.086Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 3 }, kind: MgsRequest(Inventory { device_index: 0 }) }
|
| 141 | 2026-01-14T21:22:38.123Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 3 }
interface = fake-switch0
response = Inventory(TlvPage { offset: 0, total: 2 })
|
| 142 | 2026-01-14T21:22:38.124Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 3 }
interface = fake-switch1
response = Inventory(TlvPage { offset: 0, total: 0 })
|
| 143 | 2026-01-14T21:22:38.124Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 3 }
interface = fake-sled0
response = Inventory(TlvPage { offset: 0, total: 10 })
|
| 144 | 2026-01-14T21:22:38.124Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 3 }
interface = fake-sled1
response = Inventory(TlvPage { offset: 0, total: 10 })
|
| 145 | 2026-01-14T21:22:38.131Z | DEBG | test_vpc_firewall (sensor-poller): discovered a new component!
chassis_type = Switch
component_id = dev-0
component_kind = fake-tmp-sensor
description = dev-0
sp_slot = 0
|
| 146 | 2026-01-14T21:22:38.131Z | DEBG | test_vpc_firewall (sensor-poller): discovered a new component!
chassis_type = Switch
component_id = dev-1
component_kind = fake-tmp-sensor
description = dev-1
sp_slot = 0
|
| 147 | 2026-01-14T21:22:38.131Z | DEBG | test_vpc_firewall (sensor-poller): discovered a new component!
chassis_type = Sled
component_id = dev-0
component_kind = fake-tmp-sensor
description = dev-0
sp_slot = 0
|
| 148 | 2026-01-14T21:22:38.131Z | DEBG | test_vpc_firewall (sensor-poller): discovered a new component!
chassis_type = Sled
component_id = dev-1
component_kind = tmp117
description = dev-1
sp_slot = 0
|
| 149 | 2026-01-14T21:22:38.131Z | DEBG | test_vpc_firewall (sensor-poller): discovered a new component!
chassis_type = Sled
component_id = dev-2
component_kind = tmp117
description = dev-2
sp_slot = 0
|
| 150 | 2026-01-14T21:22:38.132Z | DEBG | test_vpc_firewall (sensor-poller): discovered a new component!
chassis_type = Sled
component_id = dev-7
component_kind = max5970
description = dev-7
sp_slot = 0
|
| 151 | 2026-01-14T21:22:38.132Z | DEBG | test_vpc_firewall (sensor-poller): discovered a new component!
chassis_type = Sled
component_id = dev-8
component_kind = nvme_bmc
description = dev-8
sp_slot = 0
|
| 152 | 2026-01-14T21:22:38.132Z | DEBG | test_vpc_firewall (sensor-poller): discovered a new component!
chassis_type = Sled
component_id = dev-39
component_kind = tmp451
description = dev-39
sp_slot = 0
|
| 153 | 2026-01-14T21:22:38.132Z | DEBG | test_vpc_firewall (sensor-poller): discovered a new component!
chassis_type = Sled
component_id = dev-46
component_kind = sbtsi
description = dev-46
sp_slot = 0
|
| 154 | 2026-01-14T21:22:38.132Z | DEBG | test_vpc_firewall (sensor-poller): discovered a new component!
chassis_type = Sled
component_id = dev-53
component_kind = max31790
description = dev-53
sp_slot = 0
|
| 155 | 2026-01-14T21:22:38.132Z | DEBG | test_vpc_firewall (sensor-poller): discovered a new component!
chassis_type = Sled
component_id = dev-0
component_kind = tmp117
description = dev-0
sp_slot = 1
|
| 156 | 2026-01-14T21:22:38.132Z | DEBG | test_vpc_firewall (sensor-poller): discovered a new component!
chassis_type = Sled
component_id = dev-1
component_kind = tmp117
description = dev-1
sp_slot = 1
|
| 157 | 2026-01-14T21:22:38.133Z | DEBG | test_vpc_firewall (sensor-poller): discovered a new component!
chassis_type = Sled
component_id = dev-2
component_kind = tmp117
description = dev-2
sp_slot = 1
|
| 158 | 2026-01-14T21:22:38.133Z | DEBG | test_vpc_firewall (sensor-poller): discovered a new component!
chassis_type = Sled
component_id = dev-7
component_kind = max5970
description = dev-7
sp_slot = 1
|
| 159 | 2026-01-14T21:22:38.133Z | DEBG | test_vpc_firewall (sensor-poller): discovered a new component!
chassis_type = Sled
component_id = dev-8
component_kind = nvme_bmc
description = dev-8
sp_slot = 1
|
| 160 | 2026-01-14T21:22:38.133Z | DEBG | test_vpc_firewall (sensor-poller): discovered a new component!
chassis_type = Sled
component_id = dev-39
component_kind = tmp451
description = dev-39
sp_slot = 1
|
| 161 | 2026-01-14T21:22:38.133Z | DEBG | test_vpc_firewall (sensor-poller): discovered a new component!
chassis_type = Sled
component_id = dev-46
component_kind = sbtsi
description = dev-46
sp_slot = 1
|
| 162 | 2026-01-14T21:22:38.133Z | DEBG | test_vpc_firewall (sensor-poller): discovered a new component!
chassis_type = Sled
component_id = dev-53
component_kind = max31790
description = dev-53
sp_slot = 1
|
| 163 | 2026-01-14T21:22:38.134Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch0
request = Message { header: Header { version: 22, message_id: 4 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-0" }, offset: 0 }) }
|
| 164 | 2026-01-14T21:22:38.134Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch1
request = Message { header: Header { version: 22, message_id: 4 }, kind: MgsRequest(SpState) }
|
| 165 | 2026-01-14T21:22:38.135Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 4 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-1" }, offset: 0 }) }
|
| 166 | 2026-01-14T21:22:38.135Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 4 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-8" }, offset: 0 }) }
|
| 167 | 2026-01-14T21:22:38.136Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-0" }): asked for number of component details
num_details = 1
slot = sidecar 0
|
| 168 | 2026-01-14T21:22:38.137Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-0" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Southwest", kind: Temperature, value: Ok(41.789063) })
index = 0
slot = sidecar 0
|
| 169 | 2026-01-14T21:22:38.137Z | DEBG | test_vpc_firewall: received state request
reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) }
slot = sidecar 1
|
| 170 | 2026-01-14T21:22:38.137Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-1" }): asked for number of component details
num_details = 1
slot = gimlet 0
|
| 171 | 2026-01-14T21:22:38.138Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-1" }): asked for component details for a sensor
details = Measurement(Measurement { name: "South", kind: Temperature, value: Ok(42.5625) })
index = 0
slot = gimlet 0
|
| 172 | 2026-01-14T21:22:38.138Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-8" }): asked for number of component details
num_details = 1
slot = gimlet 1
|
| 173 | 2026-01-14T21:22:38.138Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-8" }): asked for component details for a sensor
details = Measurement(Measurement { name: "U2_N0", kind: Temperature, value: Ok(56.0) })
index = 0
slot = gimlet 1
|
| 174 | 2026-01-14T21:22:38.145Z | WARN | test_vpc_firewall (producer-registration-task): failed to register with Nexus, will retry
count = 1
delay = 582.115584ms
error = "proto error: io error: No route to host (os error 148)"
file = oximeter/producer/src/lib.rs:371
|
| 175 | 2026-01-14T21:22:38.156Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 4 }
interface = fake-switch0
response = ComponentDetails(TlvPage { offset: 0, total: 1 })
|
| 176 | 2026-01-14T21:22:38.156Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 4 }
interface = fake-switch1
response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
|
| 177 | 2026-01-14T21:22:38.157Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 4 }
interface = fake-sled0
response = ComponentDetails(TlvPage { offset: 0, total: 1 })
|
| 178 | 2026-01-14T21:22:38.157Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 4 }
interface = fake-sled1
response = ComponentDetails(TlvPage { offset: 0, total: 1 })
|
| 179 | 2026-01-14T21:22:38.158Z | TRAC | test_vpc_firewall (sensor-poller): polled SP, no samples returned
chassis_type = Switch
num_samples = 0
sp_slot = 1
|
| 180 | 2026-01-14T21:22:38.160Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch0
request = Message { header: Header { version: 22, message_id: 5 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-1" }, offset: 0 }) }
|
| 181 | 2026-01-14T21:22:38.161Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 5 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-2" }, offset: 0 }) }
|
| 182 | 2026-01-14T21:22:38.161Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 5 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-46" }, offset: 0 }) }
|
| 183 | 2026-01-14T21:22:38.246Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-1" }): asked for number of component details
num_details = 1
slot = sidecar 0
|
| 184 | 2026-01-14T21:22:38.252Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-1" }): asked for component details for a sensor
details = Measurement(Measurement { name: "South", kind: Temperature, value: Err(DeviceError) })
index = 0
slot = sidecar 0
|
| 185 | 2026-01-14T21:22:38.252Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-2" }): asked for number of component details
num_details = 1
slot = gimlet 0
|
| 186 | 2026-01-14T21:22:38.252Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-2" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Southeast", kind: Temperature, value: Ok(41.570313) })
index = 0
slot = gimlet 0
|
| 187 | 2026-01-14T21:22:38.252Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-46" }): asked for number of component details
num_details = 1
slot = gimlet 1
|
| 188 | 2026-01-14T21:22:38.252Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-46" }): asked for component details for a sensor
details = Measurement(Measurement { name: "CPU", kind: Temperature, value: Ok(62.6) })
index = 0
slot = gimlet 1
|
| 189 | 2026-01-14T21:22:38.323Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 5 }
interface = fake-switch0
response = ComponentDetails(TlvPage { offset: 0, total: 1 })
|
| 190 | 2026-01-14T21:22:38.323Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 5 }
interface = fake-sled0
response = ComponentDetails(TlvPage { offset: 0, total: 1 })
|
| 191 | 2026-01-14T21:22:38.323Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 5 }
interface = fake-sled1
response = ComponentDetails(TlvPage { offset: 0, total: 1 })
|
| 192 | 2026-01-14T21:22:38.326Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch0
request = Message { header: Header { version: 22, message_id: 6 }, kind: MgsRequest(SpState) }
|
| 193 | 2026-01-14T21:22:38.326Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 6 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-0" }, offset: 0 }) }
|
| 194 | 2026-01-14T21:22:38.326Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 6 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-53" }, offset: 0 }) }
|
| 195 | 2026-01-14T21:22:38.381Z | DEBG | test_vpc_firewall: received state request
reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) }
slot = sidecar 0
|
| 196 | 2026-01-14T21:22:38.382Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-0" }): asked for number of component details
num_details = 1
slot = gimlet 0
|
| 197 | 2026-01-14T21:22:38.382Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-0" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Southwest", kind: Temperature, value: Err(DeviceError) })
index = 0
slot = gimlet 0
|
| 198 | 2026-01-14T21:22:38.382Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for number of component details
num_details = 6
slot = gimlet 1
|
| 199 | 2026-01-14T21:22:38.382Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Southeast", kind: Speed, value: Ok(2510.0) })
index = 0
slot = gimlet 1
|
| 200 | 2026-01-14T21:22:38.382Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Northeast", kind: Speed, value: Ok(2390.0) })
index = 1
slot = gimlet 1
|
| 201 | 2026-01-14T21:22:38.382Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor
details = Measurement(Measurement { name: "South", kind: Speed, value: Ok(2467.0) })
index = 2
slot = gimlet 1
|
| 202 | 2026-01-14T21:22:38.383Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor
details = Measurement(Measurement { name: "North", kind: Speed, value: Ok(2195.0) })
index = 3
slot = gimlet 1
|
| 203 | 2026-01-14T21:22:38.383Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Southwest", kind: Speed, value: Ok(2680.0) })
index = 4
slot = gimlet 1
|
| 204 | 2026-01-14T21:22:38.383Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Northwest", kind: Speed, value: Ok(2212.0) })
index = 5
slot = gimlet 1
|
| 205 | 2026-01-14T21:22:38.432Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 6 }
interface = fake-switch0
response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
|
| 206 | 2026-01-14T21:22:38.432Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 6 }
interface = fake-sled0
response = ComponentDetails(TlvPage { offset: 0, total: 1 })
|
| 207 | 2026-01-14T21:22:38.432Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 6 }
interface = fake-sled1
response = ComponentDetails(TlvPage { offset: 0, total: 6 })
|
| 208 | 2026-01-14T21:22:38.434Z | TRAC | test_vpc_firewall (sensor-poller): polled SP successfully
chassis_type = Switch
num_samples = 3
sp_slot = 0
|
| 209 | 2026-01-14T21:22:38.440Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 7 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-7" }, offset: 0 }) }
|
| 210 | 2026-01-14T21:22:38.442Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 7 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-0" }, offset: 0 }) }
|
| 211 | 2026-01-14T21:22:38.511Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-7" }): asked for number of component details
num_details = 4
slot = gimlet 0
|
| 212 | 2026-01-14T21:22:38.512Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor
details = Measurement(Measurement { name: "V12_U2A_A0", kind: Current, value: Ok(0.45898438) })
index = 0
slot = gimlet 0
|
| 213 | 2026-01-14T21:22:38.512Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor
details = Measurement(Measurement { name: "V3P3_U2A_A0", kind: Current, value: Ok(0.024414063) })
index = 1
slot = gimlet 0
|
| 214 | 2026-01-14T21:22:38.512Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor
details = Measurement(Measurement { name: "V12_U2A_A0", kind: Voltage, value: Ok(12.03125) })
index = 2
slot = gimlet 0
|
| 215 | 2026-01-14T21:22:38.512Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor
details = Measurement(Measurement { name: "V3P3_U2A_A0", kind: Voltage, value: Ok(3.328125) })
index = 3
slot = gimlet 0
|
| 216 | 2026-01-14T21:22:38.513Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-0" }): asked for number of component details
num_details = 1
slot = gimlet 1
|
| 217 | 2026-01-14T21:22:38.513Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-0" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Southwest", kind: Temperature, value: Ok(41.3629) })
index = 0
slot = gimlet 1
|
| 218 | 2026-01-14T21:22:38.516Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 7 }
interface = fake-sled0
response = ComponentDetails(TlvPage { offset: 0, total: 4 })
|
| 219 | 2026-01-14T21:22:38.516Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 7 }
interface = fake-sled1
response = ComponentDetails(TlvPage { offset: 0, total: 1 })
|
| 220 | 2026-01-14T21:22:38.521Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 8 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-39" }, offset: 0 }) }
|
| 221 | 2026-01-14T21:22:38.521Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 8 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-2" }, offset: 0 }) }
|
| 222 | 2026-01-14T21:22:38.521Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-39" }): asked for number of component details
num_details = 1
slot = gimlet 0
|
| 223 | 2026-01-14T21:22:38.521Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-39" }): asked for component details for a sensor
details = Measurement(Measurement { name: "t6", kind: Temperature, value: Ok(70.625) })
index = 0
slot = gimlet 0
|
| 224 | 2026-01-14T21:22:38.521Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-2" }): asked for number of component details
num_details = 1
slot = gimlet 1
|
| 225 | 2026-01-14T21:22:38.522Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-2" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Southeast", kind: Temperature, value: Ok(41.570313) })
index = 0
slot = gimlet 1
|
| 226 | 2026-01-14T21:22:38.522Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 8 }
interface = fake-sled0
response = ComponentDetails(TlvPage { offset: 0, total: 1 })
|
| 227 | 2026-01-14T21:22:38.522Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 8 }
interface = fake-sled1
response = ComponentDetails(TlvPage { offset: 0, total: 1 })
|
| 228 | 2026-01-14T21:22:38.526Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 9 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-46" }, offset: 0 }) }
|
| 229 | 2026-01-14T21:22:38.526Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 9 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-1" }, offset: 0 }) }
|
| 230 | 2026-01-14T21:22:38.526Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-46" }): asked for number of component details
num_details = 1
slot = gimlet 0
|
| 231 | 2026-01-14T21:22:38.526Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-46" }): asked for component details for a sensor
details = Measurement(Measurement { name: "CPU", kind: Temperature, value: Ok(64.5) })
index = 0
slot = gimlet 0
|
| 232 | 2026-01-14T21:22:38.526Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-1" }): asked for number of component details
num_details = 1
slot = gimlet 1
|
| 233 | 2026-01-14T21:22:38.526Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-1" }): asked for component details for a sensor
details = Measurement(Measurement { name: "South", kind: Temperature, value: Ok(42.5625) })
index = 0
slot = gimlet 1
|
| 234 | 2026-01-14T21:22:38.527Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 9 }
interface = fake-sled0
response = ComponentDetails(TlvPage { offset: 0, total: 1 })
|
| 235 | 2026-01-14T21:22:38.527Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 9 }
interface = fake-sled1
response = ComponentDetails(TlvPage { offset: 0, total: 1 })
|
| 236 | 2026-01-14T21:22:38.528Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 10 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-8" }, offset: 0 }) }
|
| 237 | 2026-01-14T21:22:38.528Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 10 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-7" }, offset: 0 }) }
|
| 238 | 2026-01-14T21:22:38.528Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-8" }): asked for number of component details
num_details = 1
slot = gimlet 0
|
| 239 | 2026-01-14T21:22:38.528Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-8" }): asked for component details for a sensor
details = Measurement(Measurement { name: "U2_N0", kind: Temperature, value: Ok(56.0) })
index = 0
slot = gimlet 0
|
| 240 | 2026-01-14T21:22:38.528Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-7" }): asked for number of component details
num_details = 4
slot = gimlet 1
|
| 241 | 2026-01-14T21:22:38.528Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor
details = Measurement(Measurement { name: "V12_U2A_A0", kind: Current, value: Ok(0.41893438) })
index = 0
slot = gimlet 1
|
| 242 | 2026-01-14T21:22:38.528Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor
details = Measurement(Measurement { name: "V3P3_U2A_A0", kind: Current, value: Ok(0.025614602) })
index = 1
slot = gimlet 1
|
| 243 | 2026-01-14T21:22:38.528Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor
details = Measurement(Measurement { name: "V12_U2A_A0", kind: Voltage, value: Ok(12.02914) })
index = 2
slot = gimlet 1
|
| 244 | 2026-01-14T21:22:38.529Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor
details = Measurement(Measurement { name: "V3P3_U2A_A0", kind: Voltage, value: Ok(3.2618) })
index = 3
slot = gimlet 1
|
| 245 | 2026-01-14T21:22:38.529Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 10 }
interface = fake-sled0
response = ComponentDetails(TlvPage { offset: 0, total: 1 })
|
| 246 | 2026-01-14T21:22:38.529Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 10 }
interface = fake-sled1
response = ComponentDetails(TlvPage { offset: 0, total: 4 })
|
| 247 | 2026-01-14T21:22:38.533Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 11 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-53" }, offset: 0 }) }
|
| 248 | 2026-01-14T21:22:38.533Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 11 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-39" }, offset: 0 }) }
|
| 249 | 2026-01-14T21:22:38.533Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for number of component details
num_details = 6
slot = gimlet 0
|
| 250 | 2026-01-14T21:22:38.533Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Southeast", kind: Speed, value: Ok(2607.0) })
index = 0
slot = gimlet 0
|
| 251 | 2026-01-14T21:22:38.533Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Northeast", kind: Speed, value: Ok(2476.0) })
index = 1
slot = gimlet 0
|
| 252 | 2026-01-14T21:22:38.533Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor
details = Measurement(Measurement { name: "South", kind: Speed, value: Ok(2553.0) })
index = 2
slot = gimlet 0
|
| 253 | 2026-01-14T21:22:38.533Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor
details = Measurement(Measurement { name: "North", kind: Speed, value: Ok(2265.0) })
index = 3
slot = gimlet 0
|
| 254 | 2026-01-14T21:22:38.533Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Southwest", kind: Speed, value: Ok(2649.0) })
index = 4
slot = gimlet 0
|
| 255 | 2026-01-14T21:22:38.533Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Northwest", kind: Speed, value: Ok(2275.0) })
index = 5
slot = gimlet 0
|
| 256 | 2026-01-14T21:22:38.533Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-39" }): asked for number of component details
num_details = 1
slot = gimlet 1
|
| 257 | 2026-01-14T21:22:38.534Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-39" }): asked for component details for a sensor
details = Measurement(Measurement { name: "t6", kind: Temperature, value: Ok(70.625) })
index = 0
slot = gimlet 1
|
| 258 | 2026-01-14T21:22:38.534Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 11 }
interface = fake-sled0
response = ComponentDetails(TlvPage { offset: 0, total: 6 })
|
| 259 | 2026-01-14T21:22:38.534Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 11 }
interface = fake-sled1
response = ComponentDetails(TlvPage { offset: 0, total: 1 })
|
| 260 | 2026-01-14T21:22:38.542Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 12 }, kind: MgsRequest(SpState) }
|
| 261 | 2026-01-14T21:22:38.543Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 12 }, kind: MgsRequest(SpState) }
|
| 262 | 2026-01-14T21:22:38.662Z | DEBG | test_vpc_firewall: received state request
reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) }
slot = gimlet 0
|
| 263 | 2026-01-14T21:22:38.662Z | DEBG | test_vpc_firewall: received state request
reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) }
slot = gimlet 1
|
| 264 | 2026-01-14T21:22:38.683Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 12 }
interface = fake-sled0
response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
|
| 265 | 2026-01-14T21:22:38.683Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 12 }
interface = fake-sled1
response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
|
| 266 | 2026-01-14T21:22:38.683Z | TRAC | test_vpc_firewall (sensor-poller): interval elapsed, polling SP...
chassis_type = Switch
sp_slot = 1
|
| 267 | 2026-01-14T21:22:38.684Z | TRAC | test_vpc_firewall (sensor-poller): interval elapsed, polling SP...
chassis_type = Switch
sp_slot = 0
|
| 268 | 2026-01-14T21:22:38.684Z | TRAC | test_vpc_firewall (sensor-poller): polled SP successfully
chassis_type = Sled
num_samples = 17
sp_slot = 0
|
| 269 | 2026-01-14T21:22:38.684Z | TRAC | test_vpc_firewall (sensor-poller): interval elapsed, polling SP...
chassis_type = Sled
sp_slot = 0
|
| 270 | 2026-01-14T21:22:38.684Z | TRAC | test_vpc_firewall (sensor-poller): polled SP successfully
chassis_type = Sled
num_samples = 16
sp_slot = 1
|
| 271 | 2026-01-14T21:22:38.684Z | TRAC | test_vpc_firewall (sensor-poller): interval elapsed, polling SP...
chassis_type = Sled
sp_slot = 1
|
| 272 | 2026-01-14T21:22:38.684Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch1
request = Message { header: Header { version: 22, message_id: 5 }, kind: MgsRequest(SpState) }
|
| 273 | 2026-01-14T21:22:38.684Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch0
request = Message { header: Header { version: 22, message_id: 7 }, kind: MgsRequest(SpState) }
|
| 274 | 2026-01-14T21:22:38.684Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 13 }, kind: MgsRequest(SpState) }
|
| 275 | 2026-01-14T21:22:38.684Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 13 }, kind: MgsRequest(SpState) }
|
| 276 | 2026-01-14T21:22:38.684Z | DEBG | test_vpc_firewall: received state request
reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) }
slot = sidecar 0
|
| 277 | 2026-01-14T21:22:38.684Z | DEBG | test_vpc_firewall: received state request
reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) }
slot = sidecar 1
|
| 278 | 2026-01-14T21:22:38.684Z | DEBG | test_vpc_firewall: received state request
reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) }
slot = gimlet 0
|
| 279 | 2026-01-14T21:22:38.684Z | DEBG | test_vpc_firewall: received state request
reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) }
slot = gimlet 1
|
| 280 | 2026-01-14T21:22:38.684Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 7 }
interface = fake-switch0
response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
|
| 281 | 2026-01-14T21:22:38.685Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 5 }
interface = fake-switch1
response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
|
| 282 | 2026-01-14T21:22:38.685Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 13 }
interface = fake-sled0
response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
|
| 283 | 2026-01-14T21:22:38.685Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 13 }
interface = fake-sled1
response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
|
| 284 | 2026-01-14T21:22:38.685Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch0
request = Message { header: Header { version: 22, message_id: 8 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-0" }, offset: 0 }) }
|
| 285 | 2026-01-14T21:22:38.685Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch1
request = Message { header: Header { version: 22, message_id: 6 }, kind: MgsRequest(SpState) }
|
| 286 | 2026-01-14T21:22:38.685Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 14 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-1" }, offset: 0 }) }
|
| 287 | 2026-01-14T21:22:38.685Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 14 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-8" }, offset: 0 }) }
|
| 288 | 2026-01-14T21:22:38.687Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-0" }): asked for number of component details
num_details = 1
slot = sidecar 0
|
| 289 | 2026-01-14T21:22:38.687Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-0" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Southwest", kind: Temperature, value: Ok(41.789063) })
index = 0
slot = sidecar 0
|
| 290 | 2026-01-14T21:22:38.687Z | DEBG | test_vpc_firewall: received state request
reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) }
slot = sidecar 1
|
| 291 | 2026-01-14T21:22:38.687Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-1" }): asked for number of component details
num_details = 1
slot = gimlet 0
|
| 292 | 2026-01-14T21:22:38.687Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-1" }): asked for component details for a sensor
details = Measurement(Measurement { name: "South", kind: Temperature, value: Ok(42.5625) })
index = 0
slot = gimlet 0
|
| 293 | 2026-01-14T21:22:38.687Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-8" }): asked for number of component details
num_details = 1
slot = gimlet 1
|
| 294 | 2026-01-14T21:22:38.687Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-8" }): asked for component details for a sensor
details = Measurement(Measurement { name: "U2_N0", kind: Temperature, value: Ok(56.0) })
index = 0
slot = gimlet 1
|
| 295 | 2026-01-14T21:22:38.832Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 8 }
interface = fake-switch0
response = ComponentDetails(TlvPage { offset: 0, total: 1 })
|
| 296 | 2026-01-14T21:22:38.832Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 6 }
interface = fake-switch1
response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
|
| 297 | 2026-01-14T21:22:38.832Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 14 }
interface = fake-sled0
response = ComponentDetails(TlvPage { offset: 0, total: 1 })
|
| 298 | 2026-01-14T21:22:38.832Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 14 }
interface = fake-sled1
response = ComponentDetails(TlvPage { offset: 0, total: 1 })
|
| 299 | 2026-01-14T21:22:38.841Z | TRAC | test_vpc_firewall (sensor-poller): polled SP, no samples returned
chassis_type = Switch
num_samples = 0
sp_slot = 1
|
| 300 | 2026-01-14T21:22:38.844Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch0
request = Message { header: Header { version: 22, message_id: 9 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-1" }, offset: 0 }) }
|
| 301 | 2026-01-14T21:22:38.844Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 15 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-2" }, offset: 0 }) }
|
| 302 | 2026-01-14T21:22:38.844Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 15 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-46" }, offset: 0 }) }
|
| 303 | 2026-01-14T21:22:38.860Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-1" }): asked for number of component details
num_details = 1
slot = sidecar 0
|
| 304 | 2026-01-14T21:22:38.860Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-1" }): asked for component details for a sensor
details = Measurement(Measurement { name: "South", kind: Temperature, value: Err(DeviceError) })
index = 0
slot = sidecar 0
|
| 305 | 2026-01-14T21:22:38.860Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-2" }): asked for number of component details
num_details = 1
slot = gimlet 0
|
| 306 | 2026-01-14T21:22:38.860Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-2" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Southeast", kind: Temperature, value: Ok(41.570313) })
index = 0
slot = gimlet 0
|
| 307 | 2026-01-14T21:22:38.860Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-46" }): asked for number of component details
num_details = 1
slot = gimlet 1
|
| 308 | 2026-01-14T21:22:38.860Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-46" }): asked for component details for a sensor
details = Measurement(Measurement { name: "CPU", kind: Temperature, value: Ok(62.6) })
index = 0
slot = gimlet 1
|
| 309 | 2026-01-14T21:22:38.861Z | TRAC | test_vpc_firewall (internal-dns-resolver): lookup_socket_v6 srv
dns_name = _nexus._tcp.control-plane.oxide.internal
|
| 310 | 2026-01-14T21:22:38.862Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 9 }
interface = fake-switch0
response = ComponentDetails(TlvPage { offset: 0, total: 1 })
|
| 311 | 2026-01-14T21:22:38.862Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 15 }
interface = fake-sled0
response = ComponentDetails(TlvPage { offset: 0, total: 1 })
|
| 312 | 2026-01-14T21:22:38.862Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 15 }
interface = fake-sled1
response = ComponentDetails(TlvPage { offset: 0, total: 1 })
|
| 313 | 2026-01-14T21:22:38.906Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch0
request = Message { header: Header { version: 22, message_id: 10 }, kind: MgsRequest(SpState) }
|
| 314 | 2026-01-14T21:22:38.906Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 16 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-0" }, offset: 0 }) }
|
| 315 | 2026-01-14T21:22:38.906Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 16 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-53" }, offset: 0 }) }
|
| 316 | 2026-01-14T21:22:38.929Z | DEBG | test_vpc_firewall: received state request
reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) }
slot = sidecar 0
|
| 317 | 2026-01-14T21:22:38.929Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-0" }): asked for number of component details
num_details = 1
slot = gimlet 0
|
| 318 | 2026-01-14T21:22:38.929Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-0" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Southwest", kind: Temperature, value: Err(DeviceError) })
index = 0
slot = gimlet 0
|
| 319 | 2026-01-14T21:22:38.929Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for number of component details
num_details = 6
slot = gimlet 1
|
| 320 | 2026-01-14T21:22:38.929Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Southeast", kind: Speed, value: Ok(2510.0) })
index = 0
slot = gimlet 1
|
| 321 | 2026-01-14T21:22:38.929Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Northeast", kind: Speed, value: Ok(2390.0) })
index = 1
slot = gimlet 1
|
| 322 | 2026-01-14T21:22:38.929Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor
details = Measurement(Measurement { name: "South", kind: Speed, value: Ok(2467.0) })
index = 2
slot = gimlet 1
|
| 323 | 2026-01-14T21:22:38.929Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor
details = Measurement(Measurement { name: "North", kind: Speed, value: Ok(2195.0) })
index = 3
slot = gimlet 1
|
| 324 | 2026-01-14T21:22:38.929Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Southwest", kind: Speed, value: Ok(2680.0) })
index = 4
slot = gimlet 1
|
| 325 | 2026-01-14T21:22:38.929Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Northwest", kind: Speed, value: Ok(2212.0) })
index = 5
slot = gimlet 1
|
| 326 | 2026-01-14T21:22:38.929Z | INFO | test_vpc_firewall (dropshot): accepted connection
local_addr = [::1]:59250
remote_addr = [::1]:35615
|
| 327 | 2026-01-14T21:22:38.943Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 10 }
interface = fake-switch0
response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
|
| 328 | 2026-01-14T21:22:38.943Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 16 }
interface = fake-sled0
response = ComponentDetails(TlvPage { offset: 0, total: 1 })
|
| 329 | 2026-01-14T21:22:38.943Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 16 }
interface = fake-sled1
response = ComponentDetails(TlvPage { offset: 0, total: 6 })
|
| 330 | 2026-01-14T21:22:38.943Z | WARN | test_vpc_firewall (producer-registration-task): failed to register with Nexus, will retry
count = 2
delay = 1.380211619s
error = "proto error: io error: No route to host (os error 148)"
file = oximeter/producer/src/lib.rs:371
|
| 331 | 2026-01-14T21:22:38.944Z | TRAC | test_vpc_firewall (dropshot): incoming request
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:35615
req_id = 2ff12e1e-3e9d-4b27-85ee-ee02cae18342
uri = /local/switch-id
|
| 332 | 2026-01-14T21:22:38.944Z | DEBG | test_vpc_firewall (dropshot): determined request API version
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:35615
req_id = 2ff12e1e-3e9d-4b27-85ee-ee02cae18342
uri = /local/switch-id
version = 3.0.0
|
| 333 | 2026-01-14T21:22:38.948Z | TRAC | test_vpc_firewall (sensor-poller): polled SP successfully
chassis_type = Switch
num_samples = 3
sp_slot = 0
|
| 334 | 2026-01-14T21:22:38.966Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 17 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-7" }, offset: 0 }) }
|
| 335 | 2026-01-14T21:22:38.966Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 17 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-0" }, offset: 0 }) }
|
| 336 | 2026-01-14T21:22:38.966Z | INFO | test_vpc_firewall (dropshot): request completed
latency_us = 22105
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:35615
req_id = 2ff12e1e-3e9d-4b27-85ee-ee02cae18342
response_code = 200
uri = /local/switch-id
|
| 337 | 2026-01-14T21:22:38.983Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-7" }): asked for number of component details
num_details = 4
slot = gimlet 0
|
| 338 | 2026-01-14T21:22:38.983Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor
details = Measurement(Measurement { name: "V12_U2A_A0", kind: Current, value: Ok(0.45898438) })
index = 0
slot = gimlet 0
|
| 339 | 2026-01-14T21:22:38.983Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor
details = Measurement(Measurement { name: "V3P3_U2A_A0", kind: Current, value: Ok(0.024414063) })
index = 1
slot = gimlet 0
|
| 340 | 2026-01-14T21:22:38.984Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor
details = Measurement(Measurement { name: "V12_U2A_A0", kind: Voltage, value: Ok(12.03125) })
index = 2
slot = gimlet 0
|
| 341 | 2026-01-14T21:22:38.984Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor
details = Measurement(Measurement { name: "V3P3_U2A_A0", kind: Voltage, value: Ok(3.328125) })
index = 3
slot = gimlet 0
|
| 342 | 2026-01-14T21:22:38.984Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-0" }): asked for number of component details
num_details = 1
slot = gimlet 1
|
| 343 | 2026-01-14T21:22:38.984Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-0" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Southwest", kind: Temperature, value: Ok(41.3629) })
index = 0
slot = gimlet 1
|
| 344 | 2026-01-14T21:22:38.984Z | TRAC | test_vpc_firewall (dropshot): incoming request
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:35615
req_id = ef3186d3-0cd0-46ea-9a05-43ea40ba6e9e
uri = /sp/switch/0
|
| 345 | 2026-01-14T21:22:38.984Z | DEBG | test_vpc_firewall (dropshot): determined request API version
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:35615
req_id = ef3186d3-0cd0-46ea-9a05-43ea40ba6e9e
uri = /sp/switch/0
version = 3.0.0
|
| 346 | 2026-01-14T21:22:38.984Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch0
request = Message { header: Header { version: 22, message_id: 11 }, kind: MgsRequest(SpState) }
|
| 347 | 2026-01-14T21:22:38.985Z | DEBG | test_vpc_firewall: received state request
reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) }
slot = sidecar 0
|
| 348 | 2026-01-14T21:22:38.985Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 17 }
interface = fake-sled0
response = ComponentDetails(TlvPage { offset: 0, total: 4 })
|
| 349 | 2026-01-14T21:22:38.985Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 17 }
interface = fake-sled1
response = ComponentDetails(TlvPage { offset: 0, total: 1 })
|
| 350 | 2026-01-14T21:22:39.022Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 18 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-39" }, offset: 0 }) }
|
| 351 | 2026-01-14T21:22:39.022Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 18 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-2" }, offset: 0 }) }
|
| 352 | 2026-01-14T21:22:39.040Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-39" }): asked for number of component details
num_details = 1
slot = gimlet 0
|
| 353 | 2026-01-14T21:22:39.041Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-39" }): asked for component details for a sensor
details = Measurement(Measurement { name: "t6", kind: Temperature, value: Ok(70.625) })
index = 0
slot = gimlet 0
|
| 354 | 2026-01-14T21:22:39.041Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-2" }): asked for number of component details
num_details = 1
slot = gimlet 1
|
| 355 | 2026-01-14T21:22:39.042Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-2" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Southeast", kind: Temperature, value: Ok(41.570313) })
index = 0
slot = gimlet 1
|
| 356 | 2026-01-14T21:22:39.042Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 11 }
interface = fake-switch0
response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
|
| 357 | 2026-01-14T21:22:39.043Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch0
request = Message { header: Header { version: 22, message_id: 12 }, kind: MgsRequest(VersionedRotBootInfo { version: 3 }) }
|
| 358 | 2026-01-14T21:22:39.076Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 18 }
interface = fake-sled0
response = ComponentDetails(TlvPage { offset: 0, total: 1 })
|
| 359 | 2026-01-14T21:22:39.076Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 18 }
interface = fake-sled1
response = ComponentDetails(TlvPage { offset: 0, total: 1 })
|
| 360 | 2026-01-14T21:22:39.080Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 19 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-46" }, offset: 0 }) }
|
| 361 | 2026-01-14T21:22:39.080Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 19 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-1" }, offset: 0 }) }
|
| 362 | 2026-01-14T21:22:39.080Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-46" }): asked for number of component details
num_details = 1
slot = gimlet 0
|
| 363 | 2026-01-14T21:22:39.080Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-46" }): asked for component details for a sensor
details = Measurement(Measurement { name: "CPU", kind: Temperature, value: Ok(64.5) })
index = 0
slot = gimlet 0
|
| 364 | 2026-01-14T21:22:39.080Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-1" }): asked for number of component details
num_details = 1
slot = gimlet 1
|
| 365 | 2026-01-14T21:22:39.080Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-1" }): asked for component details for a sensor
details = Measurement(Measurement { name: "South", kind: Temperature, value: Ok(42.5625) })
index = 0
slot = gimlet 1
|
| 366 | 2026-01-14T21:22:39.080Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 12 }
interface = fake-switch0
response = RotBootInfo(V3(RotStateV3 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_fwid: Sha3_256([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_fwid: Sha3_256([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]), stage0_fwid: Sha3_256([204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204]), stage0next_fwid: Sha3_256([221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221]), slot_a_status: Ok(()), slot_b_status: Ok(()), stage0_status: Ok(()), stage0next_status: Ok(()) }))
|
| 367 | 2026-01-14T21:22:39.081Z | INFO | test_vpc_firewall (dropshot): request completed
latency_us = 97398
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:35615
req_id = ef3186d3-0cd0-46ea-9a05-43ea40ba6e9e
response_code = 200
uri = /sp/switch/0
|
| 368 | 2026-01-14T21:22:39.082Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 19 }
interface = fake-sled0
response = ComponentDetails(TlvPage { offset: 0, total: 1 })
|
| 369 | 2026-01-14T21:22:39.082Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 19 }
interface = fake-sled1
response = ComponentDetails(TlvPage { offset: 0, total: 1 })
|
| 370 | 2026-01-14T21:22:39.086Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 20 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-8" }, offset: 0 }) }
|
| 371 | 2026-01-14T21:22:39.086Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 20 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-7" }, offset: 0 }) }
|
| 372 | 2026-01-14T21:22:39.086Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-8" }): asked for number of component details
num_details = 1
slot = gimlet 0
|
| 373 | 2026-01-14T21:22:39.086Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-8" }): asked for component details for a sensor
details = Measurement(Measurement { name: "U2_N0", kind: Temperature, value: Ok(56.0) })
index = 0
slot = gimlet 0
|
| 374 | 2026-01-14T21:22:39.086Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-7" }): asked for number of component details
num_details = 4
slot = gimlet 1
|
| 375 | 2026-01-14T21:22:39.086Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor
details = Measurement(Measurement { name: "V12_U2A_A0", kind: Current, value: Ok(0.41893438) })
index = 0
slot = gimlet 1
|
| 376 | 2026-01-14T21:22:39.086Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor
details = Measurement(Measurement { name: "V3P3_U2A_A0", kind: Current, value: Ok(0.025614602) })
index = 1
slot = gimlet 1
|
| 377 | 2026-01-14T21:22:39.086Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor
details = Measurement(Measurement { name: "V12_U2A_A0", kind: Voltage, value: Ok(12.02914) })
index = 2
slot = gimlet 1
|
| 378 | 2026-01-14T21:22:39.086Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor
details = Measurement(Measurement { name: "V3P3_U2A_A0", kind: Voltage, value: Ok(3.2618) })
index = 3
slot = gimlet 1
|
| 379 | 2026-01-14T21:22:39.087Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 20 }
interface = fake-sled0
response = ComponentDetails(TlvPage { offset: 0, total: 1 })
|
| 380 | 2026-01-14T21:22:39.087Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 20 }
interface = fake-sled1
response = ComponentDetails(TlvPage { offset: 0, total: 4 })
|
| 381 | 2026-01-14T21:22:39.095Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 21 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-53" }, offset: 0 }) }
|
| 382 | 2026-01-14T21:22:39.095Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 21 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-39" }, offset: 0 }) }
|
| 383 | 2026-01-14T21:22:39.097Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for number of component details
num_details = 6
slot = gimlet 0
|
| 384 | 2026-01-14T21:22:39.097Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Southeast", kind: Speed, value: Ok(2607.0) })
index = 0
slot = gimlet 0
|
| 385 | 2026-01-14T21:22:39.097Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Northeast", kind: Speed, value: Ok(2476.0) })
index = 1
slot = gimlet 0
|
| 386 | 2026-01-14T21:22:39.097Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor
details = Measurement(Measurement { name: "South", kind: Speed, value: Ok(2553.0) })
index = 2
slot = gimlet 0
|
| 387 | 2026-01-14T21:22:39.097Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor
details = Measurement(Measurement { name: "North", kind: Speed, value: Ok(2265.0) })
index = 3
slot = gimlet 0
|
| 388 | 2026-01-14T21:22:39.097Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Southwest", kind: Speed, value: Ok(2649.0) })
index = 4
slot = gimlet 0
|
| 389 | 2026-01-14T21:22:39.097Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Northwest", kind: Speed, value: Ok(2275.0) })
index = 5
slot = gimlet 0
|
| 390 | 2026-01-14T21:22:39.097Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-39" }): asked for number of component details
num_details = 1
slot = gimlet 1
|
| 391 | 2026-01-14T21:22:39.097Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-39" }): asked for component details for a sensor
details = Measurement(Measurement { name: "t6", kind: Temperature, value: Ok(70.625) })
index = 0
slot = gimlet 1
|
| 392 | 2026-01-14T21:22:39.100Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 21 }
interface = fake-sled0
response = ComponentDetails(TlvPage { offset: 0, total: 6 })
|
| 393 | 2026-01-14T21:22:39.100Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 21 }
interface = fake-sled1
response = ComponentDetails(TlvPage { offset: 0, total: 1 })
|
| 394 | 2026-01-14T21:22:39.146Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 22 }, kind: MgsRequest(SpState) }
|
| 395 | 2026-01-14T21:22:39.146Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 22 }, kind: MgsRequest(SpState) }
|
| 396 | 2026-01-14T21:22:39.147Z | DEBG | test_vpc_firewall: received state request
reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) }
slot = gimlet 0
|
| 397 | 2026-01-14T21:22:39.147Z | DEBG | test_vpc_firewall: received state request
reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) }
slot = gimlet 1
|
| 398 | 2026-01-14T21:22:39.148Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 22 }
interface = fake-sled0
response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
|
| 399 | 2026-01-14T21:22:39.148Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 22 }
interface = fake-sled1
response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
|
| 400 | 2026-01-14T21:22:39.148Z | TRAC | test_vpc_firewall (sensor-poller): polled SP successfully
chassis_type = Sled
num_samples = 17
sp_slot = 0
|
| 401 | 2026-01-14T21:22:39.148Z | TRAC | test_vpc_firewall (sensor-poller): polled SP successfully
chassis_type = Sled
num_samples = 16
sp_slot = 1
|
| 402 | 2026-01-14T21:22:39.609Z | TRAC | test_vpc_firewall (sensor-poller): interval elapsed, polling SP...
chassis_type = Switch
sp_slot = 1
|
| 403 | 2026-01-14T21:22:39.609Z | TRAC | test_vpc_firewall (sensor-poller): interval elapsed, polling SP...
chassis_type = Switch
sp_slot = 0
|
| 404 | 2026-01-14T21:22:39.609Z | TRAC | test_vpc_firewall (sensor-poller): interval elapsed, polling SP...
chassis_type = Sled
sp_slot = 0
|
| 405 | 2026-01-14T21:22:39.609Z | TRAC | test_vpc_firewall (sensor-poller): interval elapsed, polling SP...
chassis_type = Sled
sp_slot = 1
|
| 406 | 2026-01-14T21:22:39.609Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch1
request = Message { header: Header { version: 22, message_id: 7 }, kind: MgsRequest(SpState) }
|
| 407 | 2026-01-14T21:22:39.609Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch0
request = Message { header: Header { version: 22, message_id: 13 }, kind: MgsRequest(SpState) }
|
| 408 | 2026-01-14T21:22:39.609Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 23 }, kind: MgsRequest(SpState) }
|
| 409 | 2026-01-14T21:22:39.609Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 23 }, kind: MgsRequest(SpState) }
|
| 410 | 2026-01-14T21:22:39.629Z | DEBG | test_vpc_firewall: received state request
reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) }
slot = sidecar 0
|
| 411 | 2026-01-14T21:22:39.629Z | DEBG | test_vpc_firewall: received state request
reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) }
slot = sidecar 1
|
| 412 | 2026-01-14T21:22:39.629Z | DEBG | test_vpc_firewall: received state request
reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) }
slot = gimlet 0
|
| 413 | 2026-01-14T21:22:39.629Z | DEBG | test_vpc_firewall: received state request
reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) }
slot = gimlet 1
|
| 414 | 2026-01-14T21:22:39.629Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 13 }
interface = fake-switch0
response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
|
| 415 | 2026-01-14T21:22:39.629Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 7 }
interface = fake-switch1
response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
|
| 416 | 2026-01-14T21:22:39.629Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 23 }
interface = fake-sled0
response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
|
| 417 | 2026-01-14T21:22:39.629Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 23 }
interface = fake-sled1
response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
|
| 418 | 2026-01-14T21:22:39.629Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch0
request = Message { header: Header { version: 22, message_id: 14 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-0" }, offset: 0 }) }
|
| 419 | 2026-01-14T21:22:39.629Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch1
request = Message { header: Header { version: 22, message_id: 8 }, kind: MgsRequest(SpState) }
|
| 420 | 2026-01-14T21:22:39.629Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 24 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-1" }, offset: 0 }) }
|
| 421 | 2026-01-14T21:22:39.629Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 24 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-8" }, offset: 0 }) }
|
| 422 | 2026-01-14T21:22:39.630Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-0" }): asked for number of component details
num_details = 1
slot = sidecar 0
|
| 423 | 2026-01-14T21:22:39.630Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-0" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Southwest", kind: Temperature, value: Ok(41.789063) })
index = 0
slot = sidecar 0
|
| 424 | 2026-01-14T21:22:39.630Z | DEBG | test_vpc_firewall: received state request
reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) }
slot = sidecar 1
|
| 425 | 2026-01-14T21:22:39.630Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-1" }): asked for number of component details
num_details = 1
slot = gimlet 0
|
| 426 | 2026-01-14T21:22:39.630Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-1" }): asked for component details for a sensor
details = Measurement(Measurement { name: "South", kind: Temperature, value: Ok(42.5625) })
index = 0
slot = gimlet 0
|
| 427 | 2026-01-14T21:22:39.630Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-8" }): asked for number of component details
num_details = 1
slot = gimlet 1
|
| 428 | 2026-01-14T21:22:39.630Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-8" }): asked for component details for a sensor
details = Measurement(Measurement { name: "U2_N0", kind: Temperature, value: Ok(56.0) })
index = 0
slot = gimlet 1
|
| 429 | 2026-01-14T21:22:39.630Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 14 }
interface = fake-switch0
response = ComponentDetails(TlvPage { offset: 0, total: 1 })
|
| 430 | 2026-01-14T21:22:39.630Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 8 }
interface = fake-switch1
response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
|
| 431 | 2026-01-14T21:22:39.630Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 24 }
interface = fake-sled0
response = ComponentDetails(TlvPage { offset: 0, total: 1 })
|
| 432 | 2026-01-14T21:22:39.630Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 24 }
interface = fake-sled1
response = ComponentDetails(TlvPage { offset: 0, total: 1 })
|
| 433 | 2026-01-14T21:22:39.632Z | TRAC | test_vpc_firewall (sensor-poller): polled SP, no samples returned
chassis_type = Switch
num_samples = 0
sp_slot = 1
|
| 434 | 2026-01-14T21:22:39.634Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch0
request = Message { header: Header { version: 22, message_id: 15 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-1" }, offset: 0 }) }
|
| 435 | 2026-01-14T21:22:39.634Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 25 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-2" }, offset: 0 }) }
|
| 436 | 2026-01-14T21:22:39.634Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 25 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-46" }, offset: 0 }) }
|
| 437 | 2026-01-14T21:22:39.634Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-1" }): asked for number of component details
num_details = 1
slot = sidecar 0
|
| 438 | 2026-01-14T21:22:39.634Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-1" }): asked for component details for a sensor
details = Measurement(Measurement { name: "South", kind: Temperature, value: Err(DeviceError) })
index = 0
slot = sidecar 0
|
| 439 | 2026-01-14T21:22:39.634Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-2" }): asked for number of component details
num_details = 1
slot = gimlet 0
|
| 440 | 2026-01-14T21:22:39.634Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-2" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Southeast", kind: Temperature, value: Ok(41.570313) })
index = 0
slot = gimlet 0
|
| 441 | 2026-01-14T21:22:39.634Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-46" }): asked for number of component details
num_details = 1
slot = gimlet 1
|
| 442 | 2026-01-14T21:22:39.634Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-46" }): asked for component details for a sensor
details = Measurement(Measurement { name: "CPU", kind: Temperature, value: Ok(62.6) })
index = 0
slot = gimlet 1
|
| 443 | 2026-01-14T21:22:39.634Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 15 }
interface = fake-switch0
response = ComponentDetails(TlvPage { offset: 0, total: 1 })
|
| 444 | 2026-01-14T21:22:39.634Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 25 }
interface = fake-sled0
response = ComponentDetails(TlvPage { offset: 0, total: 1 })
|
| 445 | 2026-01-14T21:22:39.634Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 25 }
interface = fake-sled1
response = ComponentDetails(TlvPage { offset: 0, total: 1 })
|
| 446 | 2026-01-14T21:22:39.637Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch0
request = Message { header: Header { version: 22, message_id: 16 }, kind: MgsRequest(SpState) }
|
| 447 | 2026-01-14T21:22:39.637Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 26 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-0" }, offset: 0 }) }
|
| 448 | 2026-01-14T21:22:39.637Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 26 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-53" }, offset: 0 }) }
|
| 449 | 2026-01-14T21:22:39.637Z | DEBG | test_vpc_firewall: received state request
reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) }
slot = sidecar 0
|
| 450 | 2026-01-14T21:22:39.637Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-0" }): asked for number of component details
num_details = 1
slot = gimlet 0
|
| 451 | 2026-01-14T21:22:39.637Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-0" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Southwest", kind: Temperature, value: Err(DeviceError) })
index = 0
slot = gimlet 0
|
| 452 | 2026-01-14T21:22:39.637Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for number of component details
num_details = 6
slot = gimlet 1
|
| 453 | 2026-01-14T21:22:39.637Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Southeast", kind: Speed, value: Ok(2510.0) })
index = 0
slot = gimlet 1
|
| 454 | 2026-01-14T21:22:39.637Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Northeast", kind: Speed, value: Ok(2390.0) })
index = 1
slot = gimlet 1
|
| 455 | 2026-01-14T21:22:39.637Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor
details = Measurement(Measurement { name: "South", kind: Speed, value: Ok(2467.0) })
index = 2
slot = gimlet 1
|
| 456 | 2026-01-14T21:22:39.637Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor
details = Measurement(Measurement { name: "North", kind: Speed, value: Ok(2195.0) })
index = 3
slot = gimlet 1
|
| 457 | 2026-01-14T21:22:39.637Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Southwest", kind: Speed, value: Ok(2680.0) })
index = 4
slot = gimlet 1
|
| 458 | 2026-01-14T21:22:39.637Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Northwest", kind: Speed, value: Ok(2212.0) })
index = 5
slot = gimlet 1
|
| 459 | 2026-01-14T21:22:39.637Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 16 }
interface = fake-switch0
response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
|
| 460 | 2026-01-14T21:22:39.637Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 26 }
interface = fake-sled0
response = ComponentDetails(TlvPage { offset: 0, total: 1 })
|
| 461 | 2026-01-14T21:22:39.637Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 26 }
interface = fake-sled1
response = ComponentDetails(TlvPage { offset: 0, total: 6 })
|
| 462 | 2026-01-14T21:22:39.637Z | TRAC | test_vpc_firewall (sensor-poller): polled SP successfully
chassis_type = Switch
num_samples = 3
sp_slot = 0
|
| 463 | 2026-01-14T21:22:39.643Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 27 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-7" }, offset: 0 }) }
|
| 464 | 2026-01-14T21:22:39.643Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 27 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-0" }, offset: 0 }) }
|
| 465 | 2026-01-14T21:22:39.643Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-7" }): asked for number of component details
num_details = 4
slot = gimlet 0
|
| 466 | 2026-01-14T21:22:39.643Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor
details = Measurement(Measurement { name: "V12_U2A_A0", kind: Current, value: Ok(0.45898438) })
index = 0
slot = gimlet 0
|
| 467 | 2026-01-14T21:22:39.643Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor
details = Measurement(Measurement { name: "V3P3_U2A_A0", kind: Current, value: Ok(0.024414063) })
index = 1
slot = gimlet 0
|
| 468 | 2026-01-14T21:22:39.643Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor
details = Measurement(Measurement { name: "V12_U2A_A0", kind: Voltage, value: Ok(12.03125) })
index = 2
slot = gimlet 0
|
| 469 | 2026-01-14T21:22:39.643Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor
details = Measurement(Measurement { name: "V3P3_U2A_A0", kind: Voltage, value: Ok(3.328125) })
index = 3
slot = gimlet 0
|
| 470 | 2026-01-14T21:22:39.643Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-0" }): asked for number of component details
num_details = 1
slot = gimlet 1
|
| 471 | 2026-01-14T21:22:39.643Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-0" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Southwest", kind: Temperature, value: Ok(41.3629) })
index = 0
slot = gimlet 1
|
| 472 | 2026-01-14T21:22:39.643Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 27 }
interface = fake-sled0
response = ComponentDetails(TlvPage { offset: 0, total: 4 })
|
| 473 | 2026-01-14T21:22:39.643Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 27 }
interface = fake-sled1
response = ComponentDetails(TlvPage { offset: 0, total: 1 })
|
| 474 | 2026-01-14T21:22:39.646Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 28 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-39" }, offset: 0 }) }
|
| 475 | 2026-01-14T21:22:39.646Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 28 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-2" }, offset: 0 }) }
|
| 476 | 2026-01-14T21:22:39.646Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-39" }): asked for number of component details
num_details = 1
slot = gimlet 0
|
| 477 | 2026-01-14T21:22:39.646Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-39" }): asked for component details for a sensor
details = Measurement(Measurement { name: "t6", kind: Temperature, value: Ok(70.625) })
index = 0
slot = gimlet 0
|
| 478 | 2026-01-14T21:22:39.647Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-2" }): asked for number of component details
num_details = 1
slot = gimlet 1
|
| 479 | 2026-01-14T21:22:39.647Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-2" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Southeast", kind: Temperature, value: Ok(41.570313) })
index = 0
slot = gimlet 1
|
| 480 | 2026-01-14T21:22:39.647Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 28 }
interface = fake-sled0
response = ComponentDetails(TlvPage { offset: 0, total: 1 })
|
| 481 | 2026-01-14T21:22:39.647Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 28 }
interface = fake-sled1
response = ComponentDetails(TlvPage { offset: 0, total: 1 })
|
| 482 | 2026-01-14T21:22:39.648Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 29 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-46" }, offset: 0 }) }
|
| 483 | 2026-01-14T21:22:39.648Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 29 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-1" }, offset: 0 }) }
|
| 484 | 2026-01-14T21:22:39.648Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-46" }): asked for number of component details
num_details = 1
slot = gimlet 0
|
| 485 | 2026-01-14T21:22:39.649Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-46" }): asked for component details for a sensor
details = Measurement(Measurement { name: "CPU", kind: Temperature, value: Ok(64.5) })
index = 0
slot = gimlet 0
|
| 486 | 2026-01-14T21:22:39.649Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-1" }): asked for number of component details
num_details = 1
slot = gimlet 1
|
| 487 | 2026-01-14T21:22:39.649Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-1" }): asked for component details for a sensor
details = Measurement(Measurement { name: "South", kind: Temperature, value: Ok(42.5625) })
index = 0
slot = gimlet 1
|
| 488 | 2026-01-14T21:22:39.650Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 29 }
interface = fake-sled0
response = ComponentDetails(TlvPage { offset: 0, total: 1 })
|
| 489 | 2026-01-14T21:22:39.650Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 29 }
interface = fake-sled1
response = ComponentDetails(TlvPage { offset: 0, total: 1 })
|
| 490 | 2026-01-14T21:22:39.652Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 30 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-8" }, offset: 0 }) }
|
| 491 | 2026-01-14T21:22:39.652Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 30 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-7" }, offset: 0 }) }
|
| 492 | 2026-01-14T21:22:39.652Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-8" }): asked for number of component details
num_details = 1
slot = gimlet 0
|
| 493 | 2026-01-14T21:22:39.652Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-8" }): asked for component details for a sensor
details = Measurement(Measurement { name: "U2_N0", kind: Temperature, value: Ok(56.0) })
index = 0
slot = gimlet 0
|
| 494 | 2026-01-14T21:22:39.652Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-7" }): asked for number of component details
num_details = 4
slot = gimlet 1
|
| 495 | 2026-01-14T21:22:39.652Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor
details = Measurement(Measurement { name: "V12_U2A_A0", kind: Current, value: Ok(0.41893438) })
index = 0
slot = gimlet 1
|
| 496 | 2026-01-14T21:22:39.652Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor
details = Measurement(Measurement { name: "V3P3_U2A_A0", kind: Current, value: Ok(0.025614602) })
index = 1
slot = gimlet 1
|
| 497 | 2026-01-14T21:22:39.652Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor
details = Measurement(Measurement { name: "V12_U2A_A0", kind: Voltage, value: Ok(12.02914) })
index = 2
slot = gimlet 1
|
| 498 | 2026-01-14T21:22:39.652Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor
details = Measurement(Measurement { name: "V3P3_U2A_A0", kind: Voltage, value: Ok(3.2618) })
index = 3
slot = gimlet 1
|
| 499 | 2026-01-14T21:22:39.652Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 30 }
interface = fake-sled0
response = ComponentDetails(TlvPage { offset: 0, total: 1 })
|
| 500 | 2026-01-14T21:22:39.652Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 30 }
interface = fake-sled1
response = ComponentDetails(TlvPage { offset: 0, total: 4 })
|
| 501 | 2026-01-14T21:22:39.656Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 31 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-53" }, offset: 0 }) }
|
| 502 | 2026-01-14T21:22:39.656Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 31 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-39" }, offset: 0 }) }
|
| 503 | 2026-01-14T21:22:39.656Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for number of component details
num_details = 6
slot = gimlet 0
|
| 504 | 2026-01-14T21:22:39.656Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Southeast", kind: Speed, value: Ok(2607.0) })
index = 0
slot = gimlet 0
|
| 505 | 2026-01-14T21:22:39.656Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Northeast", kind: Speed, value: Ok(2476.0) })
index = 1
slot = gimlet 0
|
| 506 | 2026-01-14T21:22:39.656Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor
details = Measurement(Measurement { name: "South", kind: Speed, value: Ok(2553.0) })
index = 2
slot = gimlet 0
|
| 507 | 2026-01-14T21:22:39.656Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor
details = Measurement(Measurement { name: "North", kind: Speed, value: Ok(2265.0) })
index = 3
slot = gimlet 0
|
| 508 | 2026-01-14T21:22:39.656Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Southwest", kind: Speed, value: Ok(2649.0) })
index = 4
slot = gimlet 0
|
| 509 | 2026-01-14T21:22:39.656Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Northwest", kind: Speed, value: Ok(2275.0) })
index = 5
slot = gimlet 0
|
| 510 | 2026-01-14T21:22:39.656Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-39" }): asked for number of component details
num_details = 1
slot = gimlet 1
|
| 511 | 2026-01-14T21:22:39.656Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-39" }): asked for component details for a sensor
details = Measurement(Measurement { name: "t6", kind: Temperature, value: Ok(70.625) })
index = 0
slot = gimlet 1
|
| 512 | 2026-01-14T21:22:39.656Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 31 }
interface = fake-sled0
response = ComponentDetails(TlvPage { offset: 0, total: 6 })
|
| 513 | 2026-01-14T21:22:39.656Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 31 }
interface = fake-sled1
response = ComponentDetails(TlvPage { offset: 0, total: 1 })
|
| 514 | 2026-01-14T21:22:39.661Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 32 }, kind: MgsRequest(SpState) }
|
| 515 | 2026-01-14T21:22:39.661Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 32 }, kind: MgsRequest(SpState) }
|
| 516 | 2026-01-14T21:22:39.661Z | DEBG | test_vpc_firewall: received state request
reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) }
slot = gimlet 0
|
| 517 | 2026-01-14T21:22:39.661Z | DEBG | test_vpc_firewall: received state request
reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) }
slot = gimlet 1
|
| 518 | 2026-01-14T21:22:39.662Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 32 }
interface = fake-sled0
response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
|
| 519 | 2026-01-14T21:22:39.662Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 32 }
interface = fake-sled1
response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
|
| 520 | 2026-01-14T21:22:39.663Z | TRAC | test_vpc_firewall (sensor-poller): polled SP successfully
chassis_type = Sled
num_samples = 17
sp_slot = 0
|
| 521 | 2026-01-14T21:22:39.663Z | TRAC | test_vpc_firewall (sensor-poller): polled SP successfully
chassis_type = Sled
num_samples = 16
sp_slot = 1
|
| 522 | 2026-01-14T21:22:39.822Z | TRAC | test_vpc_firewall (internal-dns-resolver): lookup_socket_v6 srv
dns_name = _nexus._tcp.control-plane.oxide.internal
|
| 523 | 2026-01-14T21:22:39.824Z | WARN | test_vpc_firewall (producer-registration-task): failed to register with Nexus, will retry
count = 3
delay = 2.260965811s
error = "proto error: io error: No route to host (os error 148)"
file = oximeter/producer/src/lib.rs:371
|
| 524 | 2026-01-14T21:22:40.678Z | TRAC | test_vpc_firewall (sensor-poller): interval elapsed, polling SP...
chassis_type = Switch
sp_slot = 1
|
| 525 | 2026-01-14T21:22:40.678Z | TRAC | test_vpc_firewall (sensor-poller): interval elapsed, polling SP...
chassis_type = Switch
sp_slot = 0
|
| 526 | 2026-01-14T21:22:40.678Z | TRAC | test_vpc_firewall (sensor-poller): interval elapsed, polling SP...
chassis_type = Sled
sp_slot = 0
|
| 527 | 2026-01-14T21:22:40.678Z | TRAC | test_vpc_firewall (sensor-poller): interval elapsed, polling SP...
chassis_type = Sled
sp_slot = 1
|
| 528 | 2026-01-14T21:22:40.679Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch1
request = Message { header: Header { version: 22, message_id: 9 }, kind: MgsRequest(SpState) }
|
| 529 | 2026-01-14T21:22:40.679Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch0
request = Message { header: Header { version: 22, message_id: 17 }, kind: MgsRequest(SpState) }
|
| 530 | 2026-01-14T21:22:40.679Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 33 }, kind: MgsRequest(SpState) }
|
| 531 | 2026-01-14T21:22:40.679Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 33 }, kind: MgsRequest(SpState) }
|
| 532 | 2026-01-14T21:22:40.785Z | DEBG | test_vpc_firewall: received state request
reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) }
slot = sidecar 0
|
| 533 | 2026-01-14T21:22:40.786Z | DEBG | test_vpc_firewall: received state request
reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) }
slot = sidecar 1
|
| 534 | 2026-01-14T21:22:40.786Z | DEBG | test_vpc_firewall: received state request
reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) }
slot = gimlet 0
|
| 535 | 2026-01-14T21:22:40.786Z | DEBG | test_vpc_firewall: received state request
reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) }
slot = gimlet 1
|
| 536 | 2026-01-14T21:22:40.791Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 17 }
interface = fake-switch0
response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
|
| 537 | 2026-01-14T21:22:40.792Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 9 }
interface = fake-switch1
response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
|
| 538 | 2026-01-14T21:22:40.792Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 33 }
interface = fake-sled0
response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
|
| 539 | 2026-01-14T21:22:40.792Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 33 }
interface = fake-sled1
response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
|
| 540 | 2026-01-14T21:22:40.798Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch0
request = Message { header: Header { version: 22, message_id: 18 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-0" }, offset: 0 }) }
|
| 541 | 2026-01-14T21:22:40.798Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch1
request = Message { header: Header { version: 22, message_id: 10 }, kind: MgsRequest(SpState) }
|
| 542 | 2026-01-14T21:22:40.798Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 34 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-1" }, offset: 0 }) }
|
| 543 | 2026-01-14T21:22:40.798Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 34 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-8" }, offset: 0 }) }
|
| 544 | 2026-01-14T21:22:40.799Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-0" }): asked for number of component details
num_details = 1
slot = sidecar 0
|
| 545 | 2026-01-14T21:22:40.799Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-0" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Southwest", kind: Temperature, value: Ok(41.789063) })
index = 0
slot = sidecar 0
|
| 546 | 2026-01-14T21:22:40.799Z | DEBG | test_vpc_firewall: received state request
reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) }
slot = sidecar 1
|
| 547 | 2026-01-14T21:22:40.799Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-1" }): asked for number of component details
num_details = 1
slot = gimlet 0
|
| 548 | 2026-01-14T21:22:40.799Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-1" }): asked for component details for a sensor
details = Measurement(Measurement { name: "South", kind: Temperature, value: Ok(42.5625) })
index = 0
slot = gimlet 0
|
| 549 | 2026-01-14T21:22:40.799Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-8" }): asked for number of component details
num_details = 1
slot = gimlet 1
|
| 550 | 2026-01-14T21:22:40.799Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-8" }): asked for component details for a sensor
details = Measurement(Measurement { name: "U2_N0", kind: Temperature, value: Ok(56.0) })
index = 0
slot = gimlet 1
|
| 551 | 2026-01-14T21:22:40.874Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 18 }
interface = fake-switch0
response = ComponentDetails(TlvPage { offset: 0, total: 1 })
|
| 552 | 2026-01-14T21:22:40.874Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 10 }
interface = fake-switch1
response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
|
| 553 | 2026-01-14T21:22:40.874Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 34 }
interface = fake-sled0
response = ComponentDetails(TlvPage { offset: 0, total: 1 })
|
| 554 | 2026-01-14T21:22:40.874Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 34 }
interface = fake-sled1
response = ComponentDetails(TlvPage { offset: 0, total: 1 })
|
| 555 | 2026-01-14T21:22:40.877Z | TRAC | test_vpc_firewall (sensor-poller): polled SP, no samples returned
chassis_type = Switch
num_samples = 0
sp_slot = 1
|
| 556 | 2026-01-14T21:22:40.886Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch0
request = Message { header: Header { version: 22, message_id: 19 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-1" }, offset: 0 }) }
|
| 557 | 2026-01-14T21:22:40.886Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 35 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-2" }, offset: 0 }) }
|
| 558 | 2026-01-14T21:22:40.887Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 35 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-46" }, offset: 0 }) }
|
| 559 | 2026-01-14T21:22:40.987Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-1" }): asked for number of component details
num_details = 1
slot = sidecar 0
|
| 560 | 2026-01-14T21:22:40.987Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-1" }): asked for component details for a sensor
details = Measurement(Measurement { name: "South", kind: Temperature, value: Err(DeviceError) })
index = 0
slot = sidecar 0
|
| 561 | 2026-01-14T21:22:40.987Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-2" }): asked for number of component details
num_details = 1
slot = gimlet 0
|
| 562 | 2026-01-14T21:22:40.987Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-2" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Southeast", kind: Temperature, value: Ok(41.570313) })
index = 0
slot = gimlet 0
|
| 563 | 2026-01-14T21:22:40.988Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-46" }): asked for number of component details
num_details = 1
slot = gimlet 1
|
| 564 | 2026-01-14T21:22:40.988Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-46" }): asked for component details for a sensor
details = Measurement(Measurement { name: "CPU", kind: Temperature, value: Ok(62.6) })
index = 0
slot = gimlet 1
|
| 565 | 2026-01-14T21:22:41.004Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 19 }
interface = fake-switch0
response = ComponentDetails(TlvPage { offset: 0, total: 1 })
|
| 566 | 2026-01-14T21:22:41.004Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 35 }
interface = fake-sled0
response = ComponentDetails(TlvPage { offset: 0, total: 1 })
|
| 567 | 2026-01-14T21:22:41.004Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 35 }
interface = fake-sled1
response = ComponentDetails(TlvPage { offset: 0, total: 1 })
|
| 568 | 2026-01-14T21:22:41.012Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch0
request = Message { header: Header { version: 22, message_id: 20 }, kind: MgsRequest(SpState) }
|
| 569 | 2026-01-14T21:22:41.012Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 36 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-0" }, offset: 0 }) }
|
| 570 | 2026-01-14T21:22:41.012Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 36 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-53" }, offset: 0 }) }
|
| 571 | 2026-01-14T21:22:41.017Z | DEBG | test_vpc_firewall: received state request
reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) }
slot = sidecar 0
|
| 572 | 2026-01-14T21:22:41.017Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-0" }): asked for number of component details
num_details = 1
slot = gimlet 0
|
| 573 | 2026-01-14T21:22:41.017Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-0" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Southwest", kind: Temperature, value: Err(DeviceError) })
index = 0
slot = gimlet 0
|
| 574 | 2026-01-14T21:22:41.018Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for number of component details
num_details = 6
slot = gimlet 1
|
| 575 | 2026-01-14T21:22:41.018Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Southeast", kind: Speed, value: Ok(2510.0) })
index = 0
slot = gimlet 1
|
| 576 | 2026-01-14T21:22:41.018Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Northeast", kind: Speed, value: Ok(2390.0) })
index = 1
slot = gimlet 1
|
| 577 | 2026-01-14T21:22:41.018Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor
details = Measurement(Measurement { name: "South", kind: Speed, value: Ok(2467.0) })
index = 2
slot = gimlet 1
|
| 578 | 2026-01-14T21:22:41.018Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor
details = Measurement(Measurement { name: "North", kind: Speed, value: Ok(2195.0) })
index = 3
slot = gimlet 1
|
| 579 | 2026-01-14T21:22:41.018Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Southwest", kind: Speed, value: Ok(2680.0) })
index = 4
slot = gimlet 1
|
| 580 | 2026-01-14T21:22:41.018Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Northwest", kind: Speed, value: Ok(2212.0) })
index = 5
slot = gimlet 1
|
| 581 | 2026-01-14T21:22:41.035Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 20 }
interface = fake-switch0
response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
|
| 582 | 2026-01-14T21:22:41.035Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 36 }
interface = fake-sled0
response = ComponentDetails(TlvPage { offset: 0, total: 1 })
|
| 583 | 2026-01-14T21:22:41.035Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 36 }
interface = fake-sled1
response = ComponentDetails(TlvPage { offset: 0, total: 6 })
|
| 584 | 2026-01-14T21:22:41.036Z | TRAC | test_vpc_firewall (sensor-poller): polled SP successfully
chassis_type = Switch
num_samples = 3
sp_slot = 0
|
| 585 | 2026-01-14T21:22:41.047Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 37 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-7" }, offset: 0 }) }
|
| 586 | 2026-01-14T21:22:41.047Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 37 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-0" }, offset: 0 }) }
|
| 587 | 2026-01-14T21:22:43.886Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-7" }): asked for number of component details
num_details = 4
slot = gimlet 0
|
| 588 | 2026-01-14T21:22:43.886Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor
details = Measurement(Measurement { name: "V12_U2A_A0", kind: Current, value: Ok(0.45898438) })
index = 0
slot = gimlet 0
|
| 589 | 2026-01-14T21:22:43.886Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor
details = Measurement(Measurement { name: "V3P3_U2A_A0", kind: Current, value: Ok(0.024414063) })
index = 1
slot = gimlet 0
|
| 590 | 2026-01-14T21:22:43.886Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor
details = Measurement(Measurement { name: "V12_U2A_A0", kind: Voltage, value: Ok(12.03125) })
index = 2
slot = gimlet 0
|
| 591 | 2026-01-14T21:22:43.886Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor
details = Measurement(Measurement { name: "V3P3_U2A_A0", kind: Voltage, value: Ok(3.328125) })
index = 3
slot = gimlet 0
|
| 592 | 2026-01-14T21:22:43.887Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-0" }): asked for number of component details
num_details = 1
slot = gimlet 1
|
| 593 | 2026-01-14T21:22:43.887Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-0" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Southwest", kind: Temperature, value: Ok(41.3629) })
index = 0
slot = gimlet 1
|
| 594 | 2026-01-14T21:22:43.916Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 2
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 37 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-7" }, offset: 0 }) }
|
| 595 | 2026-01-14T21:22:43.916Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 37 }
interface = fake-sled0
response = ComponentDetails(TlvPage { offset: 0, total: 4 })
|
| 596 | 2026-01-14T21:22:43.916Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 2
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 37 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-0" }, offset: 0 }) }
|
| 597 | 2026-01-14T21:22:43.916Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 37 }
interface = fake-sled1
response = ComponentDetails(TlvPage { offset: 0, total: 1 })
|
| 598 | 2026-01-14T21:22:43.918Z | TRAC | test_vpc_firewall (internal-dns-resolver): lookup_socket_v6 srv
dns_name = _nexus._tcp.control-plane.oxide.internal
|
| 599 | 2026-01-14T21:22:43.919Z | TRAC | test_vpc_firewall (sensor-poller): interval elapsed, polling SP...
chassis_type = Switch
sp_slot = 1
|
| 600 | 2026-01-14T21:22:43.919Z | TRAC | test_vpc_firewall (sensor-poller): interval elapsed, polling SP...
chassis_type = Switch
sp_slot = 0
|
| 601 | 2026-01-14T21:22:43.929Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch1
request = Message { header: Header { version: 22, message_id: 11 }, kind: MgsRequest(SpState) }
|
| 602 | 2026-01-14T21:22:43.929Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch0
request = Message { header: Header { version: 22, message_id: 21 }, kind: MgsRequest(SpState) }
|
| 603 | 2026-01-14T21:22:43.931Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 38 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-39" }, offset: 0 }) }
|
| 604 | 2026-01-14T21:22:43.931Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 38 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-2" }, offset: 0 }) }
|
| 605 | 2026-01-14T21:22:43.966Z | DEBG | test_vpc_firewall: received state request
reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) }
slot = sidecar 0
|
| 606 | 2026-01-14T21:22:43.966Z | DEBG | test_vpc_firewall: received state request
reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) }
slot = sidecar 1
|
| 607 | 2026-01-14T21:22:43.966Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-7" }): asked for number of component details
num_details = 4
slot = gimlet 0
|
| 608 | 2026-01-14T21:22:43.966Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor
details = Measurement(Measurement { name: "V12_U2A_A0", kind: Current, value: Ok(0.45898438) })
index = 0
slot = gimlet 0
|
| 609 | 2026-01-14T21:22:43.966Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor
details = Measurement(Measurement { name: "V3P3_U2A_A0", kind: Current, value: Ok(0.024414063) })
index = 1
slot = gimlet 0
|
| 610 | 2026-01-14T21:22:43.966Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor
details = Measurement(Measurement { name: "V12_U2A_A0", kind: Voltage, value: Ok(12.03125) })
index = 2
slot = gimlet 0
|
| 611 | 2026-01-14T21:22:43.966Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor
details = Measurement(Measurement { name: "V3P3_U2A_A0", kind: Voltage, value: Ok(3.328125) })
index = 3
slot = gimlet 0
|
| 612 | 2026-01-14T21:22:43.967Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-39" }): asked for number of component details
num_details = 1
slot = gimlet 0
|
| 613 | 2026-01-14T21:22:43.967Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-39" }): asked for component details for a sensor
details = Measurement(Measurement { name: "t6", kind: Temperature, value: Ok(70.625) })
index = 0
slot = gimlet 0
|
| 614 | 2026-01-14T21:22:43.967Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-0" }): asked for number of component details
num_details = 1
slot = gimlet 1
|
| 615 | 2026-01-14T21:22:43.967Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-0" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Southwest", kind: Temperature, value: Ok(41.3629) })
index = 0
slot = gimlet 1
|
| 616 | 2026-01-14T21:22:43.967Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-2" }): asked for number of component details
num_details = 1
slot = gimlet 1
|
| 617 | 2026-01-14T21:22:43.967Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-2" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Southeast", kind: Temperature, value: Ok(41.570313) })
index = 0
slot = gimlet 1
|
| 618 | 2026-01-14T21:22:44.154Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 21 }
interface = fake-switch0
response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
|
| 619 | 2026-01-14T21:22:44.155Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 11 }
interface = fake-switch1
response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
|
| 620 | 2026-01-14T21:22:44.155Z | DEBG | test_vpc_firewall (ManagementSwitch): ignoring unexpected response
id = 37
interface = fake-sled0
peer = [::1]:37600
|
| 621 | 2026-01-14T21:22:44.155Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 2
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 38 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-39" }, offset: 0 }) }
|
| 622 | 2026-01-14T21:22:44.155Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 38 }
interface = fake-sled0
response = ComponentDetails(TlvPage { offset: 0, total: 1 })
|
| 623 | 2026-01-14T21:22:44.156Z | DEBG | test_vpc_firewall (ManagementSwitch): ignoring unexpected response
id = 37
interface = fake-sled1
peer = [::1]:54292
|
| 624 | 2026-01-14T21:22:44.156Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 2
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 38 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-2" }, offset: 0 }) }
|
| 625 | 2026-01-14T21:22:44.156Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 38 }
interface = fake-sled1
response = ComponentDetails(TlvPage { offset: 0, total: 1 })
|
| 626 | 2026-01-14T21:22:44.207Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch0
request = Message { header: Header { version: 22, message_id: 22 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-0" }, offset: 0 }) }
|
| 627 | 2026-01-14T21:22:44.208Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch1
request = Message { header: Header { version: 22, message_id: 12 }, kind: MgsRequest(SpState) }
|
| 628 | 2026-01-14T21:22:44.210Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 39 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-46" }, offset: 0 }) }
|
| 629 | 2026-01-14T21:22:44.210Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 39 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-1" }, offset: 0 }) }
|
| 630 | 2026-01-14T21:22:44.404Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-0" }): asked for number of component details
num_details = 1
slot = sidecar 0
|
| 631 | 2026-01-14T21:22:44.404Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-0" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Southwest", kind: Temperature, value: Ok(41.789063) })
index = 0
slot = sidecar 0
|
| 632 | 2026-01-14T21:22:44.404Z | DEBG | test_vpc_firewall: received state request
reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) }
slot = sidecar 1
|
| 633 | 2026-01-14T21:22:44.404Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-39" }): asked for number of component details
num_details = 1
slot = gimlet 0
|
| 634 | 2026-01-14T21:22:44.404Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-39" }): asked for component details for a sensor
details = Measurement(Measurement { name: "t6", kind: Temperature, value: Ok(70.625) })
index = 0
slot = gimlet 0
|
| 635 | 2026-01-14T21:22:44.404Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-46" }): asked for number of component details
num_details = 1
slot = gimlet 0
|
| 636 | 2026-01-14T21:22:44.404Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-46" }): asked for component details for a sensor
details = Measurement(Measurement { name: "CPU", kind: Temperature, value: Ok(64.5) })
index = 0
slot = gimlet 0
|
| 637 | 2026-01-14T21:22:44.404Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-2" }): asked for number of component details
num_details = 1
slot = gimlet 1
|
| 638 | 2026-01-14T21:22:44.404Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-2" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Southeast", kind: Temperature, value: Ok(41.570313) })
index = 0
slot = gimlet 1
|
| 639 | 2026-01-14T21:22:44.404Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-1" }): asked for number of component details
num_details = 1
slot = gimlet 1
|
| 640 | 2026-01-14T21:22:44.404Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-1" }): asked for component details for a sensor
details = Measurement(Measurement { name: "South", kind: Temperature, value: Ok(42.5625) })
index = 0
slot = gimlet 1
|
| 641 | 2026-01-14T21:22:44.405Z | WARN | test_vpc_firewall (producer-registration-task): failed to register with Nexus, will retry
count = 4
delay = 6.841685144s
error = "proto error: io error: No route to host (os error 148)"
file = oximeter/producer/src/lib.rs:371
|
| 642 | 2026-01-14T21:22:44.413Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 22 }
interface = fake-switch0
response = ComponentDetails(TlvPage { offset: 0, total: 1 })
|
| 643 | 2026-01-14T21:22:44.413Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 12 }
interface = fake-switch1
response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
|
| 644 | 2026-01-14T21:22:44.413Z | DEBG | test_vpc_firewall (ManagementSwitch): ignoring unexpected response
id = 38
interface = fake-sled0
peer = [::1]:37600
|
| 645 | 2026-01-14T21:22:44.413Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 2
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 39 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-46" }, offset: 0 }) }
|
| 646 | 2026-01-14T21:22:44.413Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 39 }
interface = fake-sled0
response = ComponentDetails(TlvPage { offset: 0, total: 1 })
|
| 647 | 2026-01-14T21:22:44.413Z | DEBG | test_vpc_firewall (ManagementSwitch): ignoring unexpected response
id = 38
interface = fake-sled1
peer = [::1]:54292
|
| 648 | 2026-01-14T21:22:44.413Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 2
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 39 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-1" }, offset: 0 }) }
|
| 649 | 2026-01-14T21:22:44.413Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 39 }
interface = fake-sled1
response = ComponentDetails(TlvPage { offset: 0, total: 1 })
|
| 650 | 2026-01-14T21:22:44.413Z | INFO | test_vpc_firewall (dropshot): accepted connection
local_addr = [::1]:59250
remote_addr = [::1]:62232
|
| 651 | 2026-01-14T21:22:44.416Z | TRAC | test_vpc_firewall (sensor-poller): polled SP, no samples returned
chassis_type = Switch
num_samples = 0
sp_slot = 1
|
| 652 | 2026-01-14T21:22:44.425Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch0
request = Message { header: Header { version: 22, message_id: 23 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-1" }, offset: 0 }) }
|
| 653 | 2026-01-14T21:22:44.426Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 40 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-8" }, offset: 0 }) }
|
| 654 | 2026-01-14T21:22:44.426Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 40 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-7" }, offset: 0 }) }
|
| 655 | 2026-01-14T21:22:44.431Z | TRAC | test_vpc_firewall (dropshot): incoming request
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:62232
req_id = 1cfdb4b1-2f19-4c65-bed5-a5066cfa2193
uri = /ignition
|
| 656 | 2026-01-14T21:22:44.431Z | DEBG | test_vpc_firewall (dropshot): determined request API version
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:62232
req_id = 1cfdb4b1-2f19-4c65-bed5-a5066cfa2193
uri = /ignition
version = 3.0.0
|
| 657 | 2026-01-14T21:22:44.431Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-1" }): asked for number of component details
num_details = 1
slot = sidecar 0
|
| 658 | 2026-01-14T21:22:44.431Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-1" }): asked for component details for a sensor
details = Measurement(Measurement { name: "South", kind: Temperature, value: Err(DeviceError) })
index = 0
slot = sidecar 0
|
| 659 | 2026-01-14T21:22:44.432Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-46" }): asked for number of component details
num_details = 1
slot = gimlet 0
|
| 660 | 2026-01-14T21:22:44.432Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-46" }): asked for component details for a sensor
details = Measurement(Measurement { name: "CPU", kind: Temperature, value: Ok(64.5) })
index = 0
slot = gimlet 0
|
| 661 | 2026-01-14T21:22:44.432Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-8" }): asked for number of component details
num_details = 1
slot = gimlet 0
|
| 662 | 2026-01-14T21:22:44.432Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-8" }): asked for component details for a sensor
details = Measurement(Measurement { name: "U2_N0", kind: Temperature, value: Ok(56.0) })
index = 0
slot = gimlet 0
|
| 663 | 2026-01-14T21:22:44.432Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-1" }): asked for number of component details
num_details = 1
slot = gimlet 1
|
| 664 | 2026-01-14T21:22:44.432Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-1" }): asked for component details for a sensor
details = Measurement(Measurement { name: "South", kind: Temperature, value: Ok(42.5625) })
index = 0
slot = gimlet 1
|
| 665 | 2026-01-14T21:22:44.432Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-7" }): asked for number of component details
num_details = 4
slot = gimlet 1
|
| 666 | 2026-01-14T21:22:44.432Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor
details = Measurement(Measurement { name: "V12_U2A_A0", kind: Current, value: Ok(0.41893438) })
index = 0
slot = gimlet 1
|
| 667 | 2026-01-14T21:22:44.432Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor
details = Measurement(Measurement { name: "V3P3_U2A_A0", kind: Current, value: Ok(0.025614602) })
index = 1
slot = gimlet 1
|
| 668 | 2026-01-14T21:22:44.432Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor
details = Measurement(Measurement { name: "V12_U2A_A0", kind: Voltage, value: Ok(12.02914) })
index = 2
slot = gimlet 1
|
| 669 | 2026-01-14T21:22:44.432Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor
details = Measurement(Measurement { name: "V3P3_U2A_A0", kind: Voltage, value: Ok(3.2618) })
index = 3
slot = gimlet 1
|
| 670 | 2026-01-14T21:22:44.435Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 23 }
interface = fake-switch0
response = ComponentDetails(TlvPage { offset: 0, total: 1 })
|
| 671 | 2026-01-14T21:22:44.435Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch0
request = Message { header: Header { version: 22, message_id: 24 }, kind: MgsRequest(BulkIgnitionState { offset: 0 }) }
|
| 672 | 2026-01-14T21:22:44.436Z | DEBG | test_vpc_firewall (ManagementSwitch): ignoring unexpected response
id = 39
interface = fake-sled0
peer = [::1]:37600
|
| 673 | 2026-01-14T21:22:44.436Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 2
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 40 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-8" }, offset: 0 }) }
|
| 674 | 2026-01-14T21:22:44.436Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 40 }
interface = fake-sled0
response = ComponentDetails(TlvPage { offset: 0, total: 1 })
|
| 675 | 2026-01-14T21:22:44.436Z | DEBG | test_vpc_firewall (ManagementSwitch): ignoring unexpected response
id = 39
interface = fake-sled1
peer = [::1]:54292
|
| 676 | 2026-01-14T21:22:44.436Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 2
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 40 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-7" }, offset: 0 }) }
|
| 677 | 2026-01-14T21:22:44.436Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 40 }
interface = fake-sled1
response = ComponentDetails(TlvPage { offset: 0, total: 4 })
|
| 678 | 2026-01-14T21:22:44.447Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 41 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-53" }, offset: 0 }) }
|
| 679 | 2026-01-14T21:22:44.447Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 41 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-39" }, offset: 0 }) }
|
| 680 | 2026-01-14T21:22:44.452Z | DEBG | test_vpc_firewall: received bulk ignition state request
offset = 0
slot = sidecar 0
state = [IgnitionState { receiver: ReceiverStatus { aligned: true, locked: true, polarity_inverted: false }, target: Some(TargetState { system_type: Sidecar, power_state: On, power_reset_in_progress: false, faults: SystemFaults { power_a3: false, power_a2: false, sp: false, rot: false }, controller0_present: true, controller1_present: false, link0_receiver_status: ReceiverStatus { aligned: true, locked: true, polarity_inverted: false }, link1_receiver_status: ReceiverStatus { aligned: true, locked: true, polarity_inverted: false } }) }, IgnitionState { receiver: ReceiverStatus { aligned: true, locked: true, polarity_inverted: false }, target: Some(TargetState { system_type: Sidecar, power_state: On, power_reset_in_progress: false, faults: SystemFaults { power_a3: false, power_a2: false, sp: false, rot: false }, controller0_present: true, controller1_present: false, link0_receiver_status: ReceiverStatus { aligned: true, locked: true, polarity_inverted: false }, link1_receiver_status: ReceiverStatus { aligned: true, locked: true, polarity_inverted: false } }) }, IgnitionState { receiver: ReceiverStatus { aligned: true, locked: true, polarity_inverted: false }, target: Some(TargetState { system_type: Gimlet, power_state: On, power_reset_in_progress: false, faults: SystemFaults { power_a3: false, power_a2: false, sp: false, rot: false }, controller0_present: true, controller1_present: false, link0_receiver_status: ReceiverStatus { aligned: true, locked: true, polarity_inverted: false }, link1_receiver_status: ReceiverStatus { aligned: true, locked: true, polarity_inverted: false } }) }, IgnitionState { receiver: ReceiverStatus { aligned: true, locked: true, polarity_inverted: false }, target: Some(TargetState { system_type: Gimlet, power_state: On, power_reset_in_progress: false, faults: SystemFaults { power_a3: false, power_a2: false, sp: false, rot: false }, controller0_present: true, controller1_present: false, link0_receiver_status: ReceiverStatus { aligned: true, locked: true, polarity_inverted: false }, link1_receiver_status: ReceiverStatus { aligned: true, locked: true, polarity_inverted: false } }) }, IgnitionState { receiver: ReceiverStatus { aligned: false, locked: false, polarity_inverted: false }, target: None }, IgnitionState { receiver: ReceiverStatus { aligned: false, locked: false, polarity_inverted: false }, target: None }, IgnitionState { receiver: ReceiverStatus { aligned: false, locked: false, polarity_inverted: false }, target: None }, IgnitionState { receiver: ReceiverStatus { aligned: false, locked: false, polarity_inverted: false }, target: None }, IgnitionState { receiver: ReceiverStatus { aligned: false, locked: false, polarity_inverted: false }, target: None }, IgnitionState { receiver: ReceiverStatus { aligned: false, locked: false, polarity_inverted: false }, target: None }, IgnitionState { receiver: ReceiverStatus { aligned: false, locked: false, polarity_inverted: false }, target: None }, IgnitionState { receiver: ReceiverStatus { aligned: false, locked: false, polarity_inverted: false }, target: None }, IgnitionState { receiver: ReceiverStatus { aligned: false, locked: false, polarity_inverted: false }, target: None }, IgnitionState { receiver: ReceiverStatus { aligned: false, locked: false, polarity_inverted: false }, target: None }, IgnitionState { receiver: ReceiverStatus { aligned: false, locked: false, polarity_inverted: false }, target: None }, IgnitionState { receiver: ReceiverStatus { aligned: false, locked: false, polarity_inverted: false }, target: None }, IgnitionState { receiver: ReceiverStatus { aligned: false, locked: false, polarity_inverted: false }, target: None }, IgnitionState { receiver: ReceiverStatus { aligned: false, locked: false, polarity_inverted: false }, target: None }, IgnitionState { receiver: ReceiverStatus { aligned: false, locked: false, polarity_inverted: false }, target: None }, IgnitionState { receiver: ReceiverStatus { aligned: false, locked: false, polarity_inverted: false }, target: None }, IgnitionState { receiver: ReceiverStatus { aligned: false, locked: false, polarity_inverted: false }, target: None }, IgnitionState { receiver: ReceiverStatus { aligned: false, locked: false, polarity_inverted: false }, target: None }, IgnitionState { receiver: ReceiverStatus { aligned: false, locked: false, polarity_inverted: false }, target: None }, IgnitionState { receiver: ReceiverStatus { aligned: false, locked: false, polarity_inverted: false }, target: None }, IgnitionState { receiver: ReceiverStatus { aligned: false, locked: false, polarity_inverted: false }, target: None }, IgnitionState { receiver: ReceiverStatus { aligned: false, locked: false, polarity_inverted: false }, target: None }, IgnitionState { receiver: ReceiverStatus { aligned: false, locked: false, polarity_inverted: false }, target: None }, IgnitionState { receiver: ReceiverStatus { aligned: false, locked: false, polarity_inverted: false }, target: None }, IgnitionState { receiver: ReceiverStatus { aligned: false, locked: false, polarity_inverted: false }, target: None }, IgnitionState { receiver: ReceiverStatus { aligned: false, locked: false, polarity_inverted: false }, target: None }, IgnitionState { receiver: ReceiverStatus { aligned: false, locked: false, polarity_inverted: false }, target: None }, IgnitionState { receiver: ReceiverStatus { aligned: false, locked: false, polarity_inverted: false }, target: None }, IgnitionState { receiver: ReceiverStatus { aligned: false, locked: false, polarity_inverted: false }, target: None }, IgnitionState { receiver: ReceiverStatus { aligned: false, locked: false, polarity_inverted: false }, target: None }, IgnitionState { receiver: ReceiverStatus { aligned: false, locked: false, polarity_inverted: false }, target: None }]
|
| 681 | 2026-01-14T21:22:44.453Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-8" }): asked for number of component details
num_details = 1
slot = gimlet 0
|
| 682 | 2026-01-14T21:22:44.453Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-8" }): asked for component details for a sensor
details = Measurement(Measurement { name: "U2_N0", kind: Temperature, value: Ok(56.0) })
index = 0
slot = gimlet 0
|
| 683 | 2026-01-14T21:22:44.453Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for number of component details
num_details = 6
slot = gimlet 0
|
| 684 | 2026-01-14T21:22:44.453Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Southeast", kind: Speed, value: Ok(2607.0) })
index = 0
slot = gimlet 0
|
| 685 | 2026-01-14T21:22:44.453Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Northeast", kind: Speed, value: Ok(2476.0) })
index = 1
slot = gimlet 0
|
| 686 | 2026-01-14T21:22:44.453Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor
details = Measurement(Measurement { name: "South", kind: Speed, value: Ok(2553.0) })
index = 2
slot = gimlet 0
|
| 687 | 2026-01-14T21:22:44.453Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor
details = Measurement(Measurement { name: "North", kind: Speed, value: Ok(2265.0) })
index = 3
slot = gimlet 0
|
| 688 | 2026-01-14T21:22:44.453Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Southwest", kind: Speed, value: Ok(2649.0) })
index = 4
slot = gimlet 0
|
| 689 | 2026-01-14T21:22:44.453Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Northwest", kind: Speed, value: Ok(2275.0) })
index = 5
slot = gimlet 0
|
| 690 | 2026-01-14T21:22:44.453Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-7" }): asked for number of component details
num_details = 4
slot = gimlet 1
|
| 691 | 2026-01-14T21:22:44.453Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor
details = Measurement(Measurement { name: "V12_U2A_A0", kind: Current, value: Ok(0.41893438) })
index = 0
slot = gimlet 1
|
| 692 | 2026-01-14T21:22:44.453Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor
details = Measurement(Measurement { name: "V3P3_U2A_A0", kind: Current, value: Ok(0.025614602) })
index = 1
slot = gimlet 1
|
| 693 | 2026-01-14T21:22:44.453Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor
details = Measurement(Measurement { name: "V12_U2A_A0", kind: Voltage, value: Ok(12.02914) })
index = 2
slot = gimlet 1
|
| 694 | 2026-01-14T21:22:44.453Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor
details = Measurement(Measurement { name: "V3P3_U2A_A0", kind: Voltage, value: Ok(3.2618) })
index = 3
slot = gimlet 1
|
| 695 | 2026-01-14T21:22:44.454Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-39" }): asked for number of component details
num_details = 1
slot = gimlet 1
|
| 696 | 2026-01-14T21:22:44.454Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-39" }): asked for component details for a sensor
details = Measurement(Measurement { name: "t6", kind: Temperature, value: Ok(70.625) })
index = 0
slot = gimlet 1
|
| 697 | 2026-01-14T21:22:44.555Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 24 }
interface = fake-switch0
response = BulkIgnitionState(TlvPage { offset: 0, total: 35 })
|
| 698 | 2026-01-14T21:22:44.555Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch0
request = Message { header: Header { version: 22, message_id: 25 }, kind: MgsRequest(SpState) }
|
| 699 | 2026-01-14T21:22:44.555Z | DEBG | test_vpc_firewall (ManagementSwitch): ignoring unexpected response
id = 40
interface = fake-sled0
peer = [::1]:37600
|
| 700 | 2026-01-14T21:22:44.555Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 2
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 41 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-53" }, offset: 0 }) }
|
| 701 | 2026-01-14T21:22:44.555Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 41 }
interface = fake-sled0
response = ComponentDetails(TlvPage { offset: 0, total: 6 })
|
| 702 | 2026-01-14T21:22:44.555Z | DEBG | test_vpc_firewall (ManagementSwitch): ignoring unexpected response
id = 40
interface = fake-sled1
peer = [::1]:54292
|
| 703 | 2026-01-14T21:22:44.555Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 2
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 41 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-39" }, offset: 0 }) }
|
| 704 | 2026-01-14T21:22:44.555Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 41 }
interface = fake-sled1
response = ComponentDetails(TlvPage { offset: 0, total: 1 })
|
| 705 | 2026-01-14T21:22:44.556Z | WARN | test_vpc_firewall (ManagementSwitch): ignoring unknown ignition target 4 returned by ignition controller SP
|
| 706 | 2026-01-14T21:22:44.556Z | WARN | test_vpc_firewall (ManagementSwitch): ignoring unknown ignition target 5 returned by ignition controller SP
|
| 707 | 2026-01-14T21:22:44.556Z | WARN | test_vpc_firewall (ManagementSwitch): ignoring unknown ignition target 6 returned by ignition controller SP
|
| 708 | 2026-01-14T21:22:44.556Z | WARN | test_vpc_firewall (ManagementSwitch): ignoring unknown ignition target 7 returned by ignition controller SP
|
| 709 | 2026-01-14T21:22:44.556Z | WARN | test_vpc_firewall (ManagementSwitch): ignoring unknown ignition target 8 returned by ignition controller SP
|
| 710 | 2026-01-14T21:22:44.556Z | WARN | test_vpc_firewall (ManagementSwitch): ignoring unknown ignition target 9 returned by ignition controller SP
|
| 711 | 2026-01-14T21:22:44.556Z | WARN | test_vpc_firewall (ManagementSwitch): ignoring unknown ignition target 10 returned by ignition controller SP
|
| 712 | 2026-01-14T21:22:44.556Z | WARN | test_vpc_firewall (ManagementSwitch): ignoring unknown ignition target 11 returned by ignition controller SP
|
| 713 | 2026-01-14T21:22:44.556Z | WARN | test_vpc_firewall (ManagementSwitch): ignoring unknown ignition target 12 returned by ignition controller SP
|
| 714 | 2026-01-14T21:22:44.556Z | WARN | test_vpc_firewall (ManagementSwitch): ignoring unknown ignition target 13 returned by ignition controller SP
|
| 715 | 2026-01-14T21:22:44.556Z | WARN | test_vpc_firewall (ManagementSwitch): ignoring unknown ignition target 14 returned by ignition controller SP
|
| 716 | 2026-01-14T21:22:44.556Z | WARN | test_vpc_firewall (ManagementSwitch): ignoring unknown ignition target 15 returned by ignition controller SP
|
| 717 | 2026-01-14T21:22:44.556Z | WARN | test_vpc_firewall (ManagementSwitch): ignoring unknown ignition target 16 returned by ignition controller SP
|
| 718 | 2026-01-14T21:22:44.556Z | WARN | test_vpc_firewall (ManagementSwitch): ignoring unknown ignition target 17 returned by ignition controller SP
|
| 719 | 2026-01-14T21:22:44.556Z | WARN | test_vpc_firewall (ManagementSwitch): ignoring unknown ignition target 18 returned by ignition controller SP
|
| 720 | 2026-01-14T21:22:44.556Z | WARN | test_vpc_firewall (ManagementSwitch): ignoring unknown ignition target 19 returned by ignition controller SP
|
| 721 | 2026-01-14T21:22:44.557Z | WARN | test_vpc_firewall (ManagementSwitch): ignoring unknown ignition target 20 returned by ignition controller SP
|
| 722 | 2026-01-14T21:22:44.557Z | WARN | test_vpc_firewall (ManagementSwitch): ignoring unknown ignition target 21 returned by ignition controller SP
|
| 723 | 2026-01-14T21:22:44.557Z | WARN | test_vpc_firewall (ManagementSwitch): ignoring unknown ignition target 22 returned by ignition controller SP
|
| 724 | 2026-01-14T21:22:44.557Z | WARN | test_vpc_firewall (ManagementSwitch): ignoring unknown ignition target 23 returned by ignition controller SP
|
| 725 | 2026-01-14T21:22:44.557Z | WARN | test_vpc_firewall (ManagementSwitch): ignoring unknown ignition target 24 returned by ignition controller SP
|
| 726 | 2026-01-14T21:22:44.557Z | WARN | test_vpc_firewall (ManagementSwitch): ignoring unknown ignition target 25 returned by ignition controller SP
|
| 727 | 2026-01-14T21:22:44.557Z | WARN | test_vpc_firewall (ManagementSwitch): ignoring unknown ignition target 26 returned by ignition controller SP
|
| 728 | 2026-01-14T21:22:44.557Z | WARN | test_vpc_firewall (ManagementSwitch): ignoring unknown ignition target 27 returned by ignition controller SP
|
| 729 | 2026-01-14T21:22:44.557Z | WARN | test_vpc_firewall (ManagementSwitch): ignoring unknown ignition target 28 returned by ignition controller SP
|
| 730 | 2026-01-14T21:22:44.557Z | WARN | test_vpc_firewall (ManagementSwitch): ignoring unknown ignition target 29 returned by ignition controller SP
|
| 731 | 2026-01-14T21:22:44.557Z | WARN | test_vpc_firewall (ManagementSwitch): ignoring unknown ignition target 30 returned by ignition controller SP
|
| 732 | 2026-01-14T21:22:44.557Z | WARN | test_vpc_firewall (ManagementSwitch): ignoring unknown ignition target 31 returned by ignition controller SP
|
| 733 | 2026-01-14T21:22:44.557Z | WARN | test_vpc_firewall (ManagementSwitch): ignoring unknown ignition target 32 returned by ignition controller SP
|
| 734 | 2026-01-14T21:22:44.557Z | WARN | test_vpc_firewall (ManagementSwitch): ignoring unknown ignition target 33 returned by ignition controller SP
|
| 735 | 2026-01-14T21:22:44.557Z | WARN | test_vpc_firewall (ManagementSwitch): ignoring unknown ignition target 34 returned by ignition controller SP
|
| 736 | 2026-01-14T21:22:44.562Z | INFO | test_vpc_firewall (dropshot): request completed
latency_us = 130842
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:62232
req_id = 1cfdb4b1-2f19-4c65-bed5-a5066cfa2193
response_code = 200
uri = /ignition
|
| 737 | 2026-01-14T21:22:44.562Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 42 }, kind: MgsRequest(SpState) }
|
| 738 | 2026-01-14T21:22:44.562Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 42 }, kind: MgsRequest(SpState) }
|
| 739 | 2026-01-14T21:22:44.568Z | DEBG | test_vpc_firewall: received state request
reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) }
slot = sidecar 0
|
| 740 | 2026-01-14T21:22:44.569Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for number of component details
num_details = 6
slot = gimlet 0
|
| 741 | 2026-01-14T21:22:44.569Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Southeast", kind: Speed, value: Ok(2607.0) })
index = 0
slot = gimlet 0
|
| 742 | 2026-01-14T21:22:44.569Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Northeast", kind: Speed, value: Ok(2476.0) })
index = 1
slot = gimlet 0
|
| 743 | 2026-01-14T21:22:44.569Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor
details = Measurement(Measurement { name: "South", kind: Speed, value: Ok(2553.0) })
index = 2
slot = gimlet 0
|
| 744 | 2026-01-14T21:22:44.569Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor
details = Measurement(Measurement { name: "North", kind: Speed, value: Ok(2265.0) })
index = 3
slot = gimlet 0
|
| 745 | 2026-01-14T21:22:44.569Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Southwest", kind: Speed, value: Ok(2649.0) })
index = 4
slot = gimlet 0
|
| 746 | 2026-01-14T21:22:44.569Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Northwest", kind: Speed, value: Ok(2275.0) })
index = 5
slot = gimlet 0
|
| 747 | 2026-01-14T21:22:44.569Z | DEBG | test_vpc_firewall: received state request
reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) }
slot = gimlet 0
|
| 748 | 2026-01-14T21:22:44.569Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-39" }): asked for number of component details
num_details = 1
slot = gimlet 1
|
| 749 | 2026-01-14T21:22:44.569Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-39" }): asked for component details for a sensor
details = Measurement(Measurement { name: "t6", kind: Temperature, value: Ok(70.625) })
index = 0
slot = gimlet 1
|
| 750 | 2026-01-14T21:22:44.569Z | DEBG | test_vpc_firewall: received state request
reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) }
slot = gimlet 1
|
| 751 | 2026-01-14T21:22:44.587Z | TRAC | test_vpc_firewall (dropshot): incoming request
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:62232
req_id = ce846b15-de3e-483e-8675-13318dfc0db7
uri = /sp/switch/0
|
| 752 | 2026-01-14T21:22:44.587Z | DEBG | test_vpc_firewall (dropshot): determined request API version
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:62232
req_id = ce846b15-de3e-483e-8675-13318dfc0db7
uri = /sp/switch/0
version = 3.0.0
|
| 753 | 2026-01-14T21:22:44.587Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 25 }
interface = fake-switch0
response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
|
| 754 | 2026-01-14T21:22:44.588Z | DEBG | test_vpc_firewall (ManagementSwitch): ignoring unexpected response
id = 41
interface = fake-sled0
peer = [::1]:37600
|
| 755 | 2026-01-14T21:22:44.588Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 2
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 42 }, kind: MgsRequest(SpState) }
|
| 756 | 2026-01-14T21:22:44.588Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 42 }
interface = fake-sled0
response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
|
| 757 | 2026-01-14T21:22:44.588Z | DEBG | test_vpc_firewall (ManagementSwitch): ignoring unexpected response
id = 41
interface = fake-sled1
peer = [::1]:54292
|
| 758 | 2026-01-14T21:22:44.588Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 2
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 42 }, kind: MgsRequest(SpState) }
|
| 759 | 2026-01-14T21:22:44.588Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 42 }
interface = fake-sled1
response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
|
| 760 | 2026-01-14T21:22:44.589Z | TRAC | test_vpc_firewall (sensor-poller): polled SP successfully
chassis_type = Switch
num_samples = 3
sp_slot = 0
|
| 761 | 2026-01-14T21:22:44.589Z | TRAC | test_vpc_firewall (sensor-poller): polled SP successfully
chassis_type = Sled
num_samples = 17
sp_slot = 0
|
| 762 | 2026-01-14T21:22:44.589Z | TRAC | test_vpc_firewall (sensor-poller): interval elapsed, polling SP...
chassis_type = Sled
sp_slot = 0
|
| 763 | 2026-01-14T21:22:44.589Z | TRAC | test_vpc_firewall (sensor-poller): polled SP successfully
chassis_type = Sled
num_samples = 16
sp_slot = 1
|
| 764 | 2026-01-14T21:22:44.589Z | TRAC | test_vpc_firewall (sensor-poller): interval elapsed, polling SP...
chassis_type = Sled
sp_slot = 1
|
| 765 | 2026-01-14T21:22:44.589Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch0
request = Message { header: Header { version: 22, message_id: 26 }, kind: MgsRequest(SpState) }
|
| 766 | 2026-01-14T21:22:44.589Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 43 }, kind: MgsRequest(SpState) }
|
| 767 | 2026-01-14T21:22:44.589Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 43 }, kind: MgsRequest(SpState) }
|
| 768 | 2026-01-14T21:22:45.486Z | DEBG | test_vpc_firewall: received state request
reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) }
slot = sidecar 0
|
| 769 | 2026-01-14T21:22:45.486Z | DEBG | test_vpc_firewall: received state request
reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) }
slot = gimlet 0
|
| 770 | 2026-01-14T21:22:45.486Z | DEBG | test_vpc_firewall: received state request
reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) }
slot = gimlet 0
|
| 771 | 2026-01-14T21:22:45.486Z | DEBG | test_vpc_firewall: received state request
reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) }
slot = gimlet 1
|
| 772 | 2026-01-14T21:22:45.487Z | DEBG | test_vpc_firewall: received state request
reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) }
slot = gimlet 1
|
| 773 | 2026-01-14T21:22:45.488Z | TRAC | test_vpc_firewall (sensor-poller): interval elapsed, polling SP...
chassis_type = Switch
sp_slot = 1
|
| 774 | 2026-01-14T21:22:45.488Z | TRAC | test_vpc_firewall (sensor-poller): interval elapsed, polling SP...
chassis_type = Switch
sp_slot = 0
|
| 775 | 2026-01-14T21:22:45.491Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch1
request = Message { header: Header { version: 22, message_id: 13 }, kind: MgsRequest(SpState) }
|
| 776 | 2026-01-14T21:22:45.497Z | DEBG | test_vpc_firewall: received state request
reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) }
slot = sidecar 1
|
| 777 | 2026-01-14T21:22:45.498Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 26 }
interface = fake-switch0
response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
|
| 778 | 2026-01-14T21:22:45.498Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch0
request = Message { header: Header { version: 22, message_id: 27 }, kind: MgsRequest(SpState) }
|
| 779 | 2026-01-14T21:22:45.498Z | DEBG | test_vpc_firewall (ManagementSwitch): ignoring unexpected response
id = 42
interface = fake-sled0
peer = [::1]:37600
|
| 780 | 2026-01-14T21:22:45.498Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 2
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 43 }, kind: MgsRequest(SpState) }
|
| 781 | 2026-01-14T21:22:45.498Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 43 }
interface = fake-sled0
response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
|
| 782 | 2026-01-14T21:22:45.498Z | DEBG | test_vpc_firewall (ManagementSwitch): ignoring unexpected response
id = 42
interface = fake-sled1
peer = [::1]:54292
|
| 783 | 2026-01-14T21:22:45.498Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 2
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 43 }, kind: MgsRequest(SpState) }
|
| 784 | 2026-01-14T21:22:45.498Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 43 }
interface = fake-sled1
response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
|
| 785 | 2026-01-14T21:22:45.500Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 44 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-1" }, offset: 0 }) }
|
| 786 | 2026-01-14T21:22:45.500Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 44 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-8" }, offset: 0 }) }
|
| 787 | 2026-01-14T21:22:45.537Z | DEBG | test_vpc_firewall: received state request
reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) }
slot = sidecar 0
|
| 788 | 2026-01-14T21:22:45.537Z | DEBG | test_vpc_firewall: received state request
reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) }
slot = gimlet 0
|
| 789 | 2026-01-14T21:22:45.537Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-1" }): asked for number of component details
num_details = 1
slot = gimlet 0
|
| 790 | 2026-01-14T21:22:45.537Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-1" }): asked for component details for a sensor
details = Measurement(Measurement { name: "South", kind: Temperature, value: Ok(42.5625) })
index = 0
slot = gimlet 0
|
| 791 | 2026-01-14T21:22:45.537Z | DEBG | test_vpc_firewall: received state request
reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) }
slot = gimlet 1
|
| 792 | 2026-01-14T21:22:45.537Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-8" }): asked for number of component details
num_details = 1
slot = gimlet 1
|
| 793 | 2026-01-14T21:22:45.537Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-8" }): asked for component details for a sensor
details = Measurement(Measurement { name: "U2_N0", kind: Temperature, value: Ok(56.0) })
index = 0
slot = gimlet 1
|
| 794 | 2026-01-14T21:22:45.537Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 13 }
interface = fake-switch1
response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
|
| 795 | 2026-01-14T21:22:45.540Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch1
request = Message { header: Header { version: 22, message_id: 14 }, kind: MgsRequest(SpState) }
|
| 796 | 2026-01-14T21:22:45.568Z | DEBG | test_vpc_firewall: received state request
reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) }
slot = sidecar 1
|
| 797 | 2026-01-14T21:22:45.569Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 27 }
interface = fake-switch0
response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
|
| 798 | 2026-01-14T21:22:45.569Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch0
request = Message { header: Header { version: 22, message_id: 28 }, kind: MgsRequest(VersionedRotBootInfo { version: 3 }) }
|
| 799 | 2026-01-14T21:22:45.569Z | DEBG | test_vpc_firewall (ManagementSwitch): ignoring unexpected response
id = 43
interface = fake-sled0
peer = [::1]:37600
|
| 800 | 2026-01-14T21:22:45.569Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 2
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 44 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-1" }, offset: 0 }) }
|
| 801 | 2026-01-14T21:22:45.569Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 44 }
interface = fake-sled0
response = ComponentDetails(TlvPage { offset: 0, total: 1 })
|
| 802 | 2026-01-14T21:22:45.569Z | DEBG | test_vpc_firewall (ManagementSwitch): ignoring unexpected response
id = 43
interface = fake-sled1
peer = [::1]:54292
|
| 803 | 2026-01-14T21:22:45.569Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 2
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 44 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-8" }, offset: 0 }) }
|
| 804 | 2026-01-14T21:22:45.569Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 44 }
interface = fake-sled1
response = ComponentDetails(TlvPage { offset: 0, total: 1 })
|
| 805 | 2026-01-14T21:22:45.571Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 45 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-2" }, offset: 0 }) }
|
| 806 | 2026-01-14T21:22:45.571Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 45 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-46" }, offset: 0 }) }
|
| 807 | 2026-01-14T21:22:45.572Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-1" }): asked for number of component details
num_details = 1
slot = gimlet 0
|
| 808 | 2026-01-14T21:22:45.572Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-1" }): asked for component details for a sensor
details = Measurement(Measurement { name: "South", kind: Temperature, value: Ok(42.5625) })
index = 0
slot = gimlet 0
|
| 809 | 2026-01-14T21:22:45.572Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-2" }): asked for number of component details
num_details = 1
slot = gimlet 0
|
| 810 | 2026-01-14T21:22:45.572Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-2" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Southeast", kind: Temperature, value: Ok(41.570313) })
index = 0
slot = gimlet 0
|
| 811 | 2026-01-14T21:22:45.572Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-8" }): asked for number of component details
num_details = 1
slot = gimlet 1
|
| 812 | 2026-01-14T21:22:45.572Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-8" }): asked for component details for a sensor
details = Measurement(Measurement { name: "U2_N0", kind: Temperature, value: Ok(56.0) })
index = 0
slot = gimlet 1
|
| 813 | 2026-01-14T21:22:45.572Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-46" }): asked for number of component details
num_details = 1
slot = gimlet 1
|
| 814 | 2026-01-14T21:22:45.572Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-46" }): asked for component details for a sensor
details = Measurement(Measurement { name: "CPU", kind: Temperature, value: Ok(62.6) })
index = 0
slot = gimlet 1
|
| 815 | 2026-01-14T21:22:45.572Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 14 }
interface = fake-switch1
response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
|
| 816 | 2026-01-14T21:22:45.572Z | TRAC | test_vpc_firewall (sensor-poller): polled SP, no samples returned
chassis_type = Switch
num_samples = 0
sp_slot = 1
|
| 817 | 2026-01-14T21:22:45.572Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 28 }
interface = fake-switch0
response = RotBootInfo(V3(RotStateV3 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_fwid: Sha3_256([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_fwid: Sha3_256([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]), stage0_fwid: Sha3_256([204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204]), stage0next_fwid: Sha3_256([221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221]), slot_a_status: Ok(()), slot_b_status: Ok(()), stage0_status: Ok(()), stage0next_status: Ok(()) }))
|
| 818 | 2026-01-14T21:22:45.573Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch0
request = Message { header: Header { version: 22, message_id: 29 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-0" }, offset: 0 }) }
|
| 819 | 2026-01-14T21:22:45.573Z | DEBG | test_vpc_firewall (ManagementSwitch): ignoring unexpected response
id = 44
interface = fake-sled0
peer = [::1]:37600
|
| 820 | 2026-01-14T21:22:45.573Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 2
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 45 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-2" }, offset: 0 }) }
|
| 821 | 2026-01-14T21:22:45.573Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 45 }
interface = fake-sled0
response = ComponentDetails(TlvPage { offset: 0, total: 1 })
|
| 822 | 2026-01-14T21:22:45.573Z | DEBG | test_vpc_firewall (ManagementSwitch): ignoring unexpected response
id = 44
interface = fake-sled1
peer = [::1]:54292
|
| 823 | 2026-01-14T21:22:45.573Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 2
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 45 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-46" }, offset: 0 }) }
|
| 824 | 2026-01-14T21:22:45.573Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 45 }
interface = fake-sled1
response = ComponentDetails(TlvPage { offset: 0, total: 1 })
|
| 825 | 2026-01-14T21:22:45.577Z | INFO | test_vpc_firewall (dropshot): request completed
latency_us = 990051
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:62232
req_id = ce846b15-de3e-483e-8675-13318dfc0db7
response_code = 200
uri = /sp/switch/0
|
| 826 | 2026-01-14T21:22:45.577Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 46 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-0" }, offset: 0 }) }
|
| 827 | 2026-01-14T21:22:45.577Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 46 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-53" }, offset: 0 }) }
|
| 828 | 2026-01-14T21:22:45.589Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-0" }): asked for number of component details
num_details = 1
slot = sidecar 0
|
| 829 | 2026-01-14T21:22:45.589Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-0" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Southwest", kind: Temperature, value: Ok(41.789063) })
index = 0
slot = sidecar 0
|
| 830 | 2026-01-14T21:22:45.590Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-2" }): asked for number of component details
num_details = 1
slot = gimlet 0
|
| 831 | 2026-01-14T21:22:45.590Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-2" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Southeast", kind: Temperature, value: Ok(41.570313) })
index = 0
slot = gimlet 0
|
| 832 | 2026-01-14T21:22:45.590Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-0" }): asked for number of component details
num_details = 1
slot = gimlet 0
|
| 833 | 2026-01-14T21:22:45.590Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-0" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Southwest", kind: Temperature, value: Err(DeviceError) })
index = 0
slot = gimlet 0
|
| 834 | 2026-01-14T21:22:45.590Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-46" }): asked for number of component details
num_details = 1
slot = gimlet 1
|
| 835 | 2026-01-14T21:22:45.590Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-46" }): asked for component details for a sensor
details = Measurement(Measurement { name: "CPU", kind: Temperature, value: Ok(62.6) })
index = 0
slot = gimlet 1
|
| 836 | 2026-01-14T21:22:45.590Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for number of component details
num_details = 6
slot = gimlet 1
|
| 837 | 2026-01-14T21:22:45.590Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Southeast", kind: Speed, value: Ok(2510.0) })
index = 0
slot = gimlet 1
|
| 838 | 2026-01-14T21:22:45.590Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Northeast", kind: Speed, value: Ok(2390.0) })
index = 1
slot = gimlet 1
|
| 839 | 2026-01-14T21:22:45.590Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor
details = Measurement(Measurement { name: "South", kind: Speed, value: Ok(2467.0) })
index = 2
slot = gimlet 1
|
| 840 | 2026-01-14T21:22:45.590Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor
details = Measurement(Measurement { name: "North", kind: Speed, value: Ok(2195.0) })
index = 3
slot = gimlet 1
|
| 841 | 2026-01-14T21:22:45.590Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Southwest", kind: Speed, value: Ok(2680.0) })
index = 4
slot = gimlet 1
|
| 842 | 2026-01-14T21:22:45.590Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Northwest", kind: Speed, value: Ok(2212.0) })
index = 5
slot = gimlet 1
|
| 843 | 2026-01-14T21:22:45.596Z | TRAC | test_vpc_firewall (dropshot): incoming request
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:62232
req_id = 18750ca9-410d-487e-9745-96614b124d77
uri = /sp/switch/0/component/sp/caboose?firmware_slot=0
|
| 844 | 2026-01-14T21:22:45.596Z | DEBG | test_vpc_firewall (dropshot): determined request API version
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:62232
req_id = 18750ca9-410d-487e-9745-96614b124d77
uri = /sp/switch/0/component/sp/caboose?firmware_slot=0
version = 3.0.0
|
| 845 | 2026-01-14T21:22:45.596Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 29 }
interface = fake-switch0
response = ComponentDetails(TlvPage { offset: 0, total: 1 })
|
| 846 | 2026-01-14T21:22:45.596Z | DEBG | test_vpc_firewall (ManagementSwitch): ignoring unexpected response
id = 45
interface = fake-sled0
peer = [::1]:37600
|
| 847 | 2026-01-14T21:22:45.596Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 2
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 46 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-0" }, offset: 0 }) }
|
| 848 | 2026-01-14T21:22:45.596Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 46 }
interface = fake-sled0
response = ComponentDetails(TlvPage { offset: 0, total: 1 })
|
| 849 | 2026-01-14T21:22:45.596Z | DEBG | test_vpc_firewall (ManagementSwitch): ignoring unexpected response
id = 45
interface = fake-sled1
peer = [::1]:54292
|
| 850 | 2026-01-14T21:22:45.596Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 2
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 46 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-53" }, offset: 0 }) }
|
| 851 | 2026-01-14T21:22:45.596Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 46 }
interface = fake-sled1
response = ComponentDetails(TlvPage { offset: 0, total: 6 })
|
| 852 | 2026-01-14T21:22:45.596Z | TRAC | test_vpc_firewall (sensor-poller): interval elapsed, polling SP...
chassis_type = Switch
sp_slot = 1
|
| 853 | 2026-01-14T21:22:45.604Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch1
request = Message { header: Header { version: 22, message_id: 15 }, kind: MgsRequest(SpState) }
|
| 854 | 2026-01-14T21:22:45.604Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch0
request = Message { header: Header { version: 22, message_id: 30 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "sp" }, slot: 0, key: [71, 73, 84, 67] }) }
|
| 855 | 2026-01-14T21:22:45.604Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 47 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-7" }, offset: 0 }) }
|
| 856 | 2026-01-14T21:22:45.604Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 47 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-0" }, offset: 0 }) }
|
| 857 | 2026-01-14T21:22:45.608Z | DEBG | test_vpc_firewall: received state request
reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) }
slot = sidecar 1
|
| 858 | 2026-01-14T21:22:45.609Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-0" }): asked for number of component details
num_details = 1
slot = gimlet 0
|
| 859 | 2026-01-14T21:22:45.609Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-0" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Southwest", kind: Temperature, value: Err(DeviceError) })
index = 0
slot = gimlet 0
|
| 860 | 2026-01-14T21:22:45.609Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-7" }): asked for number of component details
num_details = 4
slot = gimlet 0
|
| 861 | 2026-01-14T21:22:45.609Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor
details = Measurement(Measurement { name: "V12_U2A_A0", kind: Current, value: Ok(0.45898438) })
index = 0
slot = gimlet 0
|
| 862 | 2026-01-14T21:22:45.609Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor
details = Measurement(Measurement { name: "V3P3_U2A_A0", kind: Current, value: Ok(0.024414063) })
index = 1
slot = gimlet 0
|
| 863 | 2026-01-14T21:22:45.609Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor
details = Measurement(Measurement { name: "V12_U2A_A0", kind: Voltage, value: Ok(12.03125) })
index = 2
slot = gimlet 0
|
| 864 | 2026-01-14T21:22:45.609Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor
details = Measurement(Measurement { name: "V3P3_U2A_A0", kind: Voltage, value: Ok(3.328125) })
index = 3
slot = gimlet 0
|
| 865 | 2026-01-14T21:22:45.609Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for number of component details
num_details = 6
slot = gimlet 1
|
| 866 | 2026-01-14T21:22:45.609Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Southeast", kind: Speed, value: Ok(2510.0) })
index = 0
slot = gimlet 1
|
| 867 | 2026-01-14T21:22:45.609Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Northeast", kind: Speed, value: Ok(2390.0) })
index = 1
slot = gimlet 1
|
| 868 | 2026-01-14T21:22:45.609Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor
details = Measurement(Measurement { name: "South", kind: Speed, value: Ok(2467.0) })
index = 2
slot = gimlet 1
|
| 869 | 2026-01-14T21:22:45.609Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor
details = Measurement(Measurement { name: "North", kind: Speed, value: Ok(2195.0) })
index = 3
slot = gimlet 1
|
| 870 | 2026-01-14T21:22:45.609Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Southwest", kind: Speed, value: Ok(2680.0) })
index = 4
slot = gimlet 1
|
| 871 | 2026-01-14T21:22:45.609Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Northwest", kind: Speed, value: Ok(2212.0) })
index = 5
slot = gimlet 1
|
| 872 | 2026-01-14T21:22:45.609Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-0" }): asked for number of component details
num_details = 1
slot = gimlet 1
|
| 873 | 2026-01-14T21:22:45.609Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-0" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Southwest", kind: Temperature, value: Ok(41.3629) })
index = 0
slot = gimlet 1
|
| 874 | 2026-01-14T21:22:45.609Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 30 }
interface = fake-switch0
response = CabooseValue
|
| 875 | 2026-01-14T21:22:45.609Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch0
request = Message { header: Header { version: 22, message_id: 31 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-1" }, offset: 0 }) }
|
| 876 | 2026-01-14T21:22:45.611Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 15 }
interface = fake-switch1
response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
|
| 877 | 2026-01-14T21:22:45.611Z | DEBG | test_vpc_firewall (ManagementSwitch): ignoring unexpected response
id = 46
interface = fake-sled0
peer = [::1]:37600
|
| 878 | 2026-01-14T21:22:45.611Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 2
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 47 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-7" }, offset: 0 }) }
|
| 879 | 2026-01-14T21:22:45.611Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 47 }
interface = fake-sled0
response = ComponentDetails(TlvPage { offset: 0, total: 4 })
|
| 880 | 2026-01-14T21:22:45.611Z | DEBG | test_vpc_firewall (ManagementSwitch): ignoring unexpected response
id = 46
interface = fake-sled1
peer = [::1]:54292
|
| 881 | 2026-01-14T21:22:45.611Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 2
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 47 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-0" }, offset: 0 }) }
|
| 882 | 2026-01-14T21:22:45.611Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 47 }
interface = fake-sled1
response = ComponentDetails(TlvPage { offset: 0, total: 1 })
|
| 883 | 2026-01-14T21:22:45.615Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch1
request = Message { header: Header { version: 22, message_id: 16 }, kind: MgsRequest(SpState) }
|
| 884 | 2026-01-14T21:22:45.615Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 48 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-39" }, offset: 0 }) }
|
| 885 | 2026-01-14T21:22:45.615Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 48 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-2" }, offset: 0 }) }
|
| 886 | 2026-01-14T21:22:45.641Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-1" }): asked for number of component details
num_details = 1
slot = sidecar 0
|
| 887 | 2026-01-14T21:22:45.642Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-1" }): asked for component details for a sensor
details = Measurement(Measurement { name: "South", kind: Temperature, value: Err(DeviceError) })
index = 0
slot = sidecar 0
|
| 888 | 2026-01-14T21:22:45.642Z | DEBG | test_vpc_firewall: received state request
reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) }
slot = sidecar 1
|
| 889 | 2026-01-14T21:22:45.642Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-7" }): asked for number of component details
num_details = 4
slot = gimlet 0
|
| 890 | 2026-01-14T21:22:45.642Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor
details = Measurement(Measurement { name: "V12_U2A_A0", kind: Current, value: Ok(0.45898438) })
index = 0
slot = gimlet 0
|
| 891 | 2026-01-14T21:22:45.642Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor
details = Measurement(Measurement { name: "V3P3_U2A_A0", kind: Current, value: Ok(0.024414063) })
index = 1
slot = gimlet 0
|
| 892 | 2026-01-14T21:22:45.642Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor
details = Measurement(Measurement { name: "V12_U2A_A0", kind: Voltage, value: Ok(12.03125) })
index = 2
slot = gimlet 0
|
| 893 | 2026-01-14T21:22:45.642Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor
details = Measurement(Measurement { name: "V3P3_U2A_A0", kind: Voltage, value: Ok(3.328125) })
index = 3
slot = gimlet 0
|
| 894 | 2026-01-14T21:22:45.642Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-39" }): asked for number of component details
num_details = 1
slot = gimlet 0
|
| 895 | 2026-01-14T21:22:45.642Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-39" }): asked for component details for a sensor
details = Measurement(Measurement { name: "t6", kind: Temperature, value: Ok(70.625) })
index = 0
slot = gimlet 0
|
| 896 | 2026-01-14T21:22:45.642Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-0" }): asked for number of component details
num_details = 1
slot = gimlet 1
|
| 897 | 2026-01-14T21:22:45.642Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-0" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Southwest", kind: Temperature, value: Ok(41.3629) })
index = 0
slot = gimlet 1
|
| 898 | 2026-01-14T21:22:45.642Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-2" }): asked for number of component details
num_details = 1
slot = gimlet 1
|
| 899 | 2026-01-14T21:22:45.642Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-2" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Southeast", kind: Temperature, value: Ok(41.570313) })
index = 0
slot = gimlet 1
|
| 900 | 2026-01-14T21:22:45.642Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 31 }
interface = fake-switch0
response = ComponentDetails(TlvPage { offset: 0, total: 1 })
|
| 901 | 2026-01-14T21:22:45.642Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch0
request = Message { header: Header { version: 22, message_id: 32 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "sp" }, slot: 0, key: [66, 79, 82, 68] }) }
|
| 902 | 2026-01-14T21:22:45.643Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 16 }
interface = fake-switch1
response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
|
| 903 | 2026-01-14T21:22:45.644Z | DEBG | test_vpc_firewall (ManagementSwitch): ignoring unexpected response
id = 47
interface = fake-sled0
peer = [::1]:37600
|
| 904 | 2026-01-14T21:22:45.644Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 2
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 48 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-39" }, offset: 0 }) }
|
| 905 | 2026-01-14T21:22:45.644Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 48 }
interface = fake-sled0
response = ComponentDetails(TlvPage { offset: 0, total: 1 })
|
| 906 | 2026-01-14T21:22:45.644Z | DEBG | test_vpc_firewall (ManagementSwitch): ignoring unexpected response
id = 47
interface = fake-sled1
peer = [::1]:54292
|
| 907 | 2026-01-14T21:22:45.644Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 2
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 48 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-2" }, offset: 0 }) }
|
| 908 | 2026-01-14T21:22:45.644Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 48 }
interface = fake-sled1
response = ComponentDetails(TlvPage { offset: 0, total: 1 })
|
| 909 | 2026-01-14T21:22:45.647Z | TRAC | test_vpc_firewall (sensor-poller): polled SP, no samples returned
chassis_type = Switch
num_samples = 0
sp_slot = 1
|
| 910 | 2026-01-14T21:22:45.650Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 49 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-46" }, offset: 0 }) }
|
| 911 | 2026-01-14T21:22:45.650Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 49 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-1" }, offset: 0 }) }
|
| 912 | 2026-01-14T21:22:45.672Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-39" }): asked for number of component details
num_details = 1
slot = gimlet 0
|
| 913 | 2026-01-14T21:22:45.672Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-39" }): asked for component details for a sensor
details = Measurement(Measurement { name: "t6", kind: Temperature, value: Ok(70.625) })
index = 0
slot = gimlet 0
|
| 914 | 2026-01-14T21:22:45.672Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-46" }): asked for number of component details
num_details = 1
slot = gimlet 0
|
| 915 | 2026-01-14T21:22:45.672Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-46" }): asked for component details for a sensor
details = Measurement(Measurement { name: "CPU", kind: Temperature, value: Ok(64.5) })
index = 0
slot = gimlet 0
|
| 916 | 2026-01-14T21:22:45.672Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-2" }): asked for number of component details
num_details = 1
slot = gimlet 1
|
| 917 | 2026-01-14T21:22:45.672Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-2" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Southeast", kind: Temperature, value: Ok(41.570313) })
index = 0
slot = gimlet 1
|
| 918 | 2026-01-14T21:22:45.672Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-1" }): asked for number of component details
num_details = 1
slot = gimlet 1
|
| 919 | 2026-01-14T21:22:45.672Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-1" }): asked for component details for a sensor
details = Measurement(Measurement { name: "South", kind: Temperature, value: Ok(42.5625) })
index = 0
slot = gimlet 1
|
| 920 | 2026-01-14T21:22:45.673Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 32 }
interface = fake-switch0
response = CabooseValue
|
| 921 | 2026-01-14T21:22:45.673Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch0
request = Message { header: Header { version: 22, message_id: 33 }, kind: MgsRequest(SpState) }
|
| 922 | 2026-01-14T21:22:45.673Z | DEBG | test_vpc_firewall (ManagementSwitch): ignoring unexpected response
id = 48
interface = fake-sled0
peer = [::1]:37600
|
| 923 | 2026-01-14T21:22:45.673Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 2
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 49 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-46" }, offset: 0 }) }
|
| 924 | 2026-01-14T21:22:45.675Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 49 }
interface = fake-sled0
response = ComponentDetails(TlvPage { offset: 0, total: 1 })
|
| 925 | 2026-01-14T21:22:45.677Z | DEBG | test_vpc_firewall (ManagementSwitch): ignoring unexpected response
id = 48
interface = fake-sled1
peer = [::1]:54292
|
| 926 | 2026-01-14T21:22:45.677Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 2
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 49 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-1" }, offset: 0 }) }
|
| 927 | 2026-01-14T21:22:45.678Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 49 }
interface = fake-sled1
response = ComponentDetails(TlvPage { offset: 0, total: 1 })
|
| 928 | 2026-01-14T21:22:45.680Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 50 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-8" }, offset: 0 }) }
|
| 929 | 2026-01-14T21:22:45.680Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 50 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-7" }, offset: 0 }) }
|
| 930 | 2026-01-14T21:22:45.682Z | DEBG | test_vpc_firewall: received state request
reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) }
slot = sidecar 0
|
| 931 | 2026-01-14T21:22:45.682Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-46" }): asked for number of component details
num_details = 1
slot = gimlet 0
|
| 932 | 2026-01-14T21:22:45.682Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-46" }): asked for component details for a sensor
details = Measurement(Measurement { name: "CPU", kind: Temperature, value: Ok(64.5) })
index = 0
slot = gimlet 0
|
| 933 | 2026-01-14T21:22:45.682Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-8" }): asked for number of component details
num_details = 1
slot = gimlet 0
|
| 934 | 2026-01-14T21:22:45.682Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-8" }): asked for component details for a sensor
details = Measurement(Measurement { name: "U2_N0", kind: Temperature, value: Ok(56.0) })
index = 0
slot = gimlet 0
|
| 935 | 2026-01-14T21:22:45.682Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-1" }): asked for number of component details
num_details = 1
slot = gimlet 1
|
| 936 | 2026-01-14T21:22:45.682Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-1" }): asked for component details for a sensor
details = Measurement(Measurement { name: "South", kind: Temperature, value: Ok(42.5625) })
index = 0
slot = gimlet 1
|
| 937 | 2026-01-14T21:22:45.682Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-7" }): asked for number of component details
num_details = 4
slot = gimlet 1
|
| 938 | 2026-01-14T21:22:45.682Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor
details = Measurement(Measurement { name: "V12_U2A_A0", kind: Current, value: Ok(0.41893438) })
index = 0
slot = gimlet 1
|
| 939 | 2026-01-14T21:22:45.682Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor
details = Measurement(Measurement { name: "V3P3_U2A_A0", kind: Current, value: Ok(0.025614602) })
index = 1
slot = gimlet 1
|
| 940 | 2026-01-14T21:22:45.682Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor
details = Measurement(Measurement { name: "V12_U2A_A0", kind: Voltage, value: Ok(12.02914) })
index = 2
slot = gimlet 1
|
| 941 | 2026-01-14T21:22:45.682Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor
details = Measurement(Measurement { name: "V3P3_U2A_A0", kind: Voltage, value: Ok(3.2618) })
index = 3
slot = gimlet 1
|
| 942 | 2026-01-14T21:22:45.683Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 33 }
interface = fake-switch0
response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
|
| 943 | 2026-01-14T21:22:45.683Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch0
request = Message { header: Header { version: 22, message_id: 34 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "sp" }, slot: 0, key: [78, 65, 77, 69] }) }
|
| 944 | 2026-01-14T21:22:45.683Z | DEBG | test_vpc_firewall (ManagementSwitch): ignoring unexpected response
id = 49
interface = fake-sled0
peer = [::1]:37600
|
| 945 | 2026-01-14T21:22:45.683Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 2
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 50 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-8" }, offset: 0 }) }
|
| 946 | 2026-01-14T21:22:45.683Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 50 }
interface = fake-sled0
response = ComponentDetails(TlvPage { offset: 0, total: 1 })
|
| 947 | 2026-01-14T21:22:45.683Z | DEBG | test_vpc_firewall (ManagementSwitch): ignoring unexpected response
id = 49
interface = fake-sled1
peer = [::1]:54292
|
| 948 | 2026-01-14T21:22:45.683Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 2
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 50 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-7" }, offset: 0 }) }
|
| 949 | 2026-01-14T21:22:45.683Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 50 }
interface = fake-sled1
response = ComponentDetails(TlvPage { offset: 0, total: 4 })
|
| 950 | 2026-01-14T21:22:45.683Z | TRAC | test_vpc_firewall (sensor-poller): polled SP successfully
chassis_type = Switch
num_samples = 3
sp_slot = 0
|
| 951 | 2026-01-14T21:22:45.683Z | TRAC | test_vpc_firewall (sensor-poller): interval elapsed, polling SP...
chassis_type = Switch
sp_slot = 0
|
| 952 | 2026-01-14T21:22:45.687Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 51 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-53" }, offset: 0 }) }
|
| 953 | 2026-01-14T21:22:45.687Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 51 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-39" }, offset: 0 }) }
|
| 954 | 2026-01-14T21:22:45.694Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-8" }): asked for number of component details
num_details = 1
slot = gimlet 0
|
| 955 | 2026-01-14T21:22:45.694Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-8" }): asked for component details for a sensor
details = Measurement(Measurement { name: "U2_N0", kind: Temperature, value: Ok(56.0) })
index = 0
slot = gimlet 0
|
| 956 | 2026-01-14T21:22:45.694Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for number of component details
num_details = 6
slot = gimlet 0
|
| 957 | 2026-01-14T21:22:45.694Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Southeast", kind: Speed, value: Ok(2607.0) })
index = 0
slot = gimlet 0
|
| 958 | 2026-01-14T21:22:45.694Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Northeast", kind: Speed, value: Ok(2476.0) })
index = 1
slot = gimlet 0
|
| 959 | 2026-01-14T21:22:45.695Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor
details = Measurement(Measurement { name: "South", kind: Speed, value: Ok(2553.0) })
index = 2
slot = gimlet 0
|
| 960 | 2026-01-14T21:22:45.695Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor
details = Measurement(Measurement { name: "North", kind: Speed, value: Ok(2265.0) })
index = 3
slot = gimlet 0
|
| 961 | 2026-01-14T21:22:45.695Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Southwest", kind: Speed, value: Ok(2649.0) })
index = 4
slot = gimlet 0
|
| 962 | 2026-01-14T21:22:45.695Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Northwest", kind: Speed, value: Ok(2275.0) })
index = 5
slot = gimlet 0
|
| 963 | 2026-01-14T21:22:45.695Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-7" }): asked for number of component details
num_details = 4
slot = gimlet 1
|
| 964 | 2026-01-14T21:22:45.695Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor
details = Measurement(Measurement { name: "V12_U2A_A0", kind: Current, value: Ok(0.41893438) })
index = 0
slot = gimlet 1
|
| 965 | 2026-01-14T21:22:45.695Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor
details = Measurement(Measurement { name: "V3P3_U2A_A0", kind: Current, value: Ok(0.025614602) })
index = 1
slot = gimlet 1
|
| 966 | 2026-01-14T21:22:45.695Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor
details = Measurement(Measurement { name: "V12_U2A_A0", kind: Voltage, value: Ok(12.02914) })
index = 2
slot = gimlet 1
|
| 967 | 2026-01-14T21:22:45.695Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor
details = Measurement(Measurement { name: "V3P3_U2A_A0", kind: Voltage, value: Ok(3.2618) })
index = 3
slot = gimlet 1
|
| 968 | 2026-01-14T21:22:45.695Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-39" }): asked for number of component details
num_details = 1
slot = gimlet 1
|
| 969 | 2026-01-14T21:22:45.695Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-39" }): asked for component details for a sensor
details = Measurement(Measurement { name: "t6", kind: Temperature, value: Ok(70.625) })
index = 0
slot = gimlet 1
|
| 970 | 2026-01-14T21:22:45.696Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 34 }
interface = fake-switch0
response = CabooseValue
|
| 971 | 2026-01-14T21:22:45.696Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch0
request = Message { header: Header { version: 22, message_id: 35 }, kind: MgsRequest(SpState) }
|
| 972 | 2026-01-14T21:22:45.696Z | DEBG | test_vpc_firewall (ManagementSwitch): ignoring unexpected response
id = 50
interface = fake-sled0
peer = [::1]:37600
|
| 973 | 2026-01-14T21:22:45.696Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 2
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 51 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-53" }, offset: 0 }) }
|
| 974 | 2026-01-14T21:22:45.696Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 51 }
interface = fake-sled0
response = ComponentDetails(TlvPage { offset: 0, total: 6 })
|
| 975 | 2026-01-14T21:22:45.696Z | DEBG | test_vpc_firewall (ManagementSwitch): ignoring unexpected response
id = 50
interface = fake-sled1
peer = [::1]:54292
|
| 976 | 2026-01-14T21:22:45.696Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 2
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 51 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-39" }, offset: 0 }) }
|
| 977 | 2026-01-14T21:22:45.696Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 51 }
interface = fake-sled1
response = ComponentDetails(TlvPage { offset: 0, total: 1 })
|
| 978 | 2026-01-14T21:22:45.705Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 52 }, kind: MgsRequest(SpState) }
|
| 979 | 2026-01-14T21:22:45.705Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 52 }, kind: MgsRequest(SpState) }
|
| 980 | 2026-01-14T21:22:45.719Z | DEBG | test_vpc_firewall: received state request
reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) }
slot = sidecar 0
|
| 981 | 2026-01-14T21:22:45.719Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for number of component details
num_details = 6
slot = gimlet 0
|
| 982 | 2026-01-14T21:22:45.719Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Southeast", kind: Speed, value: Ok(2607.0) })
index = 0
slot = gimlet 0
|
| 983 | 2026-01-14T21:22:45.719Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Northeast", kind: Speed, value: Ok(2476.0) })
index = 1
slot = gimlet 0
|
| 984 | 2026-01-14T21:22:45.719Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor
details = Measurement(Measurement { name: "South", kind: Speed, value: Ok(2553.0) })
index = 2
slot = gimlet 0
|
| 985 | 2026-01-14T21:22:45.719Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor
details = Measurement(Measurement { name: "North", kind: Speed, value: Ok(2265.0) })
index = 3
slot = gimlet 0
|
| 986 | 2026-01-14T21:22:45.719Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Southwest", kind: Speed, value: Ok(2649.0) })
index = 4
slot = gimlet 0
|
| 987 | 2026-01-14T21:22:45.719Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Northwest", kind: Speed, value: Ok(2275.0) })
index = 5
slot = gimlet 0
|
| 988 | 2026-01-14T21:22:45.719Z | DEBG | test_vpc_firewall: received state request
reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) }
slot = gimlet 0
|
| 989 | 2026-01-14T21:22:45.719Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-39" }): asked for number of component details
num_details = 1
slot = gimlet 1
|
| 990 | 2026-01-14T21:22:45.719Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-39" }): asked for component details for a sensor
details = Measurement(Measurement { name: "t6", kind: Temperature, value: Ok(70.625) })
index = 0
slot = gimlet 1
|
| 991 | 2026-01-14T21:22:45.719Z | DEBG | test_vpc_firewall: received state request
reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) }
slot = gimlet 1
|
| 992 | 2026-01-14T21:22:45.721Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 35 }
interface = fake-switch0
response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
|
| 993 | 2026-01-14T21:22:45.721Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch0
request = Message { header: Header { version: 22, message_id: 36 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "sp" }, slot: 0, key: [86, 69, 82, 83] }) }
|
| 994 | 2026-01-14T21:22:45.721Z | DEBG | test_vpc_firewall (ManagementSwitch): ignoring unexpected response
id = 51
interface = fake-sled0
peer = [::1]:37600
|
| 995 | 2026-01-14T21:22:45.721Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 2
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 52 }, kind: MgsRequest(SpState) }
|
| 996 | 2026-01-14T21:22:45.721Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 52 }
interface = fake-sled0
response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
|
| 997 | 2026-01-14T21:22:45.722Z | DEBG | test_vpc_firewall (ManagementSwitch): ignoring unexpected response
id = 51
interface = fake-sled1
peer = [::1]:54292
|
| 998 | 2026-01-14T21:22:45.722Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 2
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 52 }, kind: MgsRequest(SpState) }
|
| 999 | 2026-01-14T21:22:45.722Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 52 }
interface = fake-sled1
response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
|
| 1000 | 2026-01-14T21:22:45.722Z | TRAC | test_vpc_firewall (sensor-poller): polled SP successfully
chassis_type = Sled
num_samples = 17
sp_slot = 0
|
| 1001 | 2026-01-14T21:22:45.722Z | TRAC | test_vpc_firewall (sensor-poller): interval elapsed, polling SP...
chassis_type = Sled
sp_slot = 0
|
| 1002 | 2026-01-14T21:22:45.722Z | TRAC | test_vpc_firewall (sensor-poller): polled SP successfully
chassis_type = Sled
num_samples = 16
sp_slot = 1
|
| 1003 | 2026-01-14T21:22:45.722Z | TRAC | test_vpc_firewall (sensor-poller): interval elapsed, polling SP...
chassis_type = Sled
sp_slot = 1
|
| 1004 | 2026-01-14T21:22:45.722Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 53 }, kind: MgsRequest(SpState) }
|
| 1005 | 2026-01-14T21:22:45.722Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 53 }, kind: MgsRequest(SpState) }
|
| 1006 | 2026-01-14T21:22:45.723Z | DEBG | test_vpc_firewall: received state request
reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) }
slot = gimlet 0
|
| 1007 | 2026-01-14T21:22:45.723Z | DEBG | test_vpc_firewall: received state request
reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) }
slot = gimlet 0
|
| 1008 | 2026-01-14T21:22:45.723Z | DEBG | test_vpc_firewall: received state request
reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) }
slot = gimlet 1
|
| 1009 | 2026-01-14T21:22:45.723Z | DEBG | test_vpc_firewall: received state request
reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) }
slot = gimlet 1
|
| 1010 | 2026-01-14T21:22:45.729Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 36 }
interface = fake-switch0
response = CabooseValue
|
| 1011 | 2026-01-14T21:22:45.729Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch0
request = Message { header: Header { version: 22, message_id: 37 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-0" }, offset: 0 }) }
|
| 1012 | 2026-01-14T21:22:45.729Z | DEBG | test_vpc_firewall (ManagementSwitch): ignoring unexpected response
id = 52
interface = fake-sled0
peer = [::1]:37600
|
| 1013 | 2026-01-14T21:22:45.730Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 2
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 53 }, kind: MgsRequest(SpState) }
|
| 1014 | 2026-01-14T21:22:45.730Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 53 }
interface = fake-sled0
response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
|
| 1015 | 2026-01-14T21:22:45.730Z | DEBG | test_vpc_firewall (ManagementSwitch): ignoring unexpected response
id = 52
interface = fake-sled1
peer = [::1]:54292
|
| 1016 | 2026-01-14T21:22:45.730Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 2
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 53 }, kind: MgsRequest(SpState) }
|
| 1017 | 2026-01-14T21:22:45.730Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 53 }
interface = fake-sled1
response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
|
| 1018 | 2026-01-14T21:22:45.731Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 54 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-1" }, offset: 0 }) }
|
| 1019 | 2026-01-14T21:22:45.731Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 54 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-8" }, offset: 0 }) }
|
| 1020 | 2026-01-14T21:22:45.731Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-0" }): asked for number of component details
num_details = 1
slot = sidecar 0
|
| 1021 | 2026-01-14T21:22:45.732Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-0" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Southwest", kind: Temperature, value: Ok(41.789063) })
index = 0
slot = sidecar 0
|
| 1022 | 2026-01-14T21:22:45.732Z | DEBG | test_vpc_firewall: received state request
reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) }
slot = gimlet 0
|
| 1023 | 2026-01-14T21:22:45.732Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-1" }): asked for number of component details
num_details = 1
slot = gimlet 0
|
| 1024 | 2026-01-14T21:22:45.732Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-1" }): asked for component details for a sensor
details = Measurement(Measurement { name: "South", kind: Temperature, value: Ok(42.5625) })
index = 0
slot = gimlet 0
|
| 1025 | 2026-01-14T21:22:45.732Z | DEBG | test_vpc_firewall: received state request
reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) }
slot = gimlet 1
|
| 1026 | 2026-01-14T21:22:45.733Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-8" }): asked for number of component details
num_details = 1
slot = gimlet 1
|
| 1027 | 2026-01-14T21:22:45.733Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-8" }): asked for component details for a sensor
details = Measurement(Measurement { name: "U2_N0", kind: Temperature, value: Ok(56.0) })
index = 0
slot = gimlet 1
|
| 1028 | 2026-01-14T21:22:45.733Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 37 }
interface = fake-switch0
response = ComponentDetails(TlvPage { offset: 0, total: 1 })
|
| 1029 | 2026-01-14T21:22:45.733Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch0
request = Message { header: Header { version: 22, message_id: 38 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "sp" }, slot: 0, key: [83, 73, 71, 78] }) }
|
| 1030 | 2026-01-14T21:22:45.734Z | DEBG | test_vpc_firewall (ManagementSwitch): ignoring unexpected response
id = 53
interface = fake-sled0
peer = [::1]:37600
|
| 1031 | 2026-01-14T21:22:45.734Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 2
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 54 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-1" }, offset: 0 }) }
|
| 1032 | 2026-01-14T21:22:45.734Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 54 }
interface = fake-sled0
response = ComponentDetails(TlvPage { offset: 0, total: 1 })
|
| 1033 | 2026-01-14T21:22:45.734Z | DEBG | test_vpc_firewall (ManagementSwitch): ignoring unexpected response
id = 53
interface = fake-sled1
peer = [::1]:54292
|
| 1034 | 2026-01-14T21:22:45.734Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 2
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 54 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-8" }, offset: 0 }) }
|
| 1035 | 2026-01-14T21:22:45.735Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 54 }
interface = fake-sled1
response = ComponentDetails(TlvPage { offset: 0, total: 1 })
|
| 1036 | 2026-01-14T21:22:45.738Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 55 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-2" }, offset: 0 }) }
|
| 1037 | 2026-01-14T21:22:45.746Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 55 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-46" }, offset: 0 }) }
|
| 1038 | 2026-01-14T21:22:45.751Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-1" }): asked for number of component details
num_details = 1
slot = gimlet 0
|
| 1039 | 2026-01-14T21:22:45.751Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-1" }): asked for component details for a sensor
details = Measurement(Measurement { name: "South", kind: Temperature, value: Ok(42.5625) })
index = 0
slot = gimlet 0
|
| 1040 | 2026-01-14T21:22:45.751Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-2" }): asked for number of component details
num_details = 1
slot = gimlet 0
|
| 1041 | 2026-01-14T21:22:45.751Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-2" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Southeast", kind: Temperature, value: Ok(41.570313) })
index = 0
slot = gimlet 0
|
| 1042 | 2026-01-14T21:22:45.751Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-8" }): asked for number of component details
num_details = 1
slot = gimlet 1
|
| 1043 | 2026-01-14T21:22:45.751Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-8" }): asked for component details for a sensor
details = Measurement(Measurement { name: "U2_N0", kind: Temperature, value: Ok(56.0) })
index = 0
slot = gimlet 1
|
| 1044 | 2026-01-14T21:22:45.752Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-46" }): asked for number of component details
num_details = 1
slot = gimlet 1
|
| 1045 | 2026-01-14T21:22:45.752Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-46" }): asked for component details for a sensor
details = Measurement(Measurement { name: "CPU", kind: Temperature, value: Ok(62.6) })
index = 0
slot = gimlet 1
|
| 1046 | 2026-01-14T21:22:45.752Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 38 }
interface = fake-switch0
response = Error(NoSuchCabooseKey([83, 73, 71, 78]))
|
| 1047 | 2026-01-14T21:22:45.752Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch0
request = Message { header: Header { version: 22, message_id: 39 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-1" }, offset: 0 }) }
|
| 1048 | 2026-01-14T21:22:45.754Z | DEBG | test_vpc_firewall (ManagementSwitch): ignoring unexpected response
id = 54
interface = fake-sled0
peer = [::1]:37600
|
| 1049 | 2026-01-14T21:22:45.754Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 2
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 55 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-2" }, offset: 0 }) }
|
| 1050 | 2026-01-14T21:22:45.754Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 55 }
interface = fake-sled0
response = ComponentDetails(TlvPage { offset: 0, total: 1 })
|
| 1051 | 2026-01-14T21:22:45.754Z | DEBG | test_vpc_firewall (ManagementSwitch): ignoring unexpected response
id = 54
interface = fake-sled1
peer = [::1]:54292
|
| 1052 | 2026-01-14T21:22:45.754Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 2
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 55 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-46" }, offset: 0 }) }
|
| 1053 | 2026-01-14T21:22:45.754Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 55 }
interface = fake-sled1
response = ComponentDetails(TlvPage { offset: 0, total: 1 })
|
| 1054 | 2026-01-14T21:22:45.756Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 56 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-0" }, offset: 0 }) }
|
| 1055 | 2026-01-14T21:22:45.756Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 56 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-53" }, offset: 0 }) }
|
| 1056 | 2026-01-14T21:22:45.761Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-1" }): asked for number of component details
num_details = 1
slot = sidecar 0
|
| 1057 | 2026-01-14T21:22:45.761Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-1" }): asked for component details for a sensor
details = Measurement(Measurement { name: "South", kind: Temperature, value: Err(DeviceError) })
index = 0
slot = sidecar 0
|
| 1058 | 2026-01-14T21:22:45.761Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-2" }): asked for number of component details
num_details = 1
slot = gimlet 0
|
| 1059 | 2026-01-14T21:22:45.761Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-2" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Southeast", kind: Temperature, value: Ok(41.570313) })
index = 0
slot = gimlet 0
|
| 1060 | 2026-01-14T21:22:45.761Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-0" }): asked for number of component details
num_details = 1
slot = gimlet 0
|
| 1061 | 2026-01-14T21:22:45.761Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-0" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Southwest", kind: Temperature, value: Err(DeviceError) })
index = 0
slot = gimlet 0
|
| 1062 | 2026-01-14T21:22:45.762Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-46" }): asked for number of component details
num_details = 1
slot = gimlet 1
|
| 1063 | 2026-01-14T21:22:45.762Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-46" }): asked for component details for a sensor
details = Measurement(Measurement { name: "CPU", kind: Temperature, value: Ok(62.6) })
index = 0
slot = gimlet 1
|
| 1064 | 2026-01-14T21:22:45.762Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for number of component details
num_details = 6
slot = gimlet 1
|
| 1065 | 2026-01-14T21:22:45.762Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Southeast", kind: Speed, value: Ok(2510.0) })
index = 0
slot = gimlet 1
|
| 1066 | 2026-01-14T21:22:45.762Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Northeast", kind: Speed, value: Ok(2390.0) })
index = 1
slot = gimlet 1
|
| 1067 | 2026-01-14T21:22:45.762Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor
details = Measurement(Measurement { name: "South", kind: Speed, value: Ok(2467.0) })
index = 2
slot = gimlet 1
|
| 1068 | 2026-01-14T21:22:45.762Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor
details = Measurement(Measurement { name: "North", kind: Speed, value: Ok(2195.0) })
index = 3
slot = gimlet 1
|
| 1069 | 2026-01-14T21:22:45.762Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Southwest", kind: Speed, value: Ok(2680.0) })
index = 4
slot = gimlet 1
|
| 1070 | 2026-01-14T21:22:45.762Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Northwest", kind: Speed, value: Ok(2212.0) })
index = 5
slot = gimlet 1
|
| 1071 | 2026-01-14T21:22:45.762Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 39 }
interface = fake-switch0
response = ComponentDetails(TlvPage { offset: 0, total: 1 })
|
| 1072 | 2026-01-14T21:22:45.762Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch0
request = Message { header: Header { version: 22, message_id: 40 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "sp" }, slot: 0, key: [69, 80, 79, 67] }) }
|
| 1073 | 2026-01-14T21:22:45.762Z | DEBG | test_vpc_firewall (ManagementSwitch): ignoring unexpected response
id = 55
interface = fake-sled0
peer = [::1]:37600
|
| 1074 | 2026-01-14T21:22:45.762Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 2
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 56 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-0" }, offset: 0 }) }
|
| 1075 | 2026-01-14T21:22:45.762Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 56 }
interface = fake-sled0
response = ComponentDetails(TlvPage { offset: 0, total: 1 })
|
| 1076 | 2026-01-14T21:22:45.762Z | DEBG | test_vpc_firewall (ManagementSwitch): ignoring unexpected response
id = 55
interface = fake-sled1
peer = [::1]:54292
|
| 1077 | 2026-01-14T21:22:45.762Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 2
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 56 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-53" }, offset: 0 }) }
|
| 1078 | 2026-01-14T21:22:45.762Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 56 }
interface = fake-sled1
response = ComponentDetails(TlvPage { offset: 0, total: 6 })
|
| 1079 | 2026-01-14T21:22:45.777Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 57 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-7" }, offset: 0 }) }
|
| 1080 | 2026-01-14T21:22:45.777Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 57 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-0" }, offset: 0 }) }
|
| 1081 | 2026-01-14T21:22:45.779Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-0" }): asked for number of component details
num_details = 1
slot = gimlet 0
|
| 1082 | 2026-01-14T21:22:45.779Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-0" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Southwest", kind: Temperature, value: Err(DeviceError) })
index = 0
slot = gimlet 0
|
| 1083 | 2026-01-14T21:22:45.779Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-7" }): asked for number of component details
num_details = 4
slot = gimlet 0
|
| 1084 | 2026-01-14T21:22:45.779Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor
details = Measurement(Measurement { name: "V12_U2A_A0", kind: Current, value: Ok(0.45898438) })
index = 0
slot = gimlet 0
|
| 1085 | 2026-01-14T21:22:45.779Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor
details = Measurement(Measurement { name: "V3P3_U2A_A0", kind: Current, value: Ok(0.024414063) })
index = 1
slot = gimlet 0
|
| 1086 | 2026-01-14T21:22:45.779Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor
details = Measurement(Measurement { name: "V12_U2A_A0", kind: Voltage, value: Ok(12.03125) })
index = 2
slot = gimlet 0
|
| 1087 | 2026-01-14T21:22:45.779Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor
details = Measurement(Measurement { name: "V3P3_U2A_A0", kind: Voltage, value: Ok(3.328125) })
index = 3
slot = gimlet 0
|
| 1088 | 2026-01-14T21:22:45.779Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for number of component details
num_details = 6
slot = gimlet 1
|
| 1089 | 2026-01-14T21:22:45.779Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Southeast", kind: Speed, value: Ok(2510.0) })
index = 0
slot = gimlet 1
|
| 1090 | 2026-01-14T21:22:45.779Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Northeast", kind: Speed, value: Ok(2390.0) })
index = 1
slot = gimlet 1
|
| 1091 | 2026-01-14T21:22:45.779Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor
details = Measurement(Measurement { name: "South", kind: Speed, value: Ok(2467.0) })
index = 2
slot = gimlet 1
|
| 1092 | 2026-01-14T21:22:45.779Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor
details = Measurement(Measurement { name: "North", kind: Speed, value: Ok(2195.0) })
index = 3
slot = gimlet 1
|
| 1093 | 2026-01-14T21:22:45.779Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Southwest", kind: Speed, value: Ok(2680.0) })
index = 4
slot = gimlet 1
|
| 1094 | 2026-01-14T21:22:45.779Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Northwest", kind: Speed, value: Ok(2212.0) })
index = 5
slot = gimlet 1
|
| 1095 | 2026-01-14T21:22:45.779Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-0" }): asked for number of component details
num_details = 1
slot = gimlet 1
|
| 1096 | 2026-01-14T21:22:45.780Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-0" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Southwest", kind: Temperature, value: Ok(41.3629) })
index = 0
slot = gimlet 1
|
| 1097 | 2026-01-14T21:22:45.796Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 40 }
interface = fake-switch0
response = Error(NoSuchCabooseKey([69, 80, 79, 67]))
|
| 1098 | 2026-01-14T21:22:45.803Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch0
request = Message { header: Header { version: 22, message_id: 41 }, kind: MgsRequest(SpState) }
|
| 1099 | 2026-01-14T21:22:45.803Z | DEBG | test_vpc_firewall (ManagementSwitch): ignoring unexpected response
id = 56
interface = fake-sled0
peer = [::1]:37600
|
| 1100 | 2026-01-14T21:22:45.803Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 2
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 57 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-7" }, offset: 0 }) }
|
| 1101 | 2026-01-14T21:22:45.803Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 57 }
interface = fake-sled0
response = ComponentDetails(TlvPage { offset: 0, total: 4 })
|
| 1102 | 2026-01-14T21:22:45.803Z | DEBG | test_vpc_firewall (ManagementSwitch): ignoring unexpected response
id = 56
interface = fake-sled1
peer = [::1]:54292
|
| 1103 | 2026-01-14T21:22:45.803Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 2
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 57 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-0" }, offset: 0 }) }
|
| 1104 | 2026-01-14T21:22:45.803Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 57 }
interface = fake-sled1
response = ComponentDetails(TlvPage { offset: 0, total: 1 })
|
| 1105 | 2026-01-14T21:22:45.808Z | INFO | test_vpc_firewall (dropshot): request completed
latency_us = 212647
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:62232
req_id = 18750ca9-410d-487e-9745-96614b124d77
response_code = 200
uri = /sp/switch/0/component/sp/caboose?firmware_slot=0
|
| 1106 | 2026-01-14T21:22:45.809Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 58 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-39" }, offset: 0 }) }
|
| 1107 | 2026-01-14T21:22:45.809Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 58 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-2" }, offset: 0 }) }
|
| 1108 | 2026-01-14T21:22:45.818Z | DEBG | test_vpc_firewall: received state request
reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) }
slot = sidecar 0
|
| 1109 | 2026-01-14T21:22:45.818Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-7" }): asked for number of component details
num_details = 4
slot = gimlet 0
|
| 1110 | 2026-01-14T21:22:45.818Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor
details = Measurement(Measurement { name: "V12_U2A_A0", kind: Current, value: Ok(0.45898438) })
index = 0
slot = gimlet 0
|
| 1111 | 2026-01-14T21:22:45.818Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor
details = Measurement(Measurement { name: "V3P3_U2A_A0", kind: Current, value: Ok(0.024414063) })
index = 1
slot = gimlet 0
|
| 1112 | 2026-01-14T21:22:45.818Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor
details = Measurement(Measurement { name: "V12_U2A_A0", kind: Voltage, value: Ok(12.03125) })
index = 2
slot = gimlet 0
|
| 1113 | 2026-01-14T21:22:45.818Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor
details = Measurement(Measurement { name: "V3P3_U2A_A0", kind: Voltage, value: Ok(3.328125) })
index = 3
slot = gimlet 0
|
| 1114 | 2026-01-14T21:22:45.818Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-39" }): asked for number of component details
num_details = 1
slot = gimlet 0
|
| 1115 | 2026-01-14T21:22:45.818Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-39" }): asked for component details for a sensor
details = Measurement(Measurement { name: "t6", kind: Temperature, value: Ok(70.625) })
index = 0
slot = gimlet 0
|
| 1116 | 2026-01-14T21:22:45.818Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-0" }): asked for number of component details
num_details = 1
slot = gimlet 1
|
| 1117 | 2026-01-14T21:22:45.818Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-0" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Southwest", kind: Temperature, value: Ok(41.3629) })
index = 0
slot = gimlet 1
|
| 1118 | 2026-01-14T21:22:45.818Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-2" }): asked for number of component details
num_details = 1
slot = gimlet 1
|
| 1119 | 2026-01-14T21:22:45.818Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-2" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Southeast", kind: Temperature, value: Ok(41.570313) })
index = 0
slot = gimlet 1
|
| 1120 | 2026-01-14T21:22:45.820Z | TRAC | test_vpc_firewall (dropshot): incoming request
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:62232
req_id = cc4593f4-c34b-4ef1-adc7-afafc3f08db0
uri = /sp/switch/0/component/sp/caboose?firmware_slot=1
|
| 1121 | 2026-01-14T21:22:45.820Z | DEBG | test_vpc_firewall (dropshot): determined request API version
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:62232
req_id = cc4593f4-c34b-4ef1-adc7-afafc3f08db0
uri = /sp/switch/0/component/sp/caboose?firmware_slot=1
version = 3.0.0
|
| 1122 | 2026-01-14T21:22:45.820Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 41 }
interface = fake-switch0
response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
|
| 1123 | 2026-01-14T21:22:45.821Z | DEBG | test_vpc_firewall (ManagementSwitch): ignoring unexpected response
id = 57
interface = fake-sled0
peer = [::1]:37600
|
| 1124 | 2026-01-14T21:22:45.821Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 2
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 58 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-39" }, offset: 0 }) }
|
| 1125 | 2026-01-14T21:22:45.821Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 58 }
interface = fake-sled0
response = ComponentDetails(TlvPage { offset: 0, total: 1 })
|
| 1126 | 2026-01-14T21:22:45.821Z | DEBG | test_vpc_firewall (ManagementSwitch): ignoring unexpected response
id = 57
interface = fake-sled1
peer = [::1]:54292
|
| 1127 | 2026-01-14T21:22:45.821Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 2
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 58 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-2" }, offset: 0 }) }
|
| 1128 | 2026-01-14T21:22:45.821Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 58 }
interface = fake-sled1
response = ComponentDetails(TlvPage { offset: 0, total: 1 })
|
| 1129 | 2026-01-14T21:22:45.821Z | TRAC | test_vpc_firewall (sensor-poller): polled SP successfully
chassis_type = Switch
num_samples = 3
sp_slot = 0
|
| 1130 | 2026-01-14T21:22:45.824Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch0
request = Message { header: Header { version: 22, message_id: 42 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "sp" }, slot: 1, key: [71, 73, 84, 67] }) }
|
| 1131 | 2026-01-14T21:22:45.824Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 59 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-46" }, offset: 0 }) }
|
| 1132 | 2026-01-14T21:22:45.824Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 59 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-1" }, offset: 0 }) }
|
| 1133 | 2026-01-14T21:22:45.830Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-39" }): asked for number of component details
num_details = 1
slot = gimlet 0
|
| 1134 | 2026-01-14T21:22:45.830Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-39" }): asked for component details for a sensor
details = Measurement(Measurement { name: "t6", kind: Temperature, value: Ok(70.625) })
index = 0
slot = gimlet 0
|
| 1135 | 2026-01-14T21:22:45.830Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-46" }): asked for number of component details
num_details = 1
slot = gimlet 0
|
| 1136 | 2026-01-14T21:22:45.830Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-46" }): asked for component details for a sensor
details = Measurement(Measurement { name: "CPU", kind: Temperature, value: Ok(64.5) })
index = 0
slot = gimlet 0
|
| 1137 | 2026-01-14T21:22:45.831Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-2" }): asked for number of component details
num_details = 1
slot = gimlet 1
|
| 1138 | 2026-01-14T21:22:45.831Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-2" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Southeast", kind: Temperature, value: Ok(41.570313) })
index = 0
slot = gimlet 1
|
| 1139 | 2026-01-14T21:22:45.831Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-1" }): asked for number of component details
num_details = 1
slot = gimlet 1
|
| 1140 | 2026-01-14T21:22:45.831Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-1" }): asked for component details for a sensor
details = Measurement(Measurement { name: "South", kind: Temperature, value: Ok(42.5625) })
index = 0
slot = gimlet 1
|
| 1141 | 2026-01-14T21:22:45.831Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 42 }
interface = fake-switch0
response = CabooseValue
|
| 1142 | 2026-01-14T21:22:45.831Z | DEBG | test_vpc_firewall (ManagementSwitch): ignoring unexpected response
id = 58
interface = fake-sled0
peer = [::1]:37600
|
| 1143 | 2026-01-14T21:22:45.831Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 2
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 59 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-46" }, offset: 0 }) }
|
| 1144 | 2026-01-14T21:22:45.831Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 59 }
interface = fake-sled0
response = ComponentDetails(TlvPage { offset: 0, total: 1 })
|
| 1145 | 2026-01-14T21:22:45.831Z | DEBG | test_vpc_firewall (ManagementSwitch): ignoring unexpected response
id = 58
interface = fake-sled1
peer = [::1]:54292
|
| 1146 | 2026-01-14T21:22:45.831Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 2
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 59 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-1" }, offset: 0 }) }
|
| 1147 | 2026-01-14T21:22:45.831Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 59 }
interface = fake-sled1
response = ComponentDetails(TlvPage { offset: 0, total: 1 })
|
| 1148 | 2026-01-14T21:22:45.833Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch0
request = Message { header: Header { version: 22, message_id: 43 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "sp" }, slot: 1, key: [66, 79, 82, 68] }) }
|
| 1149 | 2026-01-14T21:22:45.833Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 60 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-8" }, offset: 0 }) }
|
| 1150 | 2026-01-14T21:22:45.833Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 60 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-7" }, offset: 0 }) }
|
| 1151 | 2026-01-14T21:22:45.850Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-46" }): asked for number of component details
num_details = 1
slot = gimlet 0
|
| 1152 | 2026-01-14T21:22:45.850Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-46" }): asked for component details for a sensor
details = Measurement(Measurement { name: "CPU", kind: Temperature, value: Ok(64.5) })
index = 0
slot = gimlet 0
|
| 1153 | 2026-01-14T21:22:45.851Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-8" }): asked for number of component details
num_details = 1
slot = gimlet 0
|
| 1154 | 2026-01-14T21:22:45.851Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-8" }): asked for component details for a sensor
details = Measurement(Measurement { name: "U2_N0", kind: Temperature, value: Ok(56.0) })
index = 0
slot = gimlet 0
|
| 1155 | 2026-01-14T21:22:45.851Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-1" }): asked for number of component details
num_details = 1
slot = gimlet 1
|
| 1156 | 2026-01-14T21:22:45.851Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-1" }): asked for component details for a sensor
details = Measurement(Measurement { name: "South", kind: Temperature, value: Ok(42.5625) })
index = 0
slot = gimlet 1
|
| 1157 | 2026-01-14T21:22:45.851Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-7" }): asked for number of component details
num_details = 4
slot = gimlet 1
|
| 1158 | 2026-01-14T21:22:45.851Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor
details = Measurement(Measurement { name: "V12_U2A_A0", kind: Current, value: Ok(0.41893438) })
index = 0
slot = gimlet 1
|
| 1159 | 2026-01-14T21:22:45.851Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor
details = Measurement(Measurement { name: "V3P3_U2A_A0", kind: Current, value: Ok(0.025614602) })
index = 1
slot = gimlet 1
|
| 1160 | 2026-01-14T21:22:45.851Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor
details = Measurement(Measurement { name: "V12_U2A_A0", kind: Voltage, value: Ok(12.02914) })
index = 2
slot = gimlet 1
|
| 1161 | 2026-01-14T21:22:45.851Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor
details = Measurement(Measurement { name: "V3P3_U2A_A0", kind: Voltage, value: Ok(3.2618) })
index = 3
slot = gimlet 1
|
| 1162 | 2026-01-14T21:22:45.858Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 43 }
interface = fake-switch0
response = CabooseValue
|
| 1163 | 2026-01-14T21:22:45.858Z | DEBG | test_vpc_firewall (ManagementSwitch): ignoring unexpected response
id = 59
interface = fake-sled0
peer = [::1]:37600
|
| 1164 | 2026-01-14T21:22:45.858Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 2
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 60 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-8" }, offset: 0 }) }
|
| 1165 | 2026-01-14T21:22:45.858Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 60 }
interface = fake-sled0
response = ComponentDetails(TlvPage { offset: 0, total: 1 })
|
| 1166 | 2026-01-14T21:22:45.858Z | DEBG | test_vpc_firewall (ManagementSwitch): ignoring unexpected response
id = 59
interface = fake-sled1
peer = [::1]:54292
|
| 1167 | 2026-01-14T21:22:45.858Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 2
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 60 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-7" }, offset: 0 }) }
|
| 1168 | 2026-01-14T21:22:45.858Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 60 }
interface = fake-sled1
response = ComponentDetails(TlvPage { offset: 0, total: 4 })
|
| 1169 | 2026-01-14T21:22:45.864Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch0
request = Message { header: Header { version: 22, message_id: 44 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "sp" }, slot: 1, key: [78, 65, 77, 69] }) }
|
| 1170 | 2026-01-14T21:22:45.864Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 61 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-53" }, offset: 0 }) }
|
| 1171 | 2026-01-14T21:22:45.864Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 61 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-39" }, offset: 0 }) }
|
| 1172 | 2026-01-14T21:22:45.871Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-8" }): asked for number of component details
num_details = 1
slot = gimlet 0
|
| 1173 | 2026-01-14T21:22:45.872Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-8" }): asked for component details for a sensor
details = Measurement(Measurement { name: "U2_N0", kind: Temperature, value: Ok(56.0) })
index = 0
slot = gimlet 0
|
| 1174 | 2026-01-14T21:22:45.872Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for number of component details
num_details = 6
slot = gimlet 0
|
| 1175 | 2026-01-14T21:22:45.872Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Southeast", kind: Speed, value: Ok(2607.0) })
index = 0
slot = gimlet 0
|
| 1176 | 2026-01-14T21:22:45.872Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Northeast", kind: Speed, value: Ok(2476.0) })
index = 1
slot = gimlet 0
|
| 1177 | 2026-01-14T21:22:45.872Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor
details = Measurement(Measurement { name: "South", kind: Speed, value: Ok(2553.0) })
index = 2
slot = gimlet 0
|
| 1178 | 2026-01-14T21:22:45.872Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor
details = Measurement(Measurement { name: "North", kind: Speed, value: Ok(2265.0) })
index = 3
slot = gimlet 0
|
| 1179 | 2026-01-14T21:22:45.872Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Southwest", kind: Speed, value: Ok(2649.0) })
index = 4
slot = gimlet 0
|
| 1180 | 2026-01-14T21:22:45.873Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Northwest", kind: Speed, value: Ok(2275.0) })
index = 5
slot = gimlet 0
|
| 1181 | 2026-01-14T21:22:45.873Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-7" }): asked for number of component details
num_details = 4
slot = gimlet 1
|
| 1182 | 2026-01-14T21:22:45.873Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor
details = Measurement(Measurement { name: "V12_U2A_A0", kind: Current, value: Ok(0.41893438) })
index = 0
slot = gimlet 1
|
| 1183 | 2026-01-14T21:22:45.873Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor
details = Measurement(Measurement { name: "V3P3_U2A_A0", kind: Current, value: Ok(0.025614602) })
index = 1
slot = gimlet 1
|
| 1184 | 2026-01-14T21:22:45.873Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor
details = Measurement(Measurement { name: "V12_U2A_A0", kind: Voltage, value: Ok(12.02914) })
index = 2
slot = gimlet 1
|
| 1185 | 2026-01-14T21:22:45.873Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor
details = Measurement(Measurement { name: "V3P3_U2A_A0", kind: Voltage, value: Ok(3.2618) })
index = 3
slot = gimlet 1
|
| 1186 | 2026-01-14T21:22:45.873Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-39" }): asked for number of component details
num_details = 1
slot = gimlet 1
|
| 1187 | 2026-01-14T21:22:45.873Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-39" }): asked for component details for a sensor
details = Measurement(Measurement { name: "t6", kind: Temperature, value: Ok(70.625) })
index = 0
slot = gimlet 1
|
| 1188 | 2026-01-14T21:22:45.873Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 44 }
interface = fake-switch0
response = CabooseValue
|
| 1189 | 2026-01-14T21:22:45.873Z | DEBG | test_vpc_firewall (ManagementSwitch): ignoring unexpected response
id = 60
interface = fake-sled0
peer = [::1]:37600
|
| 1190 | 2026-01-14T21:22:45.873Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 2
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 61 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-53" }, offset: 0 }) }
|
| 1191 | 2026-01-14T21:22:45.873Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 61 }
interface = fake-sled0
response = ComponentDetails(TlvPage { offset: 0, total: 6 })
|
| 1192 | 2026-01-14T21:22:45.873Z | DEBG | test_vpc_firewall (ManagementSwitch): ignoring unexpected response
id = 60
interface = fake-sled1
peer = [::1]:54292
|
| 1193 | 2026-01-14T21:22:45.873Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 2
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 61 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-39" }, offset: 0 }) }
|
| 1194 | 2026-01-14T21:22:45.873Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 61 }
interface = fake-sled1
response = ComponentDetails(TlvPage { offset: 0, total: 1 })
|
| 1195 | 2026-01-14T21:22:45.880Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch0
request = Message { header: Header { version: 22, message_id: 45 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "sp" }, slot: 1, key: [86, 69, 82, 83] }) }
|
| 1196 | 2026-01-14T21:22:45.880Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 62 }, kind: MgsRequest(SpState) }
|
| 1197 | 2026-01-14T21:22:45.880Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 62 }, kind: MgsRequest(SpState) }
|
| 1198 | 2026-01-14T21:22:45.903Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for number of component details
num_details = 6
slot = gimlet 0
|
| 1199 | 2026-01-14T21:22:45.903Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Southeast", kind: Speed, value: Ok(2607.0) })
index = 0
slot = gimlet 0
|
| 1200 | 2026-01-14T21:22:45.903Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Northeast", kind: Speed, value: Ok(2476.0) })
index = 1
slot = gimlet 0
|
| 1201 | 2026-01-14T21:22:45.903Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor
details = Measurement(Measurement { name: "South", kind: Speed, value: Ok(2553.0) })
index = 2
slot = gimlet 0
|
| 1202 | 2026-01-14T21:22:45.903Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor
details = Measurement(Measurement { name: "North", kind: Speed, value: Ok(2265.0) })
index = 3
slot = gimlet 0
|
| 1203 | 2026-01-14T21:22:45.903Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Southwest", kind: Speed, value: Ok(2649.0) })
index = 4
slot = gimlet 0
|
| 1204 | 2026-01-14T21:22:45.903Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Northwest", kind: Speed, value: Ok(2275.0) })
index = 5
slot = gimlet 0
|
| 1205 | 2026-01-14T21:22:45.903Z | DEBG | test_vpc_firewall: received state request
reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) }
slot = gimlet 0
|
| 1206 | 2026-01-14T21:22:45.904Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-39" }): asked for number of component details
num_details = 1
slot = gimlet 1
|
| 1207 | 2026-01-14T21:22:45.904Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-39" }): asked for component details for a sensor
details = Measurement(Measurement { name: "t6", kind: Temperature, value: Ok(70.625) })
index = 0
slot = gimlet 1
|
| 1208 | 2026-01-14T21:22:45.904Z | DEBG | test_vpc_firewall: received state request
reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) }
slot = gimlet 1
|
| 1209 | 2026-01-14T21:22:45.906Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 45 }
interface = fake-switch0
response = CabooseValue
|
| 1210 | 2026-01-14T21:22:45.934Z | DEBG | test_vpc_firewall (ManagementSwitch): ignoring unexpected response
id = 61
interface = fake-sled0
peer = [::1]:37600
|
| 1211 | 2026-01-14T21:22:45.934Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 2
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 62 }, kind: MgsRequest(SpState) }
|
| 1212 | 2026-01-14T21:22:45.934Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 62 }
interface = fake-sled0
response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
|
| 1213 | 2026-01-14T21:22:45.935Z | DEBG | test_vpc_firewall (ManagementSwitch): ignoring unexpected response
id = 61
interface = fake-sled1
peer = [::1]:54292
|
| 1214 | 2026-01-14T21:22:45.935Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 2
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 62 }, kind: MgsRequest(SpState) }
|
| 1215 | 2026-01-14T21:22:45.935Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 62 }
interface = fake-sled1
response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
|
| 1216 | 2026-01-14T21:22:45.935Z | TRAC | test_vpc_firewall (sensor-poller): polled SP successfully
chassis_type = Sled
num_samples = 17
sp_slot = 0
|
| 1217 | 2026-01-14T21:22:45.935Z | TRAC | test_vpc_firewall (sensor-poller): polled SP successfully
chassis_type = Sled
num_samples = 16
sp_slot = 1
|
| 1218 | 2026-01-14T21:22:45.935Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch0
request = Message { header: Header { version: 22, message_id: 46 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "sp" }, slot: 1, key: [83, 73, 71, 78] }) }
|
| 1219 | 2026-01-14T21:22:45.943Z | DEBG | test_vpc_firewall: received state request
reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) }
slot = gimlet 0
|
| 1220 | 2026-01-14T21:22:45.957Z | DEBG | test_vpc_firewall: received state request
reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) }
slot = gimlet 1
|
| 1221 | 2026-01-14T21:22:45.959Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 46 }
interface = fake-switch0
response = Error(NoSuchCabooseKey([83, 73, 71, 78]))
|
| 1222 | 2026-01-14T21:22:45.959Z | WARN | test_vpc_firewall (ManagementSwitch): ignoring unexpected RPC response
interface = fake-sled0
message = Message { header: Header { version: 22, message_id: 62 }, kind: SpResponse(SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })) }
|
| 1223 | 2026-01-14T21:22:45.959Z | WARN | test_vpc_firewall (ManagementSwitch): ignoring unexpected RPC response
interface = fake-sled1
message = Message { header: Header { version: 22, message_id: 62 }, kind: SpResponse(SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })) }
|
| 1224 | 2026-01-14T21:22:45.959Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch0
request = Message { header: Header { version: 22, message_id: 47 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "sp" }, slot: 1, key: [69, 80, 79, 67] }) }
|
| 1225 | 2026-01-14T21:22:45.960Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 47 }
interface = fake-switch0
response = Error(NoSuchCabooseKey([69, 80, 79, 67]))
|
| 1226 | 2026-01-14T21:22:45.962Z | INFO | test_vpc_firewall (dropshot): request completed
latency_us = 142343
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:62232
req_id = cc4593f4-c34b-4ef1-adc7-afafc3f08db0
response_code = 200
uri = /sp/switch/0/component/sp/caboose?firmware_slot=1
|
| 1227 | 2026-01-14T21:22:45.978Z | TRAC | test_vpc_firewall (dropshot): incoming request
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:62232
req_id = f9e7f48c-3a28-457e-b4f0-e82068f38fdd
uri = /sp/switch/0/component/rot/caboose?firmware_slot=0
|
| 1228 | 2026-01-14T21:22:45.978Z | DEBG | test_vpc_firewall (dropshot): determined request API version
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:62232
req_id = f9e7f48c-3a28-457e-b4f0-e82068f38fdd
uri = /sp/switch/0/component/rot/caboose?firmware_slot=0
version = 3.0.0
|
| 1229 | 2026-01-14T21:22:45.978Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch0
request = Message { header: Header { version: 22, message_id: 48 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "rot" }, slot: 0, key: [71, 73, 84, 67] }) }
|
| 1230 | 2026-01-14T21:22:45.983Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 48 }
interface = fake-switch0
response = CabooseValue
|
| 1231 | 2026-01-14T21:22:45.983Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch0
request = Message { header: Header { version: 22, message_id: 49 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "rot" }, slot: 0, key: [66, 79, 82, 68] }) }
|
| 1232 | 2026-01-14T21:22:45.983Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 49 }
interface = fake-switch0
response = CabooseValue
|
| 1233 | 2026-01-14T21:22:45.983Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch0
request = Message { header: Header { version: 22, message_id: 50 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "rot" }, slot: 0, key: [78, 65, 77, 69] }) }
|
| 1234 | 2026-01-14T21:22:45.983Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 50 }
interface = fake-switch0
response = CabooseValue
|
| 1235 | 2026-01-14T21:22:45.984Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch0
request = Message { header: Header { version: 22, message_id: 51 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "rot" }, slot: 0, key: [86, 69, 82, 83] }) }
|
| 1236 | 2026-01-14T21:22:45.984Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 51 }
interface = fake-switch0
response = CabooseValue
|
| 1237 | 2026-01-14T21:22:45.984Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch0
request = Message { header: Header { version: 22, message_id: 52 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "rot" }, slot: 0, key: [83, 73, 71, 78] }) }
|
| 1238 | 2026-01-14T21:22:45.984Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 52 }
interface = fake-switch0
response = CabooseValue
|
| 1239 | 2026-01-14T21:22:45.984Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch0
request = Message { header: Header { version: 22, message_id: 53 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "rot" }, slot: 0, key: [69, 80, 79, 67] }) }
|
| 1240 | 2026-01-14T21:22:45.984Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 53 }
interface = fake-switch0
response = Error(NoSuchCabooseKey([69, 80, 79, 67]))
|
| 1241 | 2026-01-14T21:22:45.984Z | INFO | test_vpc_firewall (dropshot): request completed
latency_us = 6437
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:62232
req_id = f9e7f48c-3a28-457e-b4f0-e82068f38fdd
response_code = 200
uri = /sp/switch/0/component/rot/caboose?firmware_slot=0
|
| 1242 | 2026-01-14T21:22:46.004Z | TRAC | test_vpc_firewall (dropshot): incoming request
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:62232
req_id = 5bbec51d-b27d-4ed1-bf3a-672fe1a53d09
uri = /sp/switch/0/component/rot/caboose?firmware_slot=1
|
| 1243 | 2026-01-14T21:22:46.005Z | DEBG | test_vpc_firewall (dropshot): determined request API version
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:62232
req_id = 5bbec51d-b27d-4ed1-bf3a-672fe1a53d09
uri = /sp/switch/0/component/rot/caboose?firmware_slot=1
version = 3.0.0
|
| 1244 | 2026-01-14T21:22:46.005Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch0
request = Message { header: Header { version: 22, message_id: 54 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "rot" }, slot: 1, key: [71, 73, 84, 67] }) }
|
| 1245 | 2026-01-14T21:22:46.005Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 54 }
interface = fake-switch0
response = CabooseValue
|
| 1246 | 2026-01-14T21:22:46.006Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch0
request = Message { header: Header { version: 22, message_id: 55 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "rot" }, slot: 1, key: [66, 79, 82, 68] }) }
|
| 1247 | 2026-01-14T21:22:46.006Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 55 }
interface = fake-switch0
response = CabooseValue
|
| 1248 | 2026-01-14T21:22:46.006Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch0
request = Message { header: Header { version: 22, message_id: 56 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "rot" }, slot: 1, key: [78, 65, 77, 69] }) }
|
| 1249 | 2026-01-14T21:22:46.006Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 56 }
interface = fake-switch0
response = CabooseValue
|
| 1250 | 2026-01-14T21:22:46.006Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch0
request = Message { header: Header { version: 22, message_id: 57 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "rot" }, slot: 1, key: [86, 69, 82, 83] }) }
|
| 1251 | 2026-01-14T21:22:46.006Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 57 }
interface = fake-switch0
response = CabooseValue
|
| 1252 | 2026-01-14T21:22:46.006Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch0
request = Message { header: Header { version: 22, message_id: 58 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "rot" }, slot: 1, key: [83, 73, 71, 78] }) }
|
| 1253 | 2026-01-14T21:22:46.007Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 58 }
interface = fake-switch0
response = CabooseValue
|
| 1254 | 2026-01-14T21:22:46.007Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch0
request = Message { header: Header { version: 22, message_id: 59 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "rot" }, slot: 1, key: [69, 80, 79, 67] }) }
|
| 1255 | 2026-01-14T21:22:46.007Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 59 }
interface = fake-switch0
response = Error(NoSuchCabooseKey([69, 80, 79, 67]))
|
| 1256 | 2026-01-14T21:22:46.007Z | INFO | test_vpc_firewall (dropshot): request completed
latency_us = 2742
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:62232
req_id = 5bbec51d-b27d-4ed1-bf3a-672fe1a53d09
response_code = 200
uri = /sp/switch/0/component/rot/caboose?firmware_slot=1
|
| 1257 | 2026-01-14T21:22:46.009Z | TRAC | test_vpc_firewall (dropshot): incoming request
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:62232
req_id = 9e55a845-c6bc-4738-911a-44e2424eccbd
uri = /sp/switch/0/component/stage0/caboose?firmware_slot=0
|
| 1258 | 2026-01-14T21:22:46.016Z | DEBG | test_vpc_firewall (dropshot): determined request API version
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:62232
req_id = 9e55a845-c6bc-4738-911a-44e2424eccbd
uri = /sp/switch/0/component/stage0/caboose?firmware_slot=0
version = 3.0.0
|
| 1259 | 2026-01-14T21:22:46.016Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch0
request = Message { header: Header { version: 22, message_id: 60 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "stage0" }, slot: 0, key: [71, 73, 84, 67] }) }
|
| 1260 | 2026-01-14T21:22:46.016Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 60 }
interface = fake-switch0
response = CabooseValue
|
| 1261 | 2026-01-14T21:22:46.017Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch0
request = Message { header: Header { version: 22, message_id: 61 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "stage0" }, slot: 0, key: [66, 79, 82, 68] }) }
|
| 1262 | 2026-01-14T21:22:46.024Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 61 }
interface = fake-switch0
response = CabooseValue
|
| 1263 | 2026-01-14T21:22:46.024Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch0
request = Message { header: Header { version: 22, message_id: 62 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "stage0" }, slot: 0, key: [78, 65, 77, 69] }) }
|
| 1264 | 2026-01-14T21:22:46.027Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 62 }
interface = fake-switch0
response = CabooseValue
|
| 1265 | 2026-01-14T21:22:46.027Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch0
request = Message { header: Header { version: 22, message_id: 63 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "stage0" }, slot: 0, key: [86, 69, 82, 83] }) }
|
| 1266 | 2026-01-14T21:22:46.057Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 63 }
interface = fake-switch0
response = CabooseValue
|
| 1267 | 2026-01-14T21:22:46.058Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch0
request = Message { header: Header { version: 22, message_id: 64 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "stage0" }, slot: 0, key: [83, 73, 71, 78] }) }
|
| 1268 | 2026-01-14T21:22:46.059Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 64 }
interface = fake-switch0
response = CabooseValue
|
| 1269 | 2026-01-14T21:22:46.059Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch0
request = Message { header: Header { version: 22, message_id: 65 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "stage0" }, slot: 0, key: [69, 80, 79, 67] }) }
|
| 1270 | 2026-01-14T21:22:46.074Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 65 }
interface = fake-switch0
response = Error(NoSuchCabooseKey([69, 80, 79, 67]))
|
| 1271 | 2026-01-14T21:22:46.090Z | INFO | test_vpc_firewall (dropshot): request completed
latency_us = 80864
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:62232
req_id = 9e55a845-c6bc-4738-911a-44e2424eccbd
response_code = 200
uri = /sp/switch/0/component/stage0/caboose?firmware_slot=0
|
| 1272 | 2026-01-14T21:22:46.092Z | TRAC | test_vpc_firewall (dropshot): incoming request
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:62232
req_id = 80fe2562-231d-4e5d-861a-e15eb57f339e
uri = /sp/switch/0/component/stage0/caboose?firmware_slot=1
|
| 1273 | 2026-01-14T21:22:46.092Z | DEBG | test_vpc_firewall (dropshot): determined request API version
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:62232
req_id = 80fe2562-231d-4e5d-861a-e15eb57f339e
uri = /sp/switch/0/component/stage0/caboose?firmware_slot=1
version = 3.0.0
|
| 1274 | 2026-01-14T21:22:46.093Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch0
request = Message { header: Header { version: 22, message_id: 66 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "stage0" }, slot: 1, key: [71, 73, 84, 67] }) }
|
| 1275 | 2026-01-14T21:22:46.093Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 66 }
interface = fake-switch0
response = CabooseValue
|
| 1276 | 2026-01-14T21:22:46.099Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch0
request = Message { header: Header { version: 22, message_id: 67 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "stage0" }, slot: 1, key: [66, 79, 82, 68] }) }
|
| 1277 | 2026-01-14T21:22:46.135Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 67 }
interface = fake-switch0
response = CabooseValue
|
| 1278 | 2026-01-14T21:22:46.136Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch0
request = Message { header: Header { version: 22, message_id: 68 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "stage0" }, slot: 1, key: [78, 65, 77, 69] }) }
|
| 1279 | 2026-01-14T21:22:46.137Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 68 }
interface = fake-switch0
response = CabooseValue
|
| 1280 | 2026-01-14T21:22:46.149Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch0
request = Message { header: Header { version: 22, message_id: 69 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "stage0" }, slot: 1, key: [86, 69, 82, 83] }) }
|
| 1281 | 2026-01-14T21:22:46.153Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 69 }
interface = fake-switch0
response = CabooseValue
|
| 1282 | 2026-01-14T21:22:46.154Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch0
request = Message { header: Header { version: 22, message_id: 70 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "stage0" }, slot: 1, key: [83, 73, 71, 78] }) }
|
| 1283 | 2026-01-14T21:22:46.157Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 70 }
interface = fake-switch0
response = CabooseValue
|
| 1284 | 2026-01-14T21:22:46.157Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch0
request = Message { header: Header { version: 22, message_id: 71 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "stage0" }, slot: 1, key: [69, 80, 79, 67] }) }
|
| 1285 | 2026-01-14T21:22:46.158Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 71 }
interface = fake-switch0
response = Error(NoSuchCabooseKey([69, 80, 79, 67]))
|
| 1286 | 2026-01-14T21:22:46.158Z | INFO | test_vpc_firewall (dropshot): request completed
latency_us = 66376
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:62232
req_id = 80fe2562-231d-4e5d-861a-e15eb57f339e
response_code = 200
uri = /sp/switch/0/component/stage0/caboose?firmware_slot=1
|
| 1287 | 2026-01-14T21:22:46.172Z | TRAC | test_vpc_firewall (dropshot): incoming request
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:62232
req_id = 4cbcaa6e-5c70-4478-b102-519d801e2362
uri = /sp/switch/0/component/rot/cmpa
|
| 1288 | 2026-01-14T21:22:46.172Z | DEBG | test_vpc_firewall (dropshot): determined request API version
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:62232
req_id = 4cbcaa6e-5c70-4478-b102-519d801e2362
uri = /sp/switch/0/component/rot/cmpa
version = 3.0.0
|
| 1289 | 2026-01-14T21:22:46.173Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch0
request = Message { header: Header { version: 22, message_id: 72 }, kind: MgsRequest(ReadRot(ReadCmpa)) }
|
| 1290 | 2026-01-14T21:22:46.174Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 72 }
interface = fake-switch0
response = ReadRot(Ok)
|
| 1291 | 2026-01-14T21:22:46.175Z | INFO | test_vpc_firewall (dropshot): request completed
latency_us = 3094
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:62232
req_id = 4cbcaa6e-5c70-4478-b102-519d801e2362
response_code = 200
uri = /sp/switch/0/component/rot/cmpa
|
| 1292 | 2026-01-14T21:22:46.181Z | TRAC | test_vpc_firewall (dropshot): incoming request
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:62232
req_id = 86049176-fabe-4705-9dd8-4b67c62d6f2f
uri = /sp/switch/0/component/rot/cfpa
|
| 1293 | 2026-01-14T21:22:46.181Z | DEBG | test_vpc_firewall (dropshot): determined request API version
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:62232
req_id = 86049176-fabe-4705-9dd8-4b67c62d6f2f
uri = /sp/switch/0/component/rot/cfpa
version = 3.0.0
|
| 1294 | 2026-01-14T21:22:46.182Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch0
request = Message { header: Header { version: 22, message_id: 73 }, kind: MgsRequest(ReadRot(ReadCfpa(Active))) }
|
| 1295 | 2026-01-14T21:22:46.301Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 73 }
interface = fake-switch0
response = ReadRot(Ok)
|
| 1296 | 2026-01-14T21:22:46.301Z | INFO | test_vpc_firewall (dropshot): request completed
latency_us = 120068
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:62232
req_id = 86049176-fabe-4705-9dd8-4b67c62d6f2f
response_code = 200
uri = /sp/switch/0/component/rot/cfpa
|
| 1297 | 2026-01-14T21:22:46.303Z | TRAC | test_vpc_firewall (dropshot): incoming request
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:62232
req_id = 744c586d-3c27-4430-9b79-06371205dc04
uri = /sp/switch/0/component/rot/cfpa
|
| 1298 | 2026-01-14T21:22:46.303Z | DEBG | test_vpc_firewall (dropshot): determined request API version
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:62232
req_id = 744c586d-3c27-4430-9b79-06371205dc04
uri = /sp/switch/0/component/rot/cfpa
version = 3.0.0
|
| 1299 | 2026-01-14T21:22:46.304Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch0
request = Message { header: Header { version: 22, message_id: 74 }, kind: MgsRequest(ReadRot(ReadCfpa(Inactive))) }
|
| 1300 | 2026-01-14T21:22:46.304Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 74 }
interface = fake-switch0
response = ReadRot(Ok)
|
| 1301 | 2026-01-14T21:22:46.305Z | INFO | test_vpc_firewall (dropshot): request completed
latency_us = 1524
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:62232
req_id = 744c586d-3c27-4430-9b79-06371205dc04
response_code = 200
uri = /sp/switch/0/component/rot/cfpa
|
| 1302 | 2026-01-14T21:22:46.306Z | TRAC | test_vpc_firewall (dropshot): incoming request
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:62232
req_id = 03f59a31-fa77-4498-b319-a8741b02f318
uri = /sp/switch/0/component/rot/cfpa
|
| 1303 | 2026-01-14T21:22:46.306Z | DEBG | test_vpc_firewall (dropshot): determined request API version
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:62232
req_id = 03f59a31-fa77-4498-b319-a8741b02f318
uri = /sp/switch/0/component/rot/cfpa
version = 3.0.0
|
| 1304 | 2026-01-14T21:22:46.306Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch0
request = Message { header: Header { version: 22, message_id: 75 }, kind: MgsRequest(ReadRot(ReadCfpa(Scratch))) }
|
| 1305 | 2026-01-14T21:22:46.306Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 75 }
interface = fake-switch0
response = ReadRot(Ok)
|
| 1306 | 2026-01-14T21:22:46.307Z | INFO | test_vpc_firewall (dropshot): request completed
latency_us = 855
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:62232
req_id = 03f59a31-fa77-4498-b319-a8741b02f318
response_code = 200
uri = /sp/switch/0/component/rot/cfpa
|
| 1307 | 2026-01-14T21:22:46.307Z | TRAC | test_vpc_firewall (dropshot): incoming request
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:62232
req_id = 90daaac7-617e-4dde-ac0d-dc8ceea369a4
uri = /sp/switch/1
|
| 1308 | 2026-01-14T21:22:46.307Z | DEBG | test_vpc_firewall (dropshot): determined request API version
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:62232
req_id = 90daaac7-617e-4dde-ac0d-dc8ceea369a4
uri = /sp/switch/1
version = 3.0.0
|
| 1309 | 2026-01-14T21:22:46.308Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch1
request = Message { header: Header { version: 22, message_id: 17 }, kind: MgsRequest(SpState) }
|
| 1310 | 2026-01-14T21:22:46.308Z | DEBG | test_vpc_firewall: received state request
reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) }
slot = sidecar 1
|
| 1311 | 2026-01-14T21:22:46.308Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 17 }
interface = fake-switch1
response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
|
| 1312 | 2026-01-14T21:22:46.308Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch1
request = Message { header: Header { version: 22, message_id: 18 }, kind: MgsRequest(VersionedRotBootInfo { version: 3 }) }
|
| 1313 | 2026-01-14T21:22:46.309Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 18 }
interface = fake-switch1
response = RotBootInfo(V3(RotStateV3 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_fwid: Sha3_256([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_fwid: Sha3_256([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]), stage0_fwid: Sha3_256([204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204]), stage0next_fwid: Sha3_256([221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221]), slot_a_status: Ok(()), slot_b_status: Ok(()), stage0_status: Ok(()), stage0next_status: Ok(()) }))
|
| 1314 | 2026-01-14T21:22:46.310Z | INFO | test_vpc_firewall (dropshot): request completed
latency_us = 2153
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:62232
req_id = 90daaac7-617e-4dde-ac0d-dc8ceea369a4
response_code = 200
uri = /sp/switch/1
|
| 1315 | 2026-01-14T21:22:46.311Z | TRAC | test_vpc_firewall (dropshot): incoming request
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:62232
req_id = 26c4447f-a00f-4923-ba70-ec8f43a11d54
uri = /sp/switch/1/component/sp/caboose?firmware_slot=0
|
| 1316 | 2026-01-14T21:22:46.311Z | DEBG | test_vpc_firewall (dropshot): determined request API version
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:62232
req_id = 26c4447f-a00f-4923-ba70-ec8f43a11d54
uri = /sp/switch/1/component/sp/caboose?firmware_slot=0
version = 3.0.0
|
| 1317 | 2026-01-14T21:22:46.311Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch1
request = Message { header: Header { version: 22, message_id: 19 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "sp" }, slot: 0, key: [71, 73, 84, 67] }) }
|
| 1318 | 2026-01-14T21:22:46.312Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 19 }
interface = fake-switch1
response = CabooseValue
|
| 1319 | 2026-01-14T21:22:46.312Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch1
request = Message { header: Header { version: 22, message_id: 20 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "sp" }, slot: 0, key: [66, 79, 82, 68] }) }
|
| 1320 | 2026-01-14T21:22:46.325Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 20 }
interface = fake-switch1
response = CabooseValue
|
| 1321 | 2026-01-14T21:22:46.325Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch1
request = Message { header: Header { version: 22, message_id: 21 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "sp" }, slot: 0, key: [78, 65, 77, 69] }) }
|
| 1322 | 2026-01-14T21:22:46.328Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 21 }
interface = fake-switch1
response = CabooseValue
|
| 1323 | 2026-01-14T21:22:46.328Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch1
request = Message { header: Header { version: 22, message_id: 22 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "sp" }, slot: 0, key: [86, 69, 82, 83] }) }
|
| 1324 | 2026-01-14T21:22:46.328Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 22 }
interface = fake-switch1
response = CabooseValue
|
| 1325 | 2026-01-14T21:22:46.328Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch1
request = Message { header: Header { version: 22, message_id: 23 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "sp" }, slot: 0, key: [83, 73, 71, 78] }) }
|
| 1326 | 2026-01-14T21:22:46.328Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 23 }
interface = fake-switch1
response = Error(NoSuchCabooseKey([83, 73, 71, 78]))
|
| 1327 | 2026-01-14T21:22:46.328Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch1
request = Message { header: Header { version: 22, message_id: 24 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "sp" }, slot: 0, key: [69, 80, 79, 67] }) }
|
| 1328 | 2026-01-14T21:22:46.332Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 24 }
interface = fake-switch1
response = Error(NoSuchCabooseKey([69, 80, 79, 67]))
|
| 1329 | 2026-01-14T21:22:46.332Z | INFO | test_vpc_firewall (dropshot): request completed
latency_us = 20275
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:62232
req_id = 26c4447f-a00f-4923-ba70-ec8f43a11d54
response_code = 200
uri = /sp/switch/1/component/sp/caboose?firmware_slot=0
|
| 1330 | 2026-01-14T21:22:46.334Z | TRAC | test_vpc_firewall (dropshot): incoming request
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:62232
req_id = b0e0e98b-9c71-43cb-96d4-bec98288b854
uri = /sp/switch/1/component/sp/caboose?firmware_slot=1
|
| 1331 | 2026-01-14T21:22:46.334Z | DEBG | test_vpc_firewall (dropshot): determined request API version
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:62232
req_id = b0e0e98b-9c71-43cb-96d4-bec98288b854
uri = /sp/switch/1/component/sp/caboose?firmware_slot=1
version = 3.0.0
|
| 1332 | 2026-01-14T21:22:46.342Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch1
request = Message { header: Header { version: 22, message_id: 25 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "sp" }, slot: 1, key: [71, 73, 84, 67] }) }
|
| 1333 | 2026-01-14T21:22:46.342Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 25 }
interface = fake-switch1
response = CabooseValue
|
| 1334 | 2026-01-14T21:22:46.342Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch1
request = Message { header: Header { version: 22, message_id: 26 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "sp" }, slot: 1, key: [66, 79, 82, 68] }) }
|
| 1335 | 2026-01-14T21:22:46.343Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 26 }
interface = fake-switch1
response = CabooseValue
|
| 1336 | 2026-01-14T21:22:46.343Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch1
request = Message { header: Header { version: 22, message_id: 27 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "sp" }, slot: 1, key: [78, 65, 77, 69] }) }
|
| 1337 | 2026-01-14T21:22:46.343Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 27 }
interface = fake-switch1
response = CabooseValue
|
| 1338 | 2026-01-14T21:22:46.343Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch1
request = Message { header: Header { version: 22, message_id: 28 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "sp" }, slot: 1, key: [86, 69, 82, 83] }) }
|
| 1339 | 2026-01-14T21:22:46.343Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 28 }
interface = fake-switch1
response = CabooseValue
|
| 1340 | 2026-01-14T21:22:46.343Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch1
request = Message { header: Header { version: 22, message_id: 29 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "sp" }, slot: 1, key: [83, 73, 71, 78] }) }
|
| 1341 | 2026-01-14T21:22:46.344Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 29 }
interface = fake-switch1
response = Error(NoSuchCabooseKey([83, 73, 71, 78]))
|
| 1342 | 2026-01-14T21:22:46.344Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch1
request = Message { header: Header { version: 22, message_id: 30 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "sp" }, slot: 1, key: [69, 80, 79, 67] }) }
|
| 1343 | 2026-01-14T21:22:46.344Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 30 }
interface = fake-switch1
response = Error(NoSuchCabooseKey([69, 80, 79, 67]))
|
| 1344 | 2026-01-14T21:22:46.344Z | INFO | test_vpc_firewall (dropshot): request completed
latency_us = 10447
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:62232
req_id = b0e0e98b-9c71-43cb-96d4-bec98288b854
response_code = 200
uri = /sp/switch/1/component/sp/caboose?firmware_slot=1
|
| 1345 | 2026-01-14T21:22:46.348Z | TRAC | test_vpc_firewall (dropshot): incoming request
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:62232
req_id = 1a3f23e3-f1f4-4648-8cdb-0f5c628f67b5
uri = /sp/switch/1/component/rot/caboose?firmware_slot=0
|
| 1346 | 2026-01-14T21:22:46.348Z | DEBG | test_vpc_firewall (dropshot): determined request API version
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:62232
req_id = 1a3f23e3-f1f4-4648-8cdb-0f5c628f67b5
uri = /sp/switch/1/component/rot/caboose?firmware_slot=0
version = 3.0.0
|
| 1347 | 2026-01-14T21:22:46.349Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch1
request = Message { header: Header { version: 22, message_id: 31 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "rot" }, slot: 0, key: [71, 73, 84, 67] }) }
|
| 1348 | 2026-01-14T21:22:46.351Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 31 }
interface = fake-switch1
response = CabooseValue
|
| 1349 | 2026-01-14T21:22:46.351Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch1
request = Message { header: Header { version: 22, message_id: 32 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "rot" }, slot: 0, key: [66, 79, 82, 68] }) }
|
| 1350 | 2026-01-14T21:22:46.351Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 32 }
interface = fake-switch1
response = CabooseValue
|
| 1351 | 2026-01-14T21:22:46.351Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch1
request = Message { header: Header { version: 22, message_id: 33 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "rot" }, slot: 0, key: [78, 65, 77, 69] }) }
|
| 1352 | 2026-01-14T21:22:46.351Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 33 }
interface = fake-switch1
response = CabooseValue
|
| 1353 | 2026-01-14T21:22:46.352Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch1
request = Message { header: Header { version: 22, message_id: 34 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "rot" }, slot: 0, key: [86, 69, 82, 83] }) }
|
| 1354 | 2026-01-14T21:22:46.352Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 34 }
interface = fake-switch1
response = CabooseValue
|
| 1355 | 2026-01-14T21:22:46.352Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch1
request = Message { header: Header { version: 22, message_id: 35 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "rot" }, slot: 0, key: [83, 73, 71, 78] }) }
|
| 1356 | 2026-01-14T21:22:46.352Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 35 }
interface = fake-switch1
response = CabooseValue
|
| 1357 | 2026-01-14T21:22:46.352Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch1
request = Message { header: Header { version: 22, message_id: 36 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "rot" }, slot: 0, key: [69, 80, 79, 67] }) }
|
| 1358 | 2026-01-14T21:22:46.352Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 36 }
interface = fake-switch1
response = Error(NoSuchCabooseKey([69, 80, 79, 67]))
|
| 1359 | 2026-01-14T21:22:46.352Z | INFO | test_vpc_firewall (dropshot): request completed
latency_us = 4319
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:62232
req_id = 1a3f23e3-f1f4-4648-8cdb-0f5c628f67b5
response_code = 200
uri = /sp/switch/1/component/rot/caboose?firmware_slot=0
|
| 1360 | 2026-01-14T21:22:46.353Z | TRAC | test_vpc_firewall (dropshot): incoming request
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:62232
req_id = fd5a1b47-54eb-43f0-8bbf-c71ac68e8ce3
uri = /sp/switch/1/component/rot/caboose?firmware_slot=1
|
| 1361 | 2026-01-14T21:22:46.354Z | DEBG | test_vpc_firewall (dropshot): determined request API version
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:62232
req_id = fd5a1b47-54eb-43f0-8bbf-c71ac68e8ce3
uri = /sp/switch/1/component/rot/caboose?firmware_slot=1
version = 3.0.0
|
| 1362 | 2026-01-14T21:22:46.354Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch1
request = Message { header: Header { version: 22, message_id: 37 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "rot" }, slot: 1, key: [71, 73, 84, 67] }) }
|
| 1363 | 2026-01-14T21:22:46.354Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 37 }
interface = fake-switch1
response = CabooseValue
|
| 1364 | 2026-01-14T21:22:46.354Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch1
request = Message { header: Header { version: 22, message_id: 38 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "rot" }, slot: 1, key: [66, 79, 82, 68] }) }
|
| 1365 | 2026-01-14T21:22:46.354Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 38 }
interface = fake-switch1
response = CabooseValue
|
| 1366 | 2026-01-14T21:22:46.354Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch1
request = Message { header: Header { version: 22, message_id: 39 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "rot" }, slot: 1, key: [78, 65, 77, 69] }) }
|
| 1367 | 2026-01-14T21:22:46.355Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 39 }
interface = fake-switch1
response = CabooseValue
|
| 1368 | 2026-01-14T21:22:46.355Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch1
request = Message { header: Header { version: 22, message_id: 40 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "rot" }, slot: 1, key: [86, 69, 82, 83] }) }
|
| 1369 | 2026-01-14T21:22:46.355Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 40 }
interface = fake-switch1
response = CabooseValue
|
| 1370 | 2026-01-14T21:22:46.355Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch1
request = Message { header: Header { version: 22, message_id: 41 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "rot" }, slot: 1, key: [83, 73, 71, 78] }) }
|
| 1371 | 2026-01-14T21:22:46.355Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 41 }
interface = fake-switch1
response = CabooseValue
|
| 1372 | 2026-01-14T21:22:46.355Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch1
request = Message { header: Header { version: 22, message_id: 42 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "rot" }, slot: 1, key: [69, 80, 79, 67] }) }
|
| 1373 | 2026-01-14T21:22:46.355Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 42 }
interface = fake-switch1
response = Error(NoSuchCabooseKey([69, 80, 79, 67]))
|
| 1374 | 2026-01-14T21:22:46.357Z | INFO | test_vpc_firewall (dropshot): request completed
latency_us = 3052
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:62232
req_id = fd5a1b47-54eb-43f0-8bbf-c71ac68e8ce3
response_code = 200
uri = /sp/switch/1/component/rot/caboose?firmware_slot=1
|
| 1375 | 2026-01-14T21:22:46.358Z | TRAC | test_vpc_firewall (dropshot): incoming request
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:62232
req_id = f24046fc-ef42-4cdc-b5c4-76a5f395ae9a
uri = /sp/switch/1/component/stage0/caboose?firmware_slot=0
|
| 1376 | 2026-01-14T21:22:46.358Z | DEBG | test_vpc_firewall (dropshot): determined request API version
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:62232
req_id = f24046fc-ef42-4cdc-b5c4-76a5f395ae9a
uri = /sp/switch/1/component/stage0/caboose?firmware_slot=0
version = 3.0.0
|
| 1377 | 2026-01-14T21:22:46.358Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch1
request = Message { header: Header { version: 22, message_id: 43 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "stage0" }, slot: 0, key: [71, 73, 84, 67] }) }
|
| 1378 | 2026-01-14T21:22:46.358Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 43 }
interface = fake-switch1
response = CabooseValue
|
| 1379 | 2026-01-14T21:22:46.358Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch1
request = Message { header: Header { version: 22, message_id: 44 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "stage0" }, slot: 0, key: [66, 79, 82, 68] }) }
|
| 1380 | 2026-01-14T21:22:46.358Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 44 }
interface = fake-switch1
response = CabooseValue
|
| 1381 | 2026-01-14T21:22:46.358Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch1
request = Message { header: Header { version: 22, message_id: 45 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "stage0" }, slot: 0, key: [78, 65, 77, 69] }) }
|
| 1382 | 2026-01-14T21:22:46.358Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 45 }
interface = fake-switch1
response = CabooseValue
|
| 1383 | 2026-01-14T21:22:46.358Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch1
request = Message { header: Header { version: 22, message_id: 46 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "stage0" }, slot: 0, key: [86, 69, 82, 83] }) }
|
| 1384 | 2026-01-14T21:22:46.359Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 46 }
interface = fake-switch1
response = CabooseValue
|
| 1385 | 2026-01-14T21:22:46.359Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch1
request = Message { header: Header { version: 22, message_id: 47 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "stage0" }, slot: 0, key: [83, 73, 71, 78] }) }
|
| 1386 | 2026-01-14T21:22:46.359Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 47 }
interface = fake-switch1
response = CabooseValue
|
| 1387 | 2026-01-14T21:22:46.359Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch1
request = Message { header: Header { version: 22, message_id: 48 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "stage0" }, slot: 0, key: [69, 80, 79, 67] }) }
|
| 1388 | 2026-01-14T21:22:46.359Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 48 }
interface = fake-switch1
response = Error(NoSuchCabooseKey([69, 80, 79, 67]))
|
| 1389 | 2026-01-14T21:22:46.359Z | INFO | test_vpc_firewall (dropshot): request completed
latency_us = 1460
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:62232
req_id = f24046fc-ef42-4cdc-b5c4-76a5f395ae9a
response_code = 200
uri = /sp/switch/1/component/stage0/caboose?firmware_slot=0
|
| 1390 | 2026-01-14T21:22:46.360Z | TRAC | test_vpc_firewall (dropshot): incoming request
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:62232
req_id = c30efa44-8cb4-4057-a886-80ca508920ff
uri = /sp/switch/1/component/stage0/caboose?firmware_slot=1
|
| 1391 | 2026-01-14T21:22:46.360Z | DEBG | test_vpc_firewall (dropshot): determined request API version
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:62232
req_id = c30efa44-8cb4-4057-a886-80ca508920ff
uri = /sp/switch/1/component/stage0/caboose?firmware_slot=1
version = 3.0.0
|
| 1392 | 2026-01-14T21:22:46.360Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch1
request = Message { header: Header { version: 22, message_id: 49 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "stage0" }, slot: 1, key: [71, 73, 84, 67] }) }
|
| 1393 | 2026-01-14T21:22:46.360Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 49 }
interface = fake-switch1
response = CabooseValue
|
| 1394 | 2026-01-14T21:22:46.360Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch1
request = Message { header: Header { version: 22, message_id: 50 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "stage0" }, slot: 1, key: [66, 79, 82, 68] }) }
|
| 1395 | 2026-01-14T21:22:46.360Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 50 }
interface = fake-switch1
response = CabooseValue
|
| 1396 | 2026-01-14T21:22:46.360Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch1
request = Message { header: Header { version: 22, message_id: 51 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "stage0" }, slot: 1, key: [78, 65, 77, 69] }) }
|
| 1397 | 2026-01-14T21:22:46.361Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 51 }
interface = fake-switch1
response = CabooseValue
|
| 1398 | 2026-01-14T21:22:46.361Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch1
request = Message { header: Header { version: 22, message_id: 52 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "stage0" }, slot: 1, key: [86, 69, 82, 83] }) }
|
| 1399 | 2026-01-14T21:22:46.361Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 52 }
interface = fake-switch1
response = CabooseValue
|
| 1400 | 2026-01-14T21:22:46.361Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch1
request = Message { header: Header { version: 22, message_id: 53 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "stage0" }, slot: 1, key: [83, 73, 71, 78] }) }
|
| 1401 | 2026-01-14T21:22:46.361Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 53 }
interface = fake-switch1
response = CabooseValue
|
| 1402 | 2026-01-14T21:22:46.361Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch1
request = Message { header: Header { version: 22, message_id: 54 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "stage0" }, slot: 1, key: [69, 80, 79, 67] }) }
|
| 1403 | 2026-01-14T21:22:46.361Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 54 }
interface = fake-switch1
response = Error(NoSuchCabooseKey([69, 80, 79, 67]))
|
| 1404 | 2026-01-14T21:22:46.361Z | INFO | test_vpc_firewall (dropshot): request completed
latency_us = 1619
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:62232
req_id = c30efa44-8cb4-4057-a886-80ca508920ff
response_code = 200
uri = /sp/switch/1/component/stage0/caboose?firmware_slot=1
|
| 1405 | 2026-01-14T21:22:46.374Z | TRAC | test_vpc_firewall (dropshot): incoming request
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:62232
req_id = 9e219a02-c9e4-42ba-8e36-ae8e84ecdd58
uri = /sp/switch/1/component/rot/cmpa
|
| 1406 | 2026-01-14T21:22:46.374Z | DEBG | test_vpc_firewall (dropshot): determined request API version
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:62232
req_id = 9e219a02-c9e4-42ba-8e36-ae8e84ecdd58
uri = /sp/switch/1/component/rot/cmpa
version = 3.0.0
|
| 1407 | 2026-01-14T21:22:46.375Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch1
request = Message { header: Header { version: 22, message_id: 55 }, kind: MgsRequest(ReadRot(ReadCmpa)) }
|
| 1408 | 2026-01-14T21:22:46.376Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 55 }
interface = fake-switch1
response = ReadRot(Ok)
|
| 1409 | 2026-01-14T21:22:46.376Z | INFO | test_vpc_firewall (dropshot): request completed
latency_us = 2152
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:62232
req_id = 9e219a02-c9e4-42ba-8e36-ae8e84ecdd58
response_code = 200
uri = /sp/switch/1/component/rot/cmpa
|
| 1410 | 2026-01-14T21:22:46.377Z | TRAC | test_vpc_firewall (dropshot): incoming request
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:62232
req_id = d6aada16-7d05-43b4-b3e1-5cac040a533c
uri = /sp/switch/1/component/rot/cfpa
|
| 1411 | 2026-01-14T21:22:46.378Z | DEBG | test_vpc_firewall (dropshot): determined request API version
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:62232
req_id = d6aada16-7d05-43b4-b3e1-5cac040a533c
uri = /sp/switch/1/component/rot/cfpa
version = 3.0.0
|
| 1412 | 2026-01-14T21:22:46.378Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch1
request = Message { header: Header { version: 22, message_id: 56 }, kind: MgsRequest(ReadRot(ReadCfpa(Active))) }
|
| 1413 | 2026-01-14T21:22:46.378Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 56 }
interface = fake-switch1
response = ReadRot(Ok)
|
| 1414 | 2026-01-14T21:22:46.378Z | INFO | test_vpc_firewall (dropshot): request completed
latency_us = 743
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:62232
req_id = d6aada16-7d05-43b4-b3e1-5cac040a533c
response_code = 200
uri = /sp/switch/1/component/rot/cfpa
|
| 1415 | 2026-01-14T21:22:46.379Z | TRAC | test_vpc_firewall (dropshot): incoming request
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:62232
req_id = 588c4a4e-ea84-49b3-bdc2-3f3f46ea6dc1
uri = /sp/switch/1/component/rot/cfpa
|
| 1416 | 2026-01-14T21:22:46.379Z | DEBG | test_vpc_firewall (dropshot): determined request API version
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:62232
req_id = 588c4a4e-ea84-49b3-bdc2-3f3f46ea6dc1
uri = /sp/switch/1/component/rot/cfpa
version = 3.0.0
|
| 1417 | 2026-01-14T21:22:46.379Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch1
request = Message { header: Header { version: 22, message_id: 57 }, kind: MgsRequest(ReadRot(ReadCfpa(Inactive))) }
|
| 1418 | 2026-01-14T21:22:46.380Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 57 }
interface = fake-switch1
response = ReadRot(Ok)
|
| 1419 | 2026-01-14T21:22:46.380Z | INFO | test_vpc_firewall (dropshot): request completed
latency_us = 822
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:62232
req_id = 588c4a4e-ea84-49b3-bdc2-3f3f46ea6dc1
response_code = 200
uri = /sp/switch/1/component/rot/cfpa
|
| 1420 | 2026-01-14T21:22:46.381Z | TRAC | test_vpc_firewall (dropshot): incoming request
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:62232
req_id = 446fa1e2-e51f-48cc-ba84-83c16ba17168
uri = /sp/switch/1/component/rot/cfpa
|
| 1421 | 2026-01-14T21:22:46.381Z | DEBG | test_vpc_firewall (dropshot): determined request API version
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:62232
req_id = 446fa1e2-e51f-48cc-ba84-83c16ba17168
uri = /sp/switch/1/component/rot/cfpa
version = 3.0.0
|
| 1422 | 2026-01-14T21:22:46.382Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch1
request = Message { header: Header { version: 22, message_id: 58 }, kind: MgsRequest(ReadRot(ReadCfpa(Scratch))) }
|
| 1423 | 2026-01-14T21:22:46.382Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 58 }
interface = fake-switch1
response = ReadRot(Ok)
|
| 1424 | 2026-01-14T21:22:46.382Z | INFO | test_vpc_firewall (dropshot): request completed
latency_us = 821
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:62232
req_id = 446fa1e2-e51f-48cc-ba84-83c16ba17168
response_code = 200
uri = /sp/switch/1/component/rot/cfpa
|
| 1425 | 2026-01-14T21:22:46.384Z | TRAC | test_vpc_firewall (dropshot): incoming request
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:62232
req_id = 4e06cfbd-513e-4b7c-bee2-1a49699e426b
uri = /sp/sled/0
|
| 1426 | 2026-01-14T21:22:46.384Z | DEBG | test_vpc_firewall (dropshot): determined request API version
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:62232
req_id = 4e06cfbd-513e-4b7c-bee2-1a49699e426b
uri = /sp/sled/0
version = 3.0.0
|
| 1427 | 2026-01-14T21:22:46.384Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 63 }, kind: MgsRequest(SpState) }
|
| 1428 | 2026-01-14T21:22:46.385Z | DEBG | test_vpc_firewall: received state request
reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) }
slot = gimlet 0
|
| 1429 | 2026-01-14T21:22:46.385Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 63 }
interface = fake-sled0
response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
|
| 1430 | 2026-01-14T21:22:46.385Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 64 }, kind: MgsRequest(VersionedRotBootInfo { version: 3 }) }
|
| 1431 | 2026-01-14T21:22:46.385Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 64 }
interface = fake-sled0
response = RotBootInfo(V3(RotStateV3 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_fwid: Sha3_256([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_fwid: Sha3_256([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]), stage0_fwid: Sha3_256([204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204]), stage0next_fwid: Sha3_256([221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221]), slot_a_status: Ok(()), slot_b_status: Ok(()), stage0_status: Ok(()), stage0next_status: Ok(()) }))
|
| 1432 | 2026-01-14T21:22:46.385Z | INFO | test_vpc_firewall (dropshot): request completed
latency_us = 1053
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:62232
req_id = 4e06cfbd-513e-4b7c-bee2-1a49699e426b
response_code = 200
uri = /sp/sled/0
|
| 1433 | 2026-01-14T21:22:46.386Z | TRAC | test_vpc_firewall (dropshot): incoming request
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:62232
req_id = fadf0876-d0e5-4961-a113-ae17a1914a59
uri = /sp/sled/0/component/host-boot-flash/active-slot
|
| 1434 | 2026-01-14T21:22:46.386Z | DEBG | test_vpc_firewall (dropshot): determined request API version
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:62232
req_id = fadf0876-d0e5-4961-a113-ae17a1914a59
uri = /sp/sled/0/component/host-boot-flash/active-slot
version = 3.0.0
|
| 1435 | 2026-01-14T21:22:46.386Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 65 }, kind: MgsRequest(ComponentGetActiveSlot(SpComponent { id: "host-boot-flash" })) }
|
| 1436 | 2026-01-14T21:22:46.386Z | DEBG | test_vpc_firewall (SpComponent { id: "host-boot-flash" }): asked for component active slot
slot = gimlet 0
|
| 1437 | 2026-01-14T21:22:46.386Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 65 }
interface = fake-sled0
response = ComponentActiveSlot(0)
|
| 1438 | 2026-01-14T21:22:46.387Z | INFO | test_vpc_firewall (dropshot): request completed
latency_us = 1089
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:62232
req_id = fadf0876-d0e5-4961-a113-ae17a1914a59
response_code = 200
uri = /sp/sled/0/component/host-boot-flash/active-slot
|
| 1439 | 2026-01-14T21:22:46.391Z | TRAC | test_vpc_firewall (dropshot): incoming request
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:62232
req_id = 8294fd5d-f2ae-46a7-8a8f-07580fec1d77
uri = /sp/sled/0/component/host-boot-flash/hash/0
|
| 1440 | 2026-01-14T21:22:46.391Z | DEBG | test_vpc_firewall (dropshot): determined request API version
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:62232
req_id = 8294fd5d-f2ae-46a7-8a8f-07580fec1d77
uri = /sp/sled/0/component/host-boot-flash/hash/0
version = 3.0.0
|
| 1441 | 2026-01-14T21:22:46.392Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 66 }, kind: MgsRequest(GetHostFlashHash { slot: 0 }) }
|
| 1442 | 2026-01-14T21:22:46.392Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 66 }
interface = fake-sled0
response = HostFlashHash([53, 107, 239, 110, 220, 143, 200, 15, 34, 112, 182, 59, 102, 171, 195, 123, 41, 60, 85, 66, 172, 201, 244, 15, 90, 150, 217, 20, 162, 63, 97, 19])
|
| 1443 | 2026-01-14T21:22:46.393Z | INFO | test_vpc_firewall (dropshot): request completed
latency_us = 2261
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:62232
req_id = 8294fd5d-f2ae-46a7-8a8f-07580fec1d77
response_code = 200
uri = /sp/sled/0/component/host-boot-flash/hash/0
|
| 1444 | 2026-01-14T21:22:46.435Z | TRAC | test_vpc_firewall (dropshot): incoming request
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:62232
req_id = c7ed00d2-2c7a-42bb-b058-6ecd9b34d7a6
uri = /sp/sled/0/component/host-boot-flash/hash/1
|
| 1445 | 2026-01-14T21:22:46.436Z | DEBG | test_vpc_firewall (dropshot): determined request API version
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:62232
req_id = c7ed00d2-2c7a-42bb-b058-6ecd9b34d7a6
uri = /sp/sled/0/component/host-boot-flash/hash/1
version = 3.0.0
|
| 1446 | 2026-01-14T21:22:46.437Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 67 }, kind: MgsRequest(GetHostFlashHash { slot: 1 }) }
|
| 1447 | 2026-01-14T21:22:46.441Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 67 }
interface = fake-sled0
response = HostFlashHash([11, 47, 169, 143, 81, 51, 178, 136, 162, 190, 126, 80, 46, 170, 224, 134, 194, 112, 189, 43, 164, 70, 214, 26, 90, 235, 161, 253, 140, 26, 154, 197])
|
| 1448 | 2026-01-14T21:22:46.441Z | INFO | test_vpc_firewall (dropshot): request completed
latency_us = 6099
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:62232
req_id = c7ed00d2-2c7a-42bb-b058-6ecd9b34d7a6
response_code = 200
uri = /sp/sled/0/component/host-boot-flash/hash/1
|
| 1449 | 2026-01-14T21:22:46.455Z | TRAC | test_vpc_firewall (dropshot): incoming request
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:62232
req_id = ee2045cb-3c12-4e75-8c24-4506f47ade6f
uri = /sp/sled/0/component/sp/caboose?firmware_slot=0
|
| 1450 | 2026-01-14T21:22:46.455Z | DEBG | test_vpc_firewall (dropshot): determined request API version
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:62232
req_id = ee2045cb-3c12-4e75-8c24-4506f47ade6f
uri = /sp/sled/0/component/sp/caboose?firmware_slot=0
version = 3.0.0
|
| 1451 | 2026-01-14T21:22:46.455Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 68 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "sp" }, slot: 0, key: [71, 73, 84, 67] }) }
|
| 1452 | 2026-01-14T21:22:46.456Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 68 }
interface = fake-sled0
response = CabooseValue
|
| 1453 | 2026-01-14T21:22:46.456Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 69 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "sp" }, slot: 0, key: [66, 79, 82, 68] }) }
|
| 1454 | 2026-01-14T21:22:46.456Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 69 }
interface = fake-sled0
response = CabooseValue
|
| 1455 | 2026-01-14T21:22:46.456Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 70 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "sp" }, slot: 0, key: [78, 65, 77, 69] }) }
|
| 1456 | 2026-01-14T21:22:46.457Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 70 }
interface = fake-sled0
response = CabooseValue
|
| 1457 | 2026-01-14T21:22:46.457Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 71 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "sp" }, slot: 0, key: [86, 69, 82, 83] }) }
|
| 1458 | 2026-01-14T21:22:46.472Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 71 }
interface = fake-sled0
response = CabooseValue
|
| 1459 | 2026-01-14T21:22:46.472Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 72 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "sp" }, slot: 0, key: [83, 73, 71, 78] }) }
|
| 1460 | 2026-01-14T21:22:46.472Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 72 }
interface = fake-sled0
response = Error(NoSuchCabooseKey([83, 73, 71, 78]))
|
| 1461 | 2026-01-14T21:22:46.472Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 73 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "sp" }, slot: 0, key: [69, 80, 79, 67] }) }
|
| 1462 | 2026-01-14T21:22:46.473Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 73 }
interface = fake-sled0
response = Error(NoSuchCabooseKey([69, 80, 79, 67]))
|
| 1463 | 2026-01-14T21:22:46.473Z | INFO | test_vpc_firewall (dropshot): request completed
latency_us = 18230
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:62232
req_id = ee2045cb-3c12-4e75-8c24-4506f47ade6f
response_code = 200
uri = /sp/sled/0/component/sp/caboose?firmware_slot=0
|
| 1464 | 2026-01-14T21:22:46.478Z | TRAC | test_vpc_firewall (dropshot): incoming request
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:62232
req_id = 25462fa0-703f-4757-b0d4-6a38a61e93fd
uri = /sp/sled/0/component/sp/caboose?firmware_slot=1
|
| 1465 | 2026-01-14T21:22:46.479Z | DEBG | test_vpc_firewall (dropshot): determined request API version
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:62232
req_id = 25462fa0-703f-4757-b0d4-6a38a61e93fd
uri = /sp/sled/0/component/sp/caboose?firmware_slot=1
version = 3.0.0
|
| 1466 | 2026-01-14T21:22:46.479Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 74 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "sp" }, slot: 1, key: [71, 73, 84, 67] }) }
|
| 1467 | 2026-01-14T21:22:46.480Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 74 }
interface = fake-sled0
response = CabooseValue
|
| 1468 | 2026-01-14T21:22:46.480Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 75 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "sp" }, slot: 1, key: [66, 79, 82, 68] }) }
|
| 1469 | 2026-01-14T21:22:46.481Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 75 }
interface = fake-sled0
response = CabooseValue
|
| 1470 | 2026-01-14T21:22:46.481Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 76 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "sp" }, slot: 1, key: [78, 65, 77, 69] }) }
|
| 1471 | 2026-01-14T21:22:46.481Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 76 }
interface = fake-sled0
response = CabooseValue
|
| 1472 | 2026-01-14T21:22:46.481Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 77 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "sp" }, slot: 1, key: [86, 69, 82, 83] }) }
|
| 1473 | 2026-01-14T21:22:46.481Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 77 }
interface = fake-sled0
response = CabooseValue
|
| 1474 | 2026-01-14T21:22:46.481Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 78 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "sp" }, slot: 1, key: [83, 73, 71, 78] }) }
|
| 1475 | 2026-01-14T21:22:46.481Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 78 }
interface = fake-sled0
response = Error(NoSuchCabooseKey([83, 73, 71, 78]))
|
| 1476 | 2026-01-14T21:22:46.481Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 79 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "sp" }, slot: 1, key: [69, 80, 79, 67] }) }
|
| 1477 | 2026-01-14T21:22:46.482Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 79 }
interface = fake-sled0
response = Error(NoSuchCabooseKey([69, 80, 79, 67]))
|
| 1478 | 2026-01-14T21:22:46.482Z | INFO | test_vpc_firewall (dropshot): request completed
latency_us = 3913
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:62232
req_id = 25462fa0-703f-4757-b0d4-6a38a61e93fd
response_code = 200
uri = /sp/sled/0/component/sp/caboose?firmware_slot=1
|
| 1479 | 2026-01-14T21:22:46.484Z | TRAC | test_vpc_firewall (dropshot): incoming request
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:62232
req_id = 1486c6e5-63de-4311-b9d6-a6452da426be
uri = /sp/sled/0/component/rot/caboose?firmware_slot=0
|
| 1480 | 2026-01-14T21:22:46.484Z | DEBG | test_vpc_firewall (dropshot): determined request API version
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:62232
req_id = 1486c6e5-63de-4311-b9d6-a6452da426be
uri = /sp/sled/0/component/rot/caboose?firmware_slot=0
version = 3.0.0
|
| 1481 | 2026-01-14T21:22:46.484Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 80 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "rot" }, slot: 0, key: [71, 73, 84, 67] }) }
|
| 1482 | 2026-01-14T21:22:46.484Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 80 }
interface = fake-sled0
response = CabooseValue
|
| 1483 | 2026-01-14T21:22:46.484Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 81 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "rot" }, slot: 0, key: [66, 79, 82, 68] }) }
|
| 1484 | 2026-01-14T21:22:46.484Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 81 }
interface = fake-sled0
response = CabooseValue
|
| 1485 | 2026-01-14T21:22:46.485Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 82 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "rot" }, slot: 0, key: [78, 65, 77, 69] }) }
|
| 1486 | 2026-01-14T21:22:46.494Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 82 }
interface = fake-sled0
response = CabooseValue
|
| 1487 | 2026-01-14T21:22:46.494Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 83 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "rot" }, slot: 0, key: [86, 69, 82, 83] }) }
|
| 1488 | 2026-01-14T21:22:46.495Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 83 }
interface = fake-sled0
response = CabooseValue
|
| 1489 | 2026-01-14T21:22:46.495Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 84 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "rot" }, slot: 0, key: [83, 73, 71, 78] }) }
|
| 1490 | 2026-01-14T21:22:46.495Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 84 }
interface = fake-sled0
response = CabooseValue
|
| 1491 | 2026-01-14T21:22:46.501Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 85 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "rot" }, slot: 0, key: [69, 80, 79, 67] }) }
|
| 1492 | 2026-01-14T21:22:46.505Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 85 }
interface = fake-sled0
response = Error(NoSuchCabooseKey([69, 80, 79, 67]))
|
| 1493 | 2026-01-14T21:22:46.505Z | INFO | test_vpc_firewall (dropshot): request completed
latency_us = 21734
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:62232
req_id = 1486c6e5-63de-4311-b9d6-a6452da426be
response_code = 200
uri = /sp/sled/0/component/rot/caboose?firmware_slot=0
|
| 1494 | 2026-01-14T21:22:46.509Z | TRAC | test_vpc_firewall (dropshot): incoming request
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:62232
req_id = 767ce8ae-86a2-468d-ad27-d556b1aa7c4c
uri = /sp/sled/0/component/rot/caboose?firmware_slot=1
|
| 1495 | 2026-01-14T21:22:46.510Z | DEBG | test_vpc_firewall (dropshot): determined request API version
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:62232
req_id = 767ce8ae-86a2-468d-ad27-d556b1aa7c4c
uri = /sp/sled/0/component/rot/caboose?firmware_slot=1
version = 3.0.0
|
| 1496 | 2026-01-14T21:22:46.510Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 86 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "rot" }, slot: 1, key: [71, 73, 84, 67] }) }
|
| 1497 | 2026-01-14T21:22:46.510Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 86 }
interface = fake-sled0
response = CabooseValue
|
| 1498 | 2026-01-14T21:22:46.510Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 87 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "rot" }, slot: 1, key: [66, 79, 82, 68] }) }
|
| 1499 | 2026-01-14T21:22:46.511Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 87 }
interface = fake-sled0
response = CabooseValue
|
| 1500 | 2026-01-14T21:22:46.511Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 88 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "rot" }, slot: 1, key: [78, 65, 77, 69] }) }
|
| 1501 | 2026-01-14T21:22:46.511Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 88 }
interface = fake-sled0
response = CabooseValue
|
| 1502 | 2026-01-14T21:22:46.511Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 89 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "rot" }, slot: 1, key: [86, 69, 82, 83] }) }
|
| 1503 | 2026-01-14T21:22:46.511Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 89 }
interface = fake-sled0
response = CabooseValue
|
| 1504 | 2026-01-14T21:22:46.511Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 90 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "rot" }, slot: 1, key: [83, 73, 71, 78] }) }
|
| 1505 | 2026-01-14T21:22:46.512Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 90 }
interface = fake-sled0
response = CabooseValue
|
| 1506 | 2026-01-14T21:22:46.512Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 91 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "rot" }, slot: 1, key: [69, 80, 79, 67] }) }
|
| 1507 | 2026-01-14T21:22:46.512Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 91 }
interface = fake-sled0
response = Error(NoSuchCabooseKey([69, 80, 79, 67]))
|
| 1508 | 2026-01-14T21:22:46.512Z | INFO | test_vpc_firewall (dropshot): request completed
latency_us = 3064
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:62232
req_id = 767ce8ae-86a2-468d-ad27-d556b1aa7c4c
response_code = 200
uri = /sp/sled/0/component/rot/caboose?firmware_slot=1
|
| 1509 | 2026-01-14T21:22:46.514Z | TRAC | test_vpc_firewall (dropshot): incoming request
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:62232
req_id = 2041018c-4263-4764-aa02-38c0a6cffae0
uri = /sp/sled/0/component/stage0/caboose?firmware_slot=0
|
| 1510 | 2026-01-14T21:22:46.514Z | DEBG | test_vpc_firewall (dropshot): determined request API version
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:62232
req_id = 2041018c-4263-4764-aa02-38c0a6cffae0
uri = /sp/sled/0/component/stage0/caboose?firmware_slot=0
version = 3.0.0
|
| 1511 | 2026-01-14T21:22:46.514Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 92 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "stage0" }, slot: 0, key: [71, 73, 84, 67] }) }
|
| 1512 | 2026-01-14T21:22:46.515Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 92 }
interface = fake-sled0
response = CabooseValue
|
| 1513 | 2026-01-14T21:22:46.515Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 93 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "stage0" }, slot: 0, key: [66, 79, 82, 68] }) }
|
| 1514 | 2026-01-14T21:22:46.515Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 93 }
interface = fake-sled0
response = CabooseValue
|
| 1515 | 2026-01-14T21:22:46.515Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 94 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "stage0" }, slot: 0, key: [78, 65, 77, 69] }) }
|
| 1516 | 2026-01-14T21:22:46.515Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 94 }
interface = fake-sled0
response = CabooseValue
|
| 1517 | 2026-01-14T21:22:46.515Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 95 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "stage0" }, slot: 0, key: [86, 69, 82, 83] }) }
|
| 1518 | 2026-01-14T21:22:46.516Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 95 }
interface = fake-sled0
response = CabooseValue
|
| 1519 | 2026-01-14T21:22:46.517Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 96 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "stage0" }, slot: 0, key: [83, 73, 71, 78] }) }
|
| 1520 | 2026-01-14T21:22:46.518Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 96 }
interface = fake-sled0
response = CabooseValue
|
| 1521 | 2026-01-14T21:22:46.518Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 97 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "stage0" }, slot: 0, key: [69, 80, 79, 67] }) }
|
| 1522 | 2026-01-14T21:22:46.518Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 97 }
interface = fake-sled0
response = Error(NoSuchCabooseKey([69, 80, 79, 67]))
|
| 1523 | 2026-01-14T21:22:46.518Z | INFO | test_vpc_firewall (dropshot): request completed
latency_us = 4127
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:62232
req_id = 2041018c-4263-4764-aa02-38c0a6cffae0
response_code = 200
uri = /sp/sled/0/component/stage0/caboose?firmware_slot=0
|
| 1524 | 2026-01-14T21:22:46.519Z | TRAC | test_vpc_firewall (dropshot): incoming request
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:62232
req_id = b5b509b1-d148-4100-a966-68c555448c95
uri = /sp/sled/0/component/stage0/caboose?firmware_slot=1
|
| 1525 | 2026-01-14T21:22:46.519Z | DEBG | test_vpc_firewall (dropshot): determined request API version
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:62232
req_id = b5b509b1-d148-4100-a966-68c555448c95
uri = /sp/sled/0/component/stage0/caboose?firmware_slot=1
version = 3.0.0
|
| 1526 | 2026-01-14T21:22:46.519Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 98 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "stage0" }, slot: 1, key: [71, 73, 84, 67] }) }
|
| 1527 | 2026-01-14T21:22:46.520Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 98 }
interface = fake-sled0
response = CabooseValue
|
| 1528 | 2026-01-14T21:22:46.520Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 99 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "stage0" }, slot: 1, key: [66, 79, 82, 68] }) }
|
| 1529 | 2026-01-14T21:22:46.520Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 99 }
interface = fake-sled0
response = CabooseValue
|
| 1530 | 2026-01-14T21:22:46.520Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 100 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "stage0" }, slot: 1, key: [78, 65, 77, 69] }) }
|
| 1531 | 2026-01-14T21:22:46.520Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 100 }
interface = fake-sled0
response = CabooseValue
|
| 1532 | 2026-01-14T21:22:46.520Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 101 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "stage0" }, slot: 1, key: [86, 69, 82, 83] }) }
|
| 1533 | 2026-01-14T21:22:46.520Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 101 }
interface = fake-sled0
response = CabooseValue
|
| 1534 | 2026-01-14T21:22:46.520Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 102 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "stage0" }, slot: 1, key: [83, 73, 71, 78] }) }
|
| 1535 | 2026-01-14T21:22:46.520Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 102 }
interface = fake-sled0
response = CabooseValue
|
| 1536 | 2026-01-14T21:22:46.521Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 103 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "stage0" }, slot: 1, key: [69, 80, 79, 67] }) }
|
| 1537 | 2026-01-14T21:22:46.522Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 103 }
interface = fake-sled0
response = Error(NoSuchCabooseKey([69, 80, 79, 67]))
|
| 1538 | 2026-01-14T21:22:46.522Z | INFO | test_vpc_firewall (dropshot): request completed
latency_us = 2762
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:62232
req_id = b5b509b1-d148-4100-a966-68c555448c95
response_code = 200
uri = /sp/sled/0/component/stage0/caboose?firmware_slot=1
|
| 1539 | 2026-01-14T21:22:46.524Z | TRAC | test_vpc_firewall (dropshot): incoming request
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:62232
req_id = a7cc7289-0d3b-4a26-b40e-62acebd20d59
uri = /sp/sled/0/component/rot/cmpa
|
| 1540 | 2026-01-14T21:22:46.524Z | DEBG | test_vpc_firewall (dropshot): determined request API version
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:62232
req_id = a7cc7289-0d3b-4a26-b40e-62acebd20d59
uri = /sp/sled/0/component/rot/cmpa
version = 3.0.0
|
| 1541 | 2026-01-14T21:22:46.524Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 104 }, kind: MgsRequest(ReadRot(ReadCmpa)) }
|
| 1542 | 2026-01-14T21:22:46.524Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 104 }
interface = fake-sled0
response = ReadRot(Ok)
|
| 1543 | 2026-01-14T21:22:46.524Z | INFO | test_vpc_firewall (dropshot): request completed
latency_us = 887
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:62232
req_id = a7cc7289-0d3b-4a26-b40e-62acebd20d59
response_code = 200
uri = /sp/sled/0/component/rot/cmpa
|
| 1544 | 2026-01-14T21:22:46.525Z | TRAC | test_vpc_firewall (dropshot): incoming request
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:62232
req_id = aa01bb71-4ac2-42bc-bf58-088740f2913c
uri = /sp/sled/0/component/rot/cfpa
|
| 1545 | 2026-01-14T21:22:46.525Z | DEBG | test_vpc_firewall (dropshot): determined request API version
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:62232
req_id = aa01bb71-4ac2-42bc-bf58-088740f2913c
uri = /sp/sled/0/component/rot/cfpa
version = 3.0.0
|
| 1546 | 2026-01-14T21:22:46.526Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 105 }, kind: MgsRequest(ReadRot(ReadCfpa(Active))) }
|
| 1547 | 2026-01-14T21:22:46.526Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 105 }
interface = fake-sled0
response = ReadRot(Ok)
|
| 1548 | 2026-01-14T21:22:46.526Z | INFO | test_vpc_firewall (dropshot): request completed
latency_us = 775
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:62232
req_id = aa01bb71-4ac2-42bc-bf58-088740f2913c
response_code = 200
uri = /sp/sled/0/component/rot/cfpa
|
| 1549 | 2026-01-14T21:22:46.569Z | TRAC | test_vpc_firewall (dropshot): incoming request
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:62232
req_id = 9e0e3e45-5b7b-44c4-901b-99eaa2c83d42
uri = /sp/sled/0/component/rot/cfpa
|
| 1550 | 2026-01-14T21:22:46.569Z | DEBG | test_vpc_firewall (dropshot): determined request API version
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:62232
req_id = 9e0e3e45-5b7b-44c4-901b-99eaa2c83d42
uri = /sp/sled/0/component/rot/cfpa
version = 3.0.0
|
| 1551 | 2026-01-14T21:22:46.569Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 106 }, kind: MgsRequest(ReadRot(ReadCfpa(Inactive))) }
|
| 1552 | 2026-01-14T21:22:46.569Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 106 }
interface = fake-sled0
response = ReadRot(Ok)
|
| 1553 | 2026-01-14T21:22:46.570Z | INFO | test_vpc_firewall (dropshot): request completed
latency_us = 1136
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:62232
req_id = 9e0e3e45-5b7b-44c4-901b-99eaa2c83d42
response_code = 200
uri = /sp/sled/0/component/rot/cfpa
|
| 1554 | 2026-01-14T21:22:46.571Z | TRAC | test_vpc_firewall (dropshot): incoming request
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:62232
req_id = 1584ab13-93d1-4370-ac54-a085d38d8c4f
uri = /sp/sled/0/component/rot/cfpa
|
| 1555 | 2026-01-14T21:22:46.571Z | DEBG | test_vpc_firewall (dropshot): determined request API version
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:62232
req_id = 1584ab13-93d1-4370-ac54-a085d38d8c4f
uri = /sp/sled/0/component/rot/cfpa
version = 3.0.0
|
| 1556 | 2026-01-14T21:22:46.571Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 107 }, kind: MgsRequest(ReadRot(ReadCfpa(Scratch))) }
|
| 1557 | 2026-01-14T21:22:46.571Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 107 }
interface = fake-sled0
response = ReadRot(Ok)
|
| 1558 | 2026-01-14T21:22:46.571Z | INFO | test_vpc_firewall (dropshot): request completed
latency_us = 896
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:62232
req_id = 1584ab13-93d1-4370-ac54-a085d38d8c4f
response_code = 200
uri = /sp/sled/0/component/rot/cfpa
|
| 1559 | 2026-01-14T21:22:46.572Z | TRAC | test_vpc_firewall (dropshot): incoming request
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:62232
req_id = af0d9be7-b308-4fd3-9e87-72642983b675
uri = /sp/sled/1
|
| 1560 | 2026-01-14T21:22:46.572Z | DEBG | test_vpc_firewall (dropshot): determined request API version
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:62232
req_id = af0d9be7-b308-4fd3-9e87-72642983b675
uri = /sp/sled/1
version = 3.0.0
|
| 1561 | 2026-01-14T21:22:46.573Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 63 }, kind: MgsRequest(SpState) }
|
| 1562 | 2026-01-14T21:22:46.573Z | DEBG | test_vpc_firewall: received state request
reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) }
slot = gimlet 1
|
| 1563 | 2026-01-14T21:22:46.574Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 63 }
interface = fake-sled1
response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
|
| 1564 | 2026-01-14T21:22:46.574Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 64 }, kind: MgsRequest(VersionedRotBootInfo { version: 3 }) }
|
| 1565 | 2026-01-14T21:22:46.574Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 64 }
interface = fake-sled1
response = RotBootInfo(V3(RotStateV3 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_fwid: Sha3_256([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_fwid: Sha3_256([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]), stage0_fwid: Sha3_256([204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204]), stage0next_fwid: Sha3_256([221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221]), slot_a_status: Ok(()), slot_b_status: Ok(()), stage0_status: Ok(()), stage0next_status: Ok(()) }))
|
| 1566 | 2026-01-14T21:22:46.574Z | INFO | test_vpc_firewall (dropshot): request completed
latency_us = 1767
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:62232
req_id = af0d9be7-b308-4fd3-9e87-72642983b675
response_code = 200
uri = /sp/sled/1
|
| 1567 | 2026-01-14T21:22:46.575Z | TRAC | test_vpc_firewall (dropshot): incoming request
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:62232
req_id = 269913b9-5e6f-4e11-b328-23beeaff50fa
uri = /sp/sled/1/component/host-boot-flash/active-slot
|
| 1568 | 2026-01-14T21:22:46.575Z | DEBG | test_vpc_firewall (dropshot): determined request API version
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:62232
req_id = 269913b9-5e6f-4e11-b328-23beeaff50fa
uri = /sp/sled/1/component/host-boot-flash/active-slot
version = 3.0.0
|
| 1569 | 2026-01-14T21:22:46.575Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 65 }, kind: MgsRequest(ComponentGetActiveSlot(SpComponent { id: "host-boot-flash" })) }
|
| 1570 | 2026-01-14T21:22:46.575Z | DEBG | test_vpc_firewall (SpComponent { id: "host-boot-flash" }): asked for component active slot
slot = gimlet 1
|
| 1571 | 2026-01-14T21:22:46.575Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 65 }
interface = fake-sled1
response = ComponentActiveSlot(0)
|
| 1572 | 2026-01-14T21:22:46.576Z | INFO | test_vpc_firewall (dropshot): request completed
latency_us = 642
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:62232
req_id = 269913b9-5e6f-4e11-b328-23beeaff50fa
response_code = 200
uri = /sp/sled/1/component/host-boot-flash/active-slot
|
| 1573 | 2026-01-14T21:22:46.576Z | TRAC | test_vpc_firewall (dropshot): incoming request
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:62232
req_id = 3468c2a0-e143-48b5-b590-549aa8f0d182
uri = /sp/sled/1/component/host-boot-flash/hash/0
|
| 1574 | 2026-01-14T21:22:46.579Z | DEBG | test_vpc_firewall (dropshot): determined request API version
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:62232
req_id = 3468c2a0-e143-48b5-b590-549aa8f0d182
uri = /sp/sled/1/component/host-boot-flash/hash/0
version = 3.0.0
|
| 1575 | 2026-01-14T21:22:46.579Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 66 }, kind: MgsRequest(GetHostFlashHash { slot: 0 }) }
|
| 1576 | 2026-01-14T21:22:46.579Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 66 }
interface = fake-sled1
response = HostFlashHash([53, 107, 239, 110, 220, 143, 200, 15, 34, 112, 182, 59, 102, 171, 195, 123, 41, 60, 85, 66, 172, 201, 244, 15, 90, 150, 217, 20, 162, 63, 97, 19])
|
| 1577 | 2026-01-14T21:22:46.580Z | INFO | test_vpc_firewall (dropshot): request completed
latency_us = 3410
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:62232
req_id = 3468c2a0-e143-48b5-b590-549aa8f0d182
response_code = 200
uri = /sp/sled/1/component/host-boot-flash/hash/0
|
| 1578 | 2026-01-14T21:22:46.581Z | TRAC | test_vpc_firewall (dropshot): incoming request
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:62232
req_id = edb0516e-aa0c-44dd-86a8-9a1782af9e5f
uri = /sp/sled/1/component/host-boot-flash/hash/1
|
| 1579 | 2026-01-14T21:22:46.581Z | DEBG | test_vpc_firewall (dropshot): determined request API version
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:62232
req_id = edb0516e-aa0c-44dd-86a8-9a1782af9e5f
uri = /sp/sled/1/component/host-boot-flash/hash/1
version = 3.0.0
|
| 1580 | 2026-01-14T21:22:46.582Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 67 }, kind: MgsRequest(GetHostFlashHash { slot: 1 }) }
|
| 1581 | 2026-01-14T21:22:46.583Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 67 }
interface = fake-sled1
response = HostFlashHash([11, 47, 169, 143, 81, 51, 178, 136, 162, 190, 126, 80, 46, 170, 224, 134, 194, 112, 189, 43, 164, 70, 214, 26, 90, 235, 161, 253, 140, 26, 154, 197])
|
| 1582 | 2026-01-14T21:22:46.583Z | INFO | test_vpc_firewall (dropshot): request completed
latency_us = 2124
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:62232
req_id = edb0516e-aa0c-44dd-86a8-9a1782af9e5f
response_code = 200
uri = /sp/sled/1/component/host-boot-flash/hash/1
|
| 1583 | 2026-01-14T21:22:46.586Z | TRAC | test_vpc_firewall (dropshot): incoming request
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:62232
req_id = 65f4736e-2789-4074-8ca2-7941b08a5da8
uri = /sp/sled/1/component/sp/caboose?firmware_slot=0
|
| 1584 | 2026-01-14T21:22:46.586Z | DEBG | test_vpc_firewall (dropshot): determined request API version
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:62232
req_id = 65f4736e-2789-4074-8ca2-7941b08a5da8
uri = /sp/sled/1/component/sp/caboose?firmware_slot=0
version = 3.0.0
|
| 1585 | 2026-01-14T21:22:46.586Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 68 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "sp" }, slot: 0, key: [71, 73, 84, 67] }) }
|
| 1586 | 2026-01-14T21:22:46.586Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 68 }
interface = fake-sled1
response = CabooseValue
|
| 1587 | 2026-01-14T21:22:46.586Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 69 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "sp" }, slot: 0, key: [66, 79, 82, 68] }) }
|
| 1588 | 2026-01-14T21:22:46.586Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 69 }
interface = fake-sled1
response = CabooseValue
|
| 1589 | 2026-01-14T21:22:46.586Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 70 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "sp" }, slot: 0, key: [78, 65, 77, 69] }) }
|
| 1590 | 2026-01-14T21:22:46.587Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 70 }
interface = fake-sled1
response = CabooseValue
|
| 1591 | 2026-01-14T21:22:46.587Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 71 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "sp" }, slot: 0, key: [86, 69, 82, 83] }) }
|
| 1592 | 2026-01-14T21:22:46.587Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 71 }
interface = fake-sled1
response = CabooseValue
|
| 1593 | 2026-01-14T21:22:46.587Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 72 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "sp" }, slot: 0, key: [83, 73, 71, 78] }) }
|
| 1594 | 2026-01-14T21:22:46.587Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 72 }
interface = fake-sled1
response = Error(NoSuchCabooseKey([83, 73, 71, 78]))
|
| 1595 | 2026-01-14T21:22:46.588Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 73 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "sp" }, slot: 0, key: [69, 80, 79, 67] }) }
|
| 1596 | 2026-01-14T21:22:46.588Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 73 }
interface = fake-sled1
response = Error(NoSuchCabooseKey([69, 80, 79, 67]))
|
| 1597 | 2026-01-14T21:22:46.588Z | INFO | test_vpc_firewall (dropshot): request completed
latency_us = 2795
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:62232
req_id = 65f4736e-2789-4074-8ca2-7941b08a5da8
response_code = 200
uri = /sp/sled/1/component/sp/caboose?firmware_slot=0
|
| 1598 | 2026-01-14T21:22:46.590Z | TRAC | test_vpc_firewall (dropshot): incoming request
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:62232
req_id = 7d07f0ad-ebbe-4264-aafe-67d094e53cc6
uri = /sp/sled/1/component/sp/caboose?firmware_slot=1
|
| 1599 | 2026-01-14T21:22:46.590Z | DEBG | test_vpc_firewall (dropshot): determined request API version
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:62232
req_id = 7d07f0ad-ebbe-4264-aafe-67d094e53cc6
uri = /sp/sled/1/component/sp/caboose?firmware_slot=1
version = 3.0.0
|
| 1600 | 2026-01-14T21:22:46.590Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 74 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "sp" }, slot: 1, key: [71, 73, 84, 67] }) }
|
| 1601 | 2026-01-14T21:22:46.590Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 74 }
interface = fake-sled1
response = CabooseValue
|
| 1602 | 2026-01-14T21:22:46.590Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 75 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "sp" }, slot: 1, key: [66, 79, 82, 68] }) }
|
| 1603 | 2026-01-14T21:22:46.591Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 75 }
interface = fake-sled1
response = CabooseValue
|
| 1604 | 2026-01-14T21:22:46.591Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 76 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "sp" }, slot: 1, key: [78, 65, 77, 69] }) }
|
| 1605 | 2026-01-14T21:22:46.591Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 76 }
interface = fake-sled1
response = CabooseValue
|
| 1606 | 2026-01-14T21:22:46.591Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 77 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "sp" }, slot: 1, key: [86, 69, 82, 83] }) }
|
| 1607 | 2026-01-14T21:22:46.591Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 77 }
interface = fake-sled1
response = CabooseValue
|
| 1608 | 2026-01-14T21:22:46.591Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 78 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "sp" }, slot: 1, key: [83, 73, 71, 78] }) }
|
| 1609 | 2026-01-14T21:22:46.591Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 78 }
interface = fake-sled1
response = Error(NoSuchCabooseKey([83, 73, 71, 78]))
|
| 1610 | 2026-01-14T21:22:46.591Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 79 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "sp" }, slot: 1, key: [69, 80, 79, 67] }) }
|
| 1611 | 2026-01-14T21:22:46.591Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 79 }
interface = fake-sled1
response = Error(NoSuchCabooseKey([69, 80, 79, 67]))
|
| 1612 | 2026-01-14T21:22:46.592Z | INFO | test_vpc_firewall (dropshot): request completed
latency_us = 1966
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:62232
req_id = 7d07f0ad-ebbe-4264-aafe-67d094e53cc6
response_code = 200
uri = /sp/sled/1/component/sp/caboose?firmware_slot=1
|
| 1613 | 2026-01-14T21:22:46.593Z | TRAC | test_vpc_firewall (dropshot): incoming request
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:62232
req_id = 90534d2a-d5d9-410e-8b04-65591f7a3e0d
uri = /sp/sled/1/component/rot/caboose?firmware_slot=0
|
| 1614 | 2026-01-14T21:22:46.593Z | DEBG | test_vpc_firewall (dropshot): determined request API version
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:62232
req_id = 90534d2a-d5d9-410e-8b04-65591f7a3e0d
uri = /sp/sled/1/component/rot/caboose?firmware_slot=0
version = 3.0.0
|
| 1615 | 2026-01-14T21:22:46.593Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 80 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "rot" }, slot: 0, key: [71, 73, 84, 67] }) }
|
| 1616 | 2026-01-14T21:22:46.593Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 80 }
interface = fake-sled1
response = CabooseValue
|
| 1617 | 2026-01-14T21:22:46.593Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 81 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "rot" }, slot: 0, key: [66, 79, 82, 68] }) }
|
| 1618 | 2026-01-14T21:22:46.593Z | TRAC | test_vpc_firewall (sensor-poller): interval elapsed, polling SP...
chassis_type = Switch
sp_slot = 1
|
| 1619 | 2026-01-14T21:22:46.594Z | TRAC | test_vpc_firewall (sensor-poller): interval elapsed, polling SP...
chassis_type = Switch
sp_slot = 0
|
| 1620 | 2026-01-14T21:22:46.594Z | TRAC | test_vpc_firewall (sensor-poller): interval elapsed, polling SP...
chassis_type = Sled
sp_slot = 0
|
| 1621 | 2026-01-14T21:22:46.594Z | TRAC | test_vpc_firewall (sensor-poller): interval elapsed, polling SP...
chassis_type = Sled
sp_slot = 1
|
| 1622 | 2026-01-14T21:22:46.594Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch1
request = Message { header: Header { version: 22, message_id: 59 }, kind: MgsRequest(SpState) }
|
| 1623 | 2026-01-14T21:22:46.594Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch0
request = Message { header: Header { version: 22, message_id: 76 }, kind: MgsRequest(SpState) }
|
| 1624 | 2026-01-14T21:22:46.594Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 108 }, kind: MgsRequest(SpState) }
|
| 1625 | 2026-01-14T21:22:46.594Z | DEBG | test_vpc_firewall: received state request
reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) }
slot = sidecar 0
|
| 1626 | 2026-01-14T21:22:46.594Z | DEBG | test_vpc_firewall: received state request
reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) }
slot = sidecar 1
|
| 1627 | 2026-01-14T21:22:46.594Z | DEBG | test_vpc_firewall: received state request
reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) }
slot = gimlet 0
|
| 1628 | 2026-01-14T21:22:46.594Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 81 }
interface = fake-sled1
response = CabooseValue
|
| 1629 | 2026-01-14T21:22:46.594Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 82 }, kind: MgsRequest(SpState) }
|
| 1630 | 2026-01-14T21:22:46.594Z | DEBG | test_vpc_firewall: received state request
reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) }
slot = gimlet 1
|
| 1631 | 2026-01-14T21:22:46.594Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 76 }
interface = fake-switch0
response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
|
| 1632 | 2026-01-14T21:22:46.594Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 59 }
interface = fake-switch1
response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
|
| 1633 | 2026-01-14T21:22:46.594Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 108 }
interface = fake-sled0
response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
|
| 1634 | 2026-01-14T21:22:46.594Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch0
request = Message { header: Header { version: 22, message_id: 77 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-0" }, offset: 0 }) }
|
| 1635 | 2026-01-14T21:22:46.594Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch1
request = Message { header: Header { version: 22, message_id: 60 }, kind: MgsRequest(SpState) }
|
| 1636 | 2026-01-14T21:22:46.594Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 109 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-1" }, offset: 0 }) }
|
| 1637 | 2026-01-14T21:22:46.595Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-0" }): asked for number of component details
num_details = 1
slot = sidecar 0
|
| 1638 | 2026-01-14T21:22:46.595Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-0" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Southwest", kind: Temperature, value: Ok(41.789063) })
index = 0
slot = sidecar 0
|
| 1639 | 2026-01-14T21:22:46.595Z | DEBG | test_vpc_firewall: received state request
reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) }
slot = sidecar 1
|
| 1640 | 2026-01-14T21:22:46.595Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-1" }): asked for number of component details
num_details = 1
slot = gimlet 0
|
| 1641 | 2026-01-14T21:22:46.595Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-1" }): asked for component details for a sensor
details = Measurement(Measurement { name: "South", kind: Temperature, value: Ok(42.5625) })
index = 0
slot = gimlet 0
|
| 1642 | 2026-01-14T21:22:46.595Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 82 }
interface = fake-sled1
response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
|
| 1643 | 2026-01-14T21:22:46.595Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 83 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "rot" }, slot: 0, key: [78, 65, 77, 69] }) }
|
| 1644 | 2026-01-14T21:22:46.595Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 77 }
interface = fake-switch0
response = ComponentDetails(TlvPage { offset: 0, total: 1 })
|
| 1645 | 2026-01-14T21:22:46.595Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 60 }
interface = fake-switch1
response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
|
| 1646 | 2026-01-14T21:22:46.595Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 109 }
interface = fake-sled0
response = ComponentDetails(TlvPage { offset: 0, total: 1 })
|
| 1647 | 2026-01-14T21:22:46.603Z | TRAC | test_vpc_firewall (sensor-poller): polled SP, no samples returned
chassis_type = Switch
num_samples = 0
sp_slot = 1
|
| 1648 | 2026-01-14T21:22:46.603Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch0
request = Message { header: Header { version: 22, message_id: 78 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-1" }, offset: 0 }) }
|
| 1649 | 2026-01-14T21:22:46.603Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 110 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-2" }, offset: 0 }) }
|
| 1650 | 2026-01-14T21:22:46.604Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-1" }): asked for number of component details
num_details = 1
slot = sidecar 0
|
| 1651 | 2026-01-14T21:22:46.604Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-1" }): asked for component details for a sensor
details = Measurement(Measurement { name: "South", kind: Temperature, value: Err(DeviceError) })
index = 0
slot = sidecar 0
|
| 1652 | 2026-01-14T21:22:46.604Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-2" }): asked for number of component details
num_details = 1
slot = gimlet 0
|
| 1653 | 2026-01-14T21:22:46.604Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-2" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Southeast", kind: Temperature, value: Ok(41.570313) })
index = 0
slot = gimlet 0
|
| 1654 | 2026-01-14T21:22:46.604Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 83 }
interface = fake-sled1
response = CabooseValue
|
| 1655 | 2026-01-14T21:22:46.604Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 84 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-8" }, offset: 0 }) }
|
| 1656 | 2026-01-14T21:22:46.604Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-8" }): asked for number of component details
num_details = 1
slot = gimlet 1
|
| 1657 | 2026-01-14T21:22:46.604Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-8" }): asked for component details for a sensor
details = Measurement(Measurement { name: "U2_N0", kind: Temperature, value: Ok(56.0) })
index = 0
slot = gimlet 1
|
| 1658 | 2026-01-14T21:22:46.604Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 78 }
interface = fake-switch0
response = ComponentDetails(TlvPage { offset: 0, total: 1 })
|
| 1659 | 2026-01-14T21:22:46.604Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 110 }
interface = fake-sled0
response = ComponentDetails(TlvPage { offset: 0, total: 1 })
|
| 1660 | 2026-01-14T21:22:46.606Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch0
request = Message { header: Header { version: 22, message_id: 79 }, kind: MgsRequest(SpState) }
|
| 1661 | 2026-01-14T21:22:46.606Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 111 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-0" }, offset: 0 }) }
|
| 1662 | 2026-01-14T21:22:46.606Z | DEBG | test_vpc_firewall: received state request
reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) }
slot = sidecar 0
|
| 1663 | 2026-01-14T21:22:46.606Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-0" }): asked for number of component details
num_details = 1
slot = gimlet 0
|
| 1664 | 2026-01-14T21:22:46.606Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-0" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Southwest", kind: Temperature, value: Err(DeviceError) })
index = 0
slot = gimlet 0
|
| 1665 | 2026-01-14T21:22:46.606Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 84 }
interface = fake-sled1
response = ComponentDetails(TlvPage { offset: 0, total: 1 })
|
| 1666 | 2026-01-14T21:22:46.606Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 85 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "rot" }, slot: 0, key: [86, 69, 82, 83] }) }
|
| 1667 | 2026-01-14T21:22:46.607Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 79 }
interface = fake-switch0
response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
|
| 1668 | 2026-01-14T21:22:46.608Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 111 }
interface = fake-sled0
response = ComponentDetails(TlvPage { offset: 0, total: 1 })
|
| 1669 | 2026-01-14T21:22:46.608Z | TRAC | test_vpc_firewall (sensor-poller): polled SP successfully
chassis_type = Switch
num_samples = 3
sp_slot = 0
|
| 1670 | 2026-01-14T21:22:46.609Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 112 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-7" }, offset: 0 }) }
|
| 1671 | 2026-01-14T21:22:46.609Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-7" }): asked for number of component details
num_details = 4
slot = gimlet 0
|
| 1672 | 2026-01-14T21:22:46.609Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor
details = Measurement(Measurement { name: "V12_U2A_A0", kind: Current, value: Ok(0.45898438) })
index = 0
slot = gimlet 0
|
| 1673 | 2026-01-14T21:22:46.609Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor
details = Measurement(Measurement { name: "V3P3_U2A_A0", kind: Current, value: Ok(0.024414063) })
index = 1
slot = gimlet 0
|
| 1674 | 2026-01-14T21:22:46.609Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor
details = Measurement(Measurement { name: "V12_U2A_A0", kind: Voltage, value: Ok(12.03125) })
index = 2
slot = gimlet 0
|
| 1675 | 2026-01-14T21:22:46.609Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor
details = Measurement(Measurement { name: "V3P3_U2A_A0", kind: Voltage, value: Ok(3.328125) })
index = 3
slot = gimlet 0
|
| 1676 | 2026-01-14T21:22:46.609Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 85 }
interface = fake-sled1
response = CabooseValue
|
| 1677 | 2026-01-14T21:22:46.609Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 86 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-46" }, offset: 0 }) }
|
| 1678 | 2026-01-14T21:22:46.610Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-46" }): asked for number of component details
num_details = 1
slot = gimlet 1
|
| 1679 | 2026-01-14T21:22:46.610Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-46" }): asked for component details for a sensor
details = Measurement(Measurement { name: "CPU", kind: Temperature, value: Ok(62.6) })
index = 0
slot = gimlet 1
|
| 1680 | 2026-01-14T21:22:46.610Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 112 }
interface = fake-sled0
response = ComponentDetails(TlvPage { offset: 0, total: 4 })
|
| 1681 | 2026-01-14T21:22:46.612Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 113 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-39" }, offset: 0 }) }
|
| 1682 | 2026-01-14T21:22:46.612Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-39" }): asked for number of component details
num_details = 1
slot = gimlet 0
|
| 1683 | 2026-01-14T21:22:46.612Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-39" }): asked for component details for a sensor
details = Measurement(Measurement { name: "t6", kind: Temperature, value: Ok(70.625) })
index = 0
slot = gimlet 0
|
| 1684 | 2026-01-14T21:22:46.612Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 86 }
interface = fake-sled1
response = ComponentDetails(TlvPage { offset: 0, total: 1 })
|
| 1685 | 2026-01-14T21:22:46.612Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 87 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "rot" }, slot: 0, key: [83, 73, 71, 78] }) }
|
| 1686 | 2026-01-14T21:22:46.614Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 113 }
interface = fake-sled0
response = ComponentDetails(TlvPage { offset: 0, total: 1 })
|
| 1687 | 2026-01-14T21:22:46.614Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 114 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-46" }, offset: 0 }) }
|
| 1688 | 2026-01-14T21:22:46.614Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-46" }): asked for number of component details
num_details = 1
slot = gimlet 0
|
| 1689 | 2026-01-14T21:22:46.615Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-46" }): asked for component details for a sensor
details = Measurement(Measurement { name: "CPU", kind: Temperature, value: Ok(64.5) })
index = 0
slot = gimlet 0
|
| 1690 | 2026-01-14T21:22:46.615Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 87 }
interface = fake-sled1
response = CabooseValue
|
| 1691 | 2026-01-14T21:22:46.615Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 88 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-53" }, offset: 0 }) }
|
| 1692 | 2026-01-14T21:22:46.615Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for number of component details
num_details = 6
slot = gimlet 1
|
| 1693 | 2026-01-14T21:22:46.615Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Southeast", kind: Speed, value: Ok(2510.0) })
index = 0
slot = gimlet 1
|
| 1694 | 2026-01-14T21:22:46.615Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Northeast", kind: Speed, value: Ok(2390.0) })
index = 1
slot = gimlet 1
|
| 1695 | 2026-01-14T21:22:46.615Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor
details = Measurement(Measurement { name: "South", kind: Speed, value: Ok(2467.0) })
index = 2
slot = gimlet 1
|
| 1696 | 2026-01-14T21:22:46.615Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor
details = Measurement(Measurement { name: "North", kind: Speed, value: Ok(2195.0) })
index = 3
slot = gimlet 1
|
| 1697 | 2026-01-14T21:22:46.615Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Southwest", kind: Speed, value: Ok(2680.0) })
index = 4
slot = gimlet 1
|
| 1698 | 2026-01-14T21:22:46.615Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Northwest", kind: Speed, value: Ok(2212.0) })
index = 5
slot = gimlet 1
|
| 1699 | 2026-01-14T21:22:46.615Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 114 }
interface = fake-sled0
response = ComponentDetails(TlvPage { offset: 0, total: 1 })
|
| 1700 | 2026-01-14T21:22:46.615Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 115 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-8" }, offset: 0 }) }
|
| 1701 | 2026-01-14T21:22:46.615Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-8" }): asked for number of component details
num_details = 1
slot = gimlet 0
|
| 1702 | 2026-01-14T21:22:46.615Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-8" }): asked for component details for a sensor
details = Measurement(Measurement { name: "U2_N0", kind: Temperature, value: Ok(56.0) })
index = 0
slot = gimlet 0
|
| 1703 | 2026-01-14T21:22:46.615Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 88 }
interface = fake-sled1
response = ComponentDetails(TlvPage { offset: 0, total: 6 })
|
| 1704 | 2026-01-14T21:22:46.616Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 89 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "rot" }, slot: 0, key: [69, 80, 79, 67] }) }
|
| 1705 | 2026-01-14T21:22:46.621Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 115 }
interface = fake-sled0
response = ComponentDetails(TlvPage { offset: 0, total: 1 })
|
| 1706 | 2026-01-14T21:22:46.628Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 116 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-53" }, offset: 0 }) }
|
| 1707 | 2026-01-14T21:22:46.628Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for number of component details
num_details = 6
slot = gimlet 0
|
| 1708 | 2026-01-14T21:22:46.628Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Southeast", kind: Speed, value: Ok(2607.0) })
index = 0
slot = gimlet 0
|
| 1709 | 2026-01-14T21:22:46.631Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Northeast", kind: Speed, value: Ok(2476.0) })
index = 1
slot = gimlet 0
|
| 1710 | 2026-01-14T21:22:46.643Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor
details = Measurement(Measurement { name: "South", kind: Speed, value: Ok(2553.0) })
index = 2
slot = gimlet 0
|
| 1711 | 2026-01-14T21:22:46.649Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor
details = Measurement(Measurement { name: "North", kind: Speed, value: Ok(2265.0) })
index = 3
slot = gimlet 0
|
| 1712 | 2026-01-14T21:22:46.650Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Southwest", kind: Speed, value: Ok(2649.0) })
index = 4
slot = gimlet 0
|
| 1713 | 2026-01-14T21:22:46.650Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Northwest", kind: Speed, value: Ok(2275.0) })
index = 5
slot = gimlet 0
|
| 1714 | 2026-01-14T21:22:46.650Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 89 }
interface = fake-sled1
response = Error(NoSuchCabooseKey([69, 80, 79, 67]))
|
| 1715 | 2026-01-14T21:22:46.650Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 90 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-0" }, offset: 0 }) }
|
| 1716 | 2026-01-14T21:22:46.656Z | INFO | test_vpc_firewall (dropshot): request completed
latency_us = 63214
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:62232
req_id = 90534d2a-d5d9-410e-8b04-65591f7a3e0d
response_code = 200
uri = /sp/sled/1/component/rot/caboose?firmware_slot=0
|
| 1717 | 2026-01-14T21:22:46.658Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-0" }): asked for number of component details
num_details = 1
slot = gimlet 1
|
| 1718 | 2026-01-14T21:22:46.659Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-0" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Southwest", kind: Temperature, value: Ok(41.3629) })
index = 0
slot = gimlet 1
|
| 1719 | 2026-01-14T21:22:46.659Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 116 }
interface = fake-sled0
response = ComponentDetails(TlvPage { offset: 0, total: 6 })
|
| 1720 | 2026-01-14T21:22:46.665Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 117 }, kind: MgsRequest(SpState) }
|
| 1721 | 2026-01-14T21:22:46.666Z | TRAC | test_vpc_firewall (dropshot): incoming request
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:62232
req_id = c21c9d1c-e655-41ff-b32b-10120ab54206
uri = /sp/sled/1/component/rot/caboose?firmware_slot=1
|
| 1722 | 2026-01-14T21:22:46.667Z | DEBG | test_vpc_firewall (dropshot): determined request API version
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:62232
req_id = c21c9d1c-e655-41ff-b32b-10120ab54206
uri = /sp/sled/1/component/rot/caboose?firmware_slot=1
version = 3.0.0
|
| 1723 | 2026-01-14T21:22:46.668Z | DEBG | test_vpc_firewall: received state request
reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) }
slot = gimlet 0
|
| 1724 | 2026-01-14T21:22:46.669Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 90 }
interface = fake-sled1
response = ComponentDetails(TlvPage { offset: 0, total: 1 })
|
| 1725 | 2026-01-14T21:22:46.671Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 91 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "rot" }, slot: 1, key: [71, 73, 84, 67] }) }
|
| 1726 | 2026-01-14T21:22:46.673Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 117 }
interface = fake-sled0
response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
|
| 1727 | 2026-01-14T21:22:46.674Z | TRAC | test_vpc_firewall (sensor-poller): polled SP successfully
chassis_type = Sled
num_samples = 17
sp_slot = 0
|
| 1728 | 2026-01-14T21:22:46.681Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 91 }
interface = fake-sled1
response = CabooseValue
|
| 1729 | 2026-01-14T21:22:46.681Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 92 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-2" }, offset: 0 }) }
|
| 1730 | 2026-01-14T21:22:46.683Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-2" }): asked for number of component details
num_details = 1
slot = gimlet 1
|
| 1731 | 2026-01-14T21:22:46.683Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-2" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Southeast", kind: Temperature, value: Ok(41.570313) })
index = 0
slot = gimlet 1
|
| 1732 | 2026-01-14T21:22:46.683Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 92 }
interface = fake-sled1
response = ComponentDetails(TlvPage { offset: 0, total: 1 })
|
| 1733 | 2026-01-14T21:22:46.684Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 93 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "rot" }, slot: 1, key: [66, 79, 82, 68] }) }
|
| 1734 | 2026-01-14T21:22:46.685Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 93 }
interface = fake-sled1
response = CabooseValue
|
| 1735 | 2026-01-14T21:22:46.685Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 94 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-1" }, offset: 0 }) }
|
| 1736 | 2026-01-14T21:22:46.686Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-1" }): asked for number of component details
num_details = 1
slot = gimlet 1
|
| 1737 | 2026-01-14T21:22:46.686Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-1" }): asked for component details for a sensor
details = Measurement(Measurement { name: "South", kind: Temperature, value: Ok(42.5625) })
index = 0
slot = gimlet 1
|
| 1738 | 2026-01-14T21:22:46.686Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 94 }
interface = fake-sled1
response = ComponentDetails(TlvPage { offset: 0, total: 1 })
|
| 1739 | 2026-01-14T21:22:46.686Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 95 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "rot" }, slot: 1, key: [78, 65, 77, 69] }) }
|
| 1740 | 2026-01-14T21:22:46.687Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 95 }
interface = fake-sled1
response = CabooseValue
|
| 1741 | 2026-01-14T21:22:46.687Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 96 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-7" }, offset: 0 }) }
|
| 1742 | 2026-01-14T21:22:46.687Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-7" }): asked for number of component details
num_details = 4
slot = gimlet 1
|
| 1743 | 2026-01-14T21:22:46.687Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor
details = Measurement(Measurement { name: "V12_U2A_A0", kind: Current, value: Ok(0.41893438) })
index = 0
slot = gimlet 1
|
| 1744 | 2026-01-14T21:22:46.687Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor
details = Measurement(Measurement { name: "V3P3_U2A_A0", kind: Current, value: Ok(0.025614602) })
index = 1
slot = gimlet 1
|
| 1745 | 2026-01-14T21:22:46.687Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor
details = Measurement(Measurement { name: "V12_U2A_A0", kind: Voltage, value: Ok(12.02914) })
index = 2
slot = gimlet 1
|
| 1746 | 2026-01-14T21:22:46.687Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor
details = Measurement(Measurement { name: "V3P3_U2A_A0", kind: Voltage, value: Ok(3.2618) })
index = 3
slot = gimlet 1
|
| 1747 | 2026-01-14T21:22:46.687Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 96 }
interface = fake-sled1
response = ComponentDetails(TlvPage { offset: 0, total: 4 })
|
| 1748 | 2026-01-14T21:22:46.687Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 97 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "rot" }, slot: 1, key: [86, 69, 82, 83] }) }
|
| 1749 | 2026-01-14T21:22:46.690Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 97 }
interface = fake-sled1
response = CabooseValue
|
| 1750 | 2026-01-14T21:22:46.690Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 98 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-39" }, offset: 0 }) }
|
| 1751 | 2026-01-14T21:22:46.690Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-39" }): asked for number of component details
num_details = 1
slot = gimlet 1
|
| 1752 | 2026-01-14T21:22:46.690Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-39" }): asked for component details for a sensor
details = Measurement(Measurement { name: "t6", kind: Temperature, value: Ok(70.625) })
index = 0
slot = gimlet 1
|
| 1753 | 2026-01-14T21:22:46.690Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 98 }
interface = fake-sled1
response = ComponentDetails(TlvPage { offset: 0, total: 1 })
|
| 1754 | 2026-01-14T21:22:46.690Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 99 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "rot" }, slot: 1, key: [83, 73, 71, 78] }) }
|
| 1755 | 2026-01-14T21:22:46.691Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 99 }
interface = fake-sled1
response = CabooseValue
|
| 1756 | 2026-01-14T21:22:46.691Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 100 }, kind: MgsRequest(SpState) }
|
| 1757 | 2026-01-14T21:22:46.691Z | DEBG | test_vpc_firewall: received state request
reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) }
slot = gimlet 1
|
| 1758 | 2026-01-14T21:22:46.691Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 100 }
interface = fake-sled1
response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
|
| 1759 | 2026-01-14T21:22:46.691Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 101 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "rot" }, slot: 1, key: [69, 80, 79, 67] }) }
|
| 1760 | 2026-01-14T21:22:46.691Z | TRAC | test_vpc_firewall (sensor-poller): polled SP successfully
chassis_type = Sled
num_samples = 16
sp_slot = 1
|
| 1761 | 2026-01-14T21:22:46.692Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 101 }
interface = fake-sled1
response = Error(NoSuchCabooseKey([69, 80, 79, 67]))
|
| 1762 | 2026-01-14T21:22:46.692Z | INFO | test_vpc_firewall (dropshot): request completed
latency_us = 25402
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:62232
req_id = c21c9d1c-e655-41ff-b32b-10120ab54206
response_code = 200
uri = /sp/sled/1/component/rot/caboose?firmware_slot=1
|
| 1763 | 2026-01-14T21:22:46.693Z | TRAC | test_vpc_firewall (dropshot): incoming request
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:62232
req_id = 75f146a6-bbf0-47b3-a3f9-32fbac549b1e
uri = /sp/sled/1/component/stage0/caboose?firmware_slot=0
|
| 1764 | 2026-01-14T21:22:46.693Z | DEBG | test_vpc_firewall (dropshot): determined request API version
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:62232
req_id = 75f146a6-bbf0-47b3-a3f9-32fbac549b1e
uri = /sp/sled/1/component/stage0/caboose?firmware_slot=0
version = 3.0.0
|
| 1765 | 2026-01-14T21:22:46.693Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 102 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "stage0" }, slot: 0, key: [71, 73, 84, 67] }) }
|
| 1766 | 2026-01-14T21:22:46.693Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 102 }
interface = fake-sled1
response = CabooseValue
|
| 1767 | 2026-01-14T21:22:46.693Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 103 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "stage0" }, slot: 0, key: [66, 79, 82, 68] }) }
|
| 1768 | 2026-01-14T21:22:46.694Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 103 }
interface = fake-sled1
response = CabooseValue
|
| 1769 | 2026-01-14T21:22:46.694Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 104 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "stage0" }, slot: 0, key: [78, 65, 77, 69] }) }
|
| 1770 | 2026-01-14T21:22:46.694Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 104 }
interface = fake-sled1
response = CabooseValue
|
| 1771 | 2026-01-14T21:22:46.694Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 105 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "stage0" }, slot: 0, key: [86, 69, 82, 83] }) }
|
| 1772 | 2026-01-14T21:22:46.694Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 105 }
interface = fake-sled1
response = CabooseValue
|
| 1773 | 2026-01-14T21:22:46.694Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 106 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "stage0" }, slot: 0, key: [83, 73, 71, 78] }) }
|
| 1774 | 2026-01-14T21:22:46.695Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 106 }
interface = fake-sled1
response = CabooseValue
|
| 1775 | 2026-01-14T21:22:46.695Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 107 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "stage0" }, slot: 0, key: [69, 80, 79, 67] }) }
|
| 1776 | 2026-01-14T21:22:46.695Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 107 }
interface = fake-sled1
response = Error(NoSuchCabooseKey([69, 80, 79, 67]))
|
| 1777 | 2026-01-14T21:22:46.695Z | INFO | test_vpc_firewall (dropshot): request completed
latency_us = 1997
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:62232
req_id = 75f146a6-bbf0-47b3-a3f9-32fbac549b1e
response_code = 200
uri = /sp/sled/1/component/stage0/caboose?firmware_slot=0
|
| 1778 | 2026-01-14T21:22:46.696Z | TRAC | test_vpc_firewall (dropshot): incoming request
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:62232
req_id = 26a34c36-efec-4007-890e-bc5d6fb60d07
uri = /sp/sled/1/component/stage0/caboose?firmware_slot=1
|
| 1779 | 2026-01-14T21:22:46.696Z | DEBG | test_vpc_firewall (dropshot): determined request API version
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:62232
req_id = 26a34c36-efec-4007-890e-bc5d6fb60d07
uri = /sp/sled/1/component/stage0/caboose?firmware_slot=1
version = 3.0.0
|
| 1780 | 2026-01-14T21:22:46.696Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 108 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "stage0" }, slot: 1, key: [71, 73, 84, 67] }) }
|
| 1781 | 2026-01-14T21:22:46.696Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 108 }
interface = fake-sled1
response = CabooseValue
|
| 1782 | 2026-01-14T21:22:46.696Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 109 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "stage0" }, slot: 1, key: [66, 79, 82, 68] }) }
|
| 1783 | 2026-01-14T21:22:46.696Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 109 }
interface = fake-sled1
response = CabooseValue
|
| 1784 | 2026-01-14T21:22:46.697Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 110 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "stage0" }, slot: 1, key: [78, 65, 77, 69] }) }
|
| 1785 | 2026-01-14T21:22:46.697Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 110 }
interface = fake-sled1
response = CabooseValue
|
| 1786 | 2026-01-14T21:22:46.697Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 111 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "stage0" }, slot: 1, key: [86, 69, 82, 83] }) }
|
| 1787 | 2026-01-14T21:22:46.697Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 111 }
interface = fake-sled1
response = CabooseValue
|
| 1788 | 2026-01-14T21:22:46.697Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 112 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "stage0" }, slot: 1, key: [83, 73, 71, 78] }) }
|
| 1789 | 2026-01-14T21:22:46.697Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 112 }
interface = fake-sled1
response = CabooseValue
|
| 1790 | 2026-01-14T21:22:46.697Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 113 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "stage0" }, slot: 1, key: [69, 80, 79, 67] }) }
|
| 1791 | 2026-01-14T21:22:46.697Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 113 }
interface = fake-sled1
response = Error(NoSuchCabooseKey([69, 80, 79, 67]))
|
| 1792 | 2026-01-14T21:22:46.698Z | INFO | test_vpc_firewall (dropshot): request completed
latency_us = 1728
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:62232
req_id = 26a34c36-efec-4007-890e-bc5d6fb60d07
response_code = 200
uri = /sp/sled/1/component/stage0/caboose?firmware_slot=1
|
| 1793 | 2026-01-14T21:22:46.698Z | TRAC | test_vpc_firewall (dropshot): incoming request
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:62232
req_id = 0a18bf5e-283e-4b36-909c-0c3c0ced79d1
uri = /sp/sled/1/component/rot/cmpa
|
| 1794 | 2026-01-14T21:22:46.698Z | DEBG | test_vpc_firewall (dropshot): determined request API version
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:62232
req_id = 0a18bf5e-283e-4b36-909c-0c3c0ced79d1
uri = /sp/sled/1/component/rot/cmpa
version = 3.0.0
|
| 1795 | 2026-01-14T21:22:46.699Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 114 }, kind: MgsRequest(ReadRot(ReadCmpa)) }
|
| 1796 | 2026-01-14T21:22:46.699Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 114 }
interface = fake-sled1
response = ReadRot(Ok)
|
| 1797 | 2026-01-14T21:22:46.699Z | INFO | test_vpc_firewall (dropshot): request completed
latency_us = 627
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:62232
req_id = 0a18bf5e-283e-4b36-909c-0c3c0ced79d1
response_code = 200
uri = /sp/sled/1/component/rot/cmpa
|
| 1798 | 2026-01-14T21:22:46.700Z | TRAC | test_vpc_firewall (dropshot): incoming request
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:62232
req_id = fbf767b6-a9ff-4409-bf09-c9bd9ac460a7
uri = /sp/sled/1/component/rot/cfpa
|
| 1799 | 2026-01-14T21:22:46.700Z | DEBG | test_vpc_firewall (dropshot): determined request API version
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:62232
req_id = fbf767b6-a9ff-4409-bf09-c9bd9ac460a7
uri = /sp/sled/1/component/rot/cfpa
version = 3.0.0
|
| 1800 | 2026-01-14T21:22:46.700Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 115 }, kind: MgsRequest(ReadRot(ReadCfpa(Active))) }
|
| 1801 | 2026-01-14T21:22:46.700Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 115 }
interface = fake-sled1
response = ReadRot(Ok)
|
| 1802 | 2026-01-14T21:22:46.701Z | INFO | test_vpc_firewall (dropshot): request completed
latency_us = 748
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:62232
req_id = fbf767b6-a9ff-4409-bf09-c9bd9ac460a7
response_code = 200
uri = /sp/sled/1/component/rot/cfpa
|
| 1803 | 2026-01-14T21:22:46.701Z | TRAC | test_vpc_firewall (dropshot): incoming request
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:62232
req_id = 6e7d76b3-5844-4bea-b59b-dde7bcf78e19
uri = /sp/sled/1/component/rot/cfpa
|
| 1804 | 2026-01-14T21:22:46.702Z | DEBG | test_vpc_firewall (dropshot): determined request API version
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:62232
req_id = 6e7d76b3-5844-4bea-b59b-dde7bcf78e19
uri = /sp/sled/1/component/rot/cfpa
version = 3.0.0
|
| 1805 | 2026-01-14T21:22:46.702Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 116 }, kind: MgsRequest(ReadRot(ReadCfpa(Inactive))) }
|
| 1806 | 2026-01-14T21:22:46.702Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 116 }
interface = fake-sled1
response = ReadRot(Ok)
|
| 1807 | 2026-01-14T21:22:46.702Z | INFO | test_vpc_firewall (dropshot): request completed
latency_us = 1130
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:62232
req_id = 6e7d76b3-5844-4bea-b59b-dde7bcf78e19
response_code = 200
uri = /sp/sled/1/component/rot/cfpa
|
| 1808 | 2026-01-14T21:22:46.707Z | TRAC | test_vpc_firewall (dropshot): incoming request
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:62232
req_id = 35ce774c-51eb-4812-8e25-fd1c255238a2
uri = /sp/sled/1/component/rot/cfpa
|
| 1809 | 2026-01-14T21:22:46.707Z | DEBG | test_vpc_firewall (dropshot): determined request API version
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:62232
req_id = 35ce774c-51eb-4812-8e25-fd1c255238a2
uri = /sp/sled/1/component/rot/cfpa
version = 3.0.0
|
| 1810 | 2026-01-14T21:22:46.707Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 117 }, kind: MgsRequest(ReadRot(ReadCfpa(Scratch))) }
|
| 1811 | 2026-01-14T21:22:46.707Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 117 }
interface = fake-sled1
response = ReadRot(Ok)
|
| 1812 | 2026-01-14T21:22:46.707Z | INFO | test_vpc_firewall (dropshot): request completed
latency_us = 543
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:62232
req_id = 35ce774c-51eb-4812-8e25-fd1c255238a2
response_code = 200
uri = /sp/sled/1/component/rot/cfpa
|
| 1813 | 2026-01-14T21:22:47.594Z | TRAC | test_vpc_firewall (sensor-poller): interval elapsed, polling SP...
chassis_type = Switch
sp_slot = 1
|
| 1814 | 2026-01-14T21:22:47.595Z | TRAC | test_vpc_firewall (sensor-poller): interval elapsed, polling SP...
chassis_type = Switch
sp_slot = 0
|
| 1815 | 2026-01-14T21:22:47.595Z | TRAC | test_vpc_firewall (sensor-poller): interval elapsed, polling SP...
chassis_type = Sled
sp_slot = 0
|
| 1816 | 2026-01-14T21:22:47.595Z | TRAC | test_vpc_firewall (sensor-poller): interval elapsed, polling SP...
chassis_type = Sled
sp_slot = 1
|
| 1817 | 2026-01-14T21:22:47.595Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch1
request = Message { header: Header { version: 22, message_id: 61 }, kind: MgsRequest(SpState) }
|
| 1818 | 2026-01-14T21:22:47.595Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch0
request = Message { header: Header { version: 22, message_id: 80 }, kind: MgsRequest(SpState) }
|
| 1819 | 2026-01-14T21:22:47.602Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 118 }, kind: MgsRequest(SpState) }
|
| 1820 | 2026-01-14T21:22:47.602Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 118 }, kind: MgsRequest(SpState) }
|
| 1821 | 2026-01-14T21:22:47.602Z | DEBG | test_vpc_firewall: received state request
reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) }
slot = sidecar 0
|
| 1822 | 2026-01-14T21:22:47.602Z | DEBG | test_vpc_firewall: received state request
reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) }
slot = sidecar 1
|
| 1823 | 2026-01-14T21:22:47.602Z | DEBG | test_vpc_firewall: received state request
reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) }
slot = gimlet 0
|
| 1824 | 2026-01-14T21:22:47.602Z | DEBG | test_vpc_firewall: received state request
reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) }
slot = gimlet 1
|
| 1825 | 2026-01-14T21:22:47.603Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 80 }
interface = fake-switch0
response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
|
| 1826 | 2026-01-14T21:22:47.603Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 61 }
interface = fake-switch1
response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
|
| 1827 | 2026-01-14T21:22:47.603Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 118 }
interface = fake-sled0
response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
|
| 1828 | 2026-01-14T21:22:47.603Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 118 }
interface = fake-sled1
response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
|
| 1829 | 2026-01-14T21:22:47.603Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch0
request = Message { header: Header { version: 22, message_id: 81 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-0" }, offset: 0 }) }
|
| 1830 | 2026-01-14T21:22:47.603Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch1
request = Message { header: Header { version: 22, message_id: 62 }, kind: MgsRequest(SpState) }
|
| 1831 | 2026-01-14T21:22:47.603Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 119 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-1" }, offset: 0 }) }
|
| 1832 | 2026-01-14T21:22:47.603Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 119 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-8" }, offset: 0 }) }
|
| 1833 | 2026-01-14T21:22:47.603Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-0" }): asked for number of component details
num_details = 1
slot = sidecar 0
|
| 1834 | 2026-01-14T21:22:47.603Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-0" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Southwest", kind: Temperature, value: Ok(41.789063) })
index = 0
slot = sidecar 0
|
| 1835 | 2026-01-14T21:22:47.603Z | DEBG | test_vpc_firewall: received state request
reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) }
slot = sidecar 1
|
| 1836 | 2026-01-14T21:22:47.603Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-1" }): asked for number of component details
num_details = 1
slot = gimlet 0
|
| 1837 | 2026-01-14T21:22:47.603Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-1" }): asked for component details for a sensor
details = Measurement(Measurement { name: "South", kind: Temperature, value: Ok(42.5625) })
index = 0
slot = gimlet 0
|
| 1838 | 2026-01-14T21:22:47.603Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-8" }): asked for number of component details
num_details = 1
slot = gimlet 1
|
| 1839 | 2026-01-14T21:22:47.603Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-8" }): asked for component details for a sensor
details = Measurement(Measurement { name: "U2_N0", kind: Temperature, value: Ok(56.0) })
index = 0
slot = gimlet 1
|
| 1840 | 2026-01-14T21:22:47.603Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 81 }
interface = fake-switch0
response = ComponentDetails(TlvPage { offset: 0, total: 1 })
|
| 1841 | 2026-01-14T21:22:47.604Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 62 }
interface = fake-switch1
response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
|
| 1842 | 2026-01-14T21:22:47.604Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 119 }
interface = fake-sled0
response = ComponentDetails(TlvPage { offset: 0, total: 1 })
|
| 1843 | 2026-01-14T21:22:47.604Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 119 }
interface = fake-sled1
response = ComponentDetails(TlvPage { offset: 0, total: 1 })
|
| 1844 | 2026-01-14T21:22:47.605Z | TRAC | test_vpc_firewall (sensor-poller): polled SP, no samples returned
chassis_type = Switch
num_samples = 0
sp_slot = 1
|
| 1845 | 2026-01-14T21:22:47.607Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch0
request = Message { header: Header { version: 22, message_id: 82 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-1" }, offset: 0 }) }
|
| 1846 | 2026-01-14T21:22:47.607Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 120 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-2" }, offset: 0 }) }
|
| 1847 | 2026-01-14T21:22:47.607Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 120 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-46" }, offset: 0 }) }
|
| 1848 | 2026-01-14T21:22:47.608Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-1" }): asked for number of component details
num_details = 1
slot = sidecar 0
|
| 1849 | 2026-01-14T21:22:47.608Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-1" }): asked for component details for a sensor
details = Measurement(Measurement { name: "South", kind: Temperature, value: Err(DeviceError) })
index = 0
slot = sidecar 0
|
| 1850 | 2026-01-14T21:22:47.608Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-2" }): asked for number of component details
num_details = 1
slot = gimlet 0
|
| 1851 | 2026-01-14T21:22:47.608Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-2" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Southeast", kind: Temperature, value: Ok(41.570313) })
index = 0
slot = gimlet 0
|
| 1852 | 2026-01-14T21:22:47.608Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-46" }): asked for number of component details
num_details = 1
slot = gimlet 1
|
| 1853 | 2026-01-14T21:22:47.608Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-46" }): asked for component details for a sensor
details = Measurement(Measurement { name: "CPU", kind: Temperature, value: Ok(62.6) })
index = 0
slot = gimlet 1
|
| 1854 | 2026-01-14T21:22:47.608Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 82 }
interface = fake-switch0
response = ComponentDetails(TlvPage { offset: 0, total: 1 })
|
| 1855 | 2026-01-14T21:22:47.608Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 120 }
interface = fake-sled0
response = ComponentDetails(TlvPage { offset: 0, total: 1 })
|
| 1856 | 2026-01-14T21:22:47.608Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 120 }
interface = fake-sled1
response = ComponentDetails(TlvPage { offset: 0, total: 1 })
|
| 1857 | 2026-01-14T21:22:47.611Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch0
request = Message { header: Header { version: 22, message_id: 83 }, kind: MgsRequest(SpState) }
|
| 1858 | 2026-01-14T21:22:47.611Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 121 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-0" }, offset: 0 }) }
|
| 1859 | 2026-01-14T21:22:47.611Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 121 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-53" }, offset: 0 }) }
|
| 1860 | 2026-01-14T21:22:47.613Z | DEBG | test_vpc_firewall: received state request
reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) }
slot = sidecar 0
|
| 1861 | 2026-01-14T21:22:47.613Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-0" }): asked for number of component details
num_details = 1
slot = gimlet 0
|
| 1862 | 2026-01-14T21:22:47.613Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-0" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Southwest", kind: Temperature, value: Err(DeviceError) })
index = 0
slot = gimlet 0
|
| 1863 | 2026-01-14T21:22:47.614Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for number of component details
num_details = 6
slot = gimlet 1
|
| 1864 | 2026-01-14T21:22:47.614Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Southeast", kind: Speed, value: Ok(2510.0) })
index = 0
slot = gimlet 1
|
| 1865 | 2026-01-14T21:22:47.614Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Northeast", kind: Speed, value: Ok(2390.0) })
index = 1
slot = gimlet 1
|
| 1866 | 2026-01-14T21:22:47.614Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor
details = Measurement(Measurement { name: "South", kind: Speed, value: Ok(2467.0) })
index = 2
slot = gimlet 1
|
| 1867 | 2026-01-14T21:22:47.614Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor
details = Measurement(Measurement { name: "North", kind: Speed, value: Ok(2195.0) })
index = 3
slot = gimlet 1
|
| 1868 | 2026-01-14T21:22:47.614Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Southwest", kind: Speed, value: Ok(2680.0) })
index = 4
slot = gimlet 1
|
| 1869 | 2026-01-14T21:22:47.614Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Northwest", kind: Speed, value: Ok(2212.0) })
index = 5
slot = gimlet 1
|
| 1870 | 2026-01-14T21:22:47.614Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 83 }
interface = fake-switch0
response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
|
| 1871 | 2026-01-14T21:22:47.614Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 121 }
interface = fake-sled0
response = ComponentDetails(TlvPage { offset: 0, total: 1 })
|
| 1872 | 2026-01-14T21:22:47.614Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 121 }
interface = fake-sled1
response = ComponentDetails(TlvPage { offset: 0, total: 6 })
|
| 1873 | 2026-01-14T21:22:47.614Z | TRAC | test_vpc_firewall (sensor-poller): polled SP successfully
chassis_type = Switch
num_samples = 3
sp_slot = 0
|
| 1874 | 2026-01-14T21:22:47.621Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 122 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-7" }, offset: 0 }) }
|
| 1875 | 2026-01-14T21:22:47.622Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 122 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-0" }, offset: 0 }) }
|
| 1876 | 2026-01-14T21:22:47.622Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-7" }): asked for number of component details
num_details = 4
slot = gimlet 0
|
| 1877 | 2026-01-14T21:22:47.622Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor
details = Measurement(Measurement { name: "V12_U2A_A0", kind: Current, value: Ok(0.45898438) })
index = 0
slot = gimlet 0
|
| 1878 | 2026-01-14T21:22:47.622Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor
details = Measurement(Measurement { name: "V3P3_U2A_A0", kind: Current, value: Ok(0.024414063) })
index = 1
slot = gimlet 0
|
| 1879 | 2026-01-14T21:22:47.622Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor
details = Measurement(Measurement { name: "V12_U2A_A0", kind: Voltage, value: Ok(12.03125) })
index = 2
slot = gimlet 0
|
| 1880 | 2026-01-14T21:22:47.622Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor
details = Measurement(Measurement { name: "V3P3_U2A_A0", kind: Voltage, value: Ok(3.328125) })
index = 3
slot = gimlet 0
|
| 1881 | 2026-01-14T21:22:47.622Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-0" }): asked for number of component details
num_details = 1
slot = gimlet 1
|
| 1882 | 2026-01-14T21:22:47.622Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-0" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Southwest", kind: Temperature, value: Ok(41.3629) })
index = 0
slot = gimlet 1
|
| 1883 | 2026-01-14T21:22:47.622Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 122 }
interface = fake-sled0
response = ComponentDetails(TlvPage { offset: 0, total: 4 })
|
| 1884 | 2026-01-14T21:22:47.622Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 122 }
interface = fake-sled1
response = ComponentDetails(TlvPage { offset: 0, total: 1 })
|
| 1885 | 2026-01-14T21:22:47.626Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 123 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-39" }, offset: 0 }) }
|
| 1886 | 2026-01-14T21:22:47.626Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 123 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-2" }, offset: 0 }) }
|
| 1887 | 2026-01-14T21:22:47.627Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-39" }): asked for number of component details
num_details = 1
slot = gimlet 0
|
| 1888 | 2026-01-14T21:22:47.627Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-39" }): asked for component details for a sensor
details = Measurement(Measurement { name: "t6", kind: Temperature, value: Ok(70.625) })
index = 0
slot = gimlet 0
|
| 1889 | 2026-01-14T21:22:47.628Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-2" }): asked for number of component details
num_details = 1
slot = gimlet 1
|
| 1890 | 2026-01-14T21:22:47.628Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-2" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Southeast", kind: Temperature, value: Ok(41.570313) })
index = 0
slot = gimlet 1
|
| 1891 | 2026-01-14T21:22:47.629Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 123 }
interface = fake-sled0
response = ComponentDetails(TlvPage { offset: 0, total: 1 })
|
| 1892 | 2026-01-14T21:22:47.629Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 123 }
interface = fake-sled1
response = ComponentDetails(TlvPage { offset: 0, total: 1 })
|
| 1893 | 2026-01-14T21:22:47.630Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 124 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-46" }, offset: 0 }) }
|
| 1894 | 2026-01-14T21:22:47.630Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 124 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-1" }, offset: 0 }) }
|
| 1895 | 2026-01-14T21:22:47.630Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-46" }): asked for number of component details
num_details = 1
slot = gimlet 0
|
| 1896 | 2026-01-14T21:22:47.630Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-46" }): asked for component details for a sensor
details = Measurement(Measurement { name: "CPU", kind: Temperature, value: Ok(64.5) })
index = 0
slot = gimlet 0
|
| 1897 | 2026-01-14T21:22:47.630Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-1" }): asked for number of component details
num_details = 1
slot = gimlet 1
|
| 1898 | 2026-01-14T21:22:47.630Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-1" }): asked for component details for a sensor
details = Measurement(Measurement { name: "South", kind: Temperature, value: Ok(42.5625) })
index = 0
slot = gimlet 1
|
| 1899 | 2026-01-14T21:22:47.631Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 124 }
interface = fake-sled0
response = ComponentDetails(TlvPage { offset: 0, total: 1 })
|
| 1900 | 2026-01-14T21:22:47.631Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 124 }
interface = fake-sled1
response = ComponentDetails(TlvPage { offset: 0, total: 1 })
|
| 1901 | 2026-01-14T21:22:47.632Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 125 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-8" }, offset: 0 }) }
|
| 1902 | 2026-01-14T21:22:47.633Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 125 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-7" }, offset: 0 }) }
|
| 1903 | 2026-01-14T21:22:47.637Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-8" }): asked for number of component details
num_details = 1
slot = gimlet 0
|
| 1904 | 2026-01-14T21:22:47.637Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-8" }): asked for component details for a sensor
details = Measurement(Measurement { name: "U2_N0", kind: Temperature, value: Ok(56.0) })
index = 0
slot = gimlet 0
|
| 1905 | 2026-01-14T21:22:47.637Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-7" }): asked for number of component details
num_details = 4
slot = gimlet 1
|
| 1906 | 2026-01-14T21:22:47.637Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor
details = Measurement(Measurement { name: "V12_U2A_A0", kind: Current, value: Ok(0.41893438) })
index = 0
slot = gimlet 1
|
| 1907 | 2026-01-14T21:22:47.637Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor
details = Measurement(Measurement { name: "V3P3_U2A_A0", kind: Current, value: Ok(0.025614602) })
index = 1
slot = gimlet 1
|
| 1908 | 2026-01-14T21:22:47.637Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor
details = Measurement(Measurement { name: "V12_U2A_A0", kind: Voltage, value: Ok(12.02914) })
index = 2
slot = gimlet 1
|
| 1909 | 2026-01-14T21:22:47.637Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor
details = Measurement(Measurement { name: "V3P3_U2A_A0", kind: Voltage, value: Ok(3.2618) })
index = 3
slot = gimlet 1
|
| 1910 | 2026-01-14T21:22:47.637Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 125 }
interface = fake-sled0
response = ComponentDetails(TlvPage { offset: 0, total: 1 })
|
| 1911 | 2026-01-14T21:22:47.637Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 125 }
interface = fake-sled1
response = ComponentDetails(TlvPage { offset: 0, total: 4 })
|
| 1912 | 2026-01-14T21:22:47.640Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 126 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-53" }, offset: 0 }) }
|
| 1913 | 2026-01-14T21:22:47.640Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 126 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-39" }, offset: 0 }) }
|
| 1914 | 2026-01-14T21:22:47.644Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for number of component details
num_details = 6
slot = gimlet 0
|
| 1915 | 2026-01-14T21:22:47.645Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Southeast", kind: Speed, value: Ok(2607.0) })
index = 0
slot = gimlet 0
|
| 1916 | 2026-01-14T21:22:47.645Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Northeast", kind: Speed, value: Ok(2476.0) })
index = 1
slot = gimlet 0
|
| 1917 | 2026-01-14T21:22:47.645Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor
details = Measurement(Measurement { name: "South", kind: Speed, value: Ok(2553.0) })
index = 2
slot = gimlet 0
|
| 1918 | 2026-01-14T21:22:47.645Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor
details = Measurement(Measurement { name: "North", kind: Speed, value: Ok(2265.0) })
index = 3
slot = gimlet 0
|
| 1919 | 2026-01-14T21:22:47.645Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Southwest", kind: Speed, value: Ok(2649.0) })
index = 4
slot = gimlet 0
|
| 1920 | 2026-01-14T21:22:47.645Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Northwest", kind: Speed, value: Ok(2275.0) })
index = 5
slot = gimlet 0
|
| 1921 | 2026-01-14T21:22:47.645Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-39" }): asked for number of component details
num_details = 1
slot = gimlet 1
|
| 1922 | 2026-01-14T21:22:47.645Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-39" }): asked for component details for a sensor
details = Measurement(Measurement { name: "t6", kind: Temperature, value: Ok(70.625) })
index = 0
slot = gimlet 1
|
| 1923 | 2026-01-14T21:22:47.645Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 126 }
interface = fake-sled0
response = ComponentDetails(TlvPage { offset: 0, total: 6 })
|
| 1924 | 2026-01-14T21:22:47.645Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 126 }
interface = fake-sled1
response = ComponentDetails(TlvPage { offset: 0, total: 1 })
|
| 1925 | 2026-01-14T21:22:47.652Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 127 }, kind: MgsRequest(SpState) }
|
| 1926 | 2026-01-14T21:22:47.656Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 127 }, kind: MgsRequest(SpState) }
|
| 1927 | 2026-01-14T21:22:47.662Z | DEBG | test_vpc_firewall: received state request
reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) }
slot = gimlet 0
|
| 1928 | 2026-01-14T21:22:47.662Z | DEBG | test_vpc_firewall: received state request
reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) }
slot = gimlet 1
|
| 1929 | 2026-01-14T21:22:47.670Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 127 }
interface = fake-sled0
response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
|
| 1930 | 2026-01-14T21:22:47.671Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 127 }
interface = fake-sled1
response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
|
| 1931 | 2026-01-14T21:22:47.675Z | TRAC | test_vpc_firewall (sensor-poller): polled SP successfully
chassis_type = Sled
num_samples = 17
sp_slot = 0
|
| 1932 | 2026-01-14T21:22:47.675Z | TRAC | test_vpc_firewall (sensor-poller): polled SP successfully
chassis_type = Sled
num_samples = 16
sp_slot = 1
|
| 1933 | 2026-01-14T21:22:48.577Z | TRAC | test_vpc_firewall (internal-dns-resolver): lookup_socket_v6 srv
dns_name = _nexus._tcp.control-plane.oxide.internal
|
| 1934 | 2026-01-14T21:22:48.581Z | WARN | test_vpc_firewall (producer-registration-task): failed to register with Nexus, will retry
count = 5
delay = 11.017453809s
error = "proto error: io error: No route to host (os error 148)"
file = oximeter/producer/src/lib.rs:371
|
| 1935 | 2026-01-14T21:22:48.598Z | TRAC | test_vpc_firewall (sensor-poller): interval elapsed, polling SP...
chassis_type = Switch
sp_slot = 1
|
| 1936 | 2026-01-14T21:22:48.598Z | TRAC | test_vpc_firewall (sensor-poller): interval elapsed, polling SP...
chassis_type = Switch
sp_slot = 0
|
| 1937 | 2026-01-14T21:22:48.598Z | TRAC | test_vpc_firewall (sensor-poller): interval elapsed, polling SP...
chassis_type = Sled
sp_slot = 0
|
| 1938 | 2026-01-14T21:22:48.598Z | TRAC | test_vpc_firewall (sensor-poller): interval elapsed, polling SP...
chassis_type = Sled
sp_slot = 1
|
| 1939 | 2026-01-14T21:22:48.598Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch1
request = Message { header: Header { version: 22, message_id: 63 }, kind: MgsRequest(SpState) }
|
| 1940 | 2026-01-14T21:22:48.598Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch0
request = Message { header: Header { version: 22, message_id: 84 }, kind: MgsRequest(SpState) }
|
| 1941 | 2026-01-14T21:22:48.598Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 128 }, kind: MgsRequest(SpState) }
|
| 1942 | 2026-01-14T21:22:48.598Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 128 }, kind: MgsRequest(SpState) }
|
| 1943 | 2026-01-14T21:22:48.599Z | DEBG | test_vpc_firewall: received state request
reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) }
slot = sidecar 0
|
| 1944 | 2026-01-14T21:22:48.599Z | DEBG | test_vpc_firewall: received state request
reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) }
slot = sidecar 1
|
| 1945 | 2026-01-14T21:22:48.599Z | DEBG | test_vpc_firewall: received state request
reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) }
slot = gimlet 0
|
| 1946 | 2026-01-14T21:22:48.599Z | DEBG | test_vpc_firewall: received state request
reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) }
slot = gimlet 1
|
| 1947 | 2026-01-14T21:22:48.599Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 84 }
interface = fake-switch0
response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
|
| 1948 | 2026-01-14T21:22:48.600Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 63 }
interface = fake-switch1
response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
|
| 1949 | 2026-01-14T21:22:48.600Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 128 }
interface = fake-sled0
response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
|
| 1950 | 2026-01-14T21:22:48.600Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 128 }
interface = fake-sled1
response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
|
| 1951 | 2026-01-14T21:22:48.602Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch0
request = Message { header: Header { version: 22, message_id: 85 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-0" }, offset: 0 }) }
|
| 1952 | 2026-01-14T21:22:48.602Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch1
request = Message { header: Header { version: 22, message_id: 64 }, kind: MgsRequest(SpState) }
|
| 1953 | 2026-01-14T21:22:48.602Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 129 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-1" }, offset: 0 }) }
|
| 1954 | 2026-01-14T21:22:48.602Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 129 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-8" }, offset: 0 }) }
|
| 1955 | 2026-01-14T21:22:48.612Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-0" }): asked for number of component details
num_details = 1
slot = sidecar 0
|
| 1956 | 2026-01-14T21:22:48.612Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-0" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Southwest", kind: Temperature, value: Ok(41.789063) })
index = 0
slot = sidecar 0
|
| 1957 | 2026-01-14T21:22:48.612Z | DEBG | test_vpc_firewall: received state request
reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) }
slot = sidecar 1
|
| 1958 | 2026-01-14T21:22:48.612Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-1" }): asked for number of component details
num_details = 1
slot = gimlet 0
|
| 1959 | 2026-01-14T21:22:48.612Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-1" }): asked for component details for a sensor
details = Measurement(Measurement { name: "South", kind: Temperature, value: Ok(42.5625) })
index = 0
slot = gimlet 0
|
| 1960 | 2026-01-14T21:22:48.612Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-8" }): asked for number of component details
num_details = 1
slot = gimlet 1
|
| 1961 | 2026-01-14T21:22:48.612Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-8" }): asked for component details for a sensor
details = Measurement(Measurement { name: "U2_N0", kind: Temperature, value: Ok(56.0) })
index = 0
slot = gimlet 1
|
| 1962 | 2026-01-14T21:22:48.612Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 85 }
interface = fake-switch0
response = ComponentDetails(TlvPage { offset: 0, total: 1 })
|
| 1963 | 2026-01-14T21:22:48.613Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 64 }
interface = fake-switch1
response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
|
| 1964 | 2026-01-14T21:22:48.613Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 129 }
interface = fake-sled0
response = ComponentDetails(TlvPage { offset: 0, total: 1 })
|
| 1965 | 2026-01-14T21:22:48.613Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 129 }
interface = fake-sled1
response = ComponentDetails(TlvPage { offset: 0, total: 1 })
|
| 1966 | 2026-01-14T21:22:48.614Z | TRAC | test_vpc_firewall (sensor-poller): polled SP, no samples returned
chassis_type = Switch
num_samples = 0
sp_slot = 1
|
| 1967 | 2026-01-14T21:22:48.617Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch0
request = Message { header: Header { version: 22, message_id: 86 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-1" }, offset: 0 }) }
|
| 1968 | 2026-01-14T21:22:48.617Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 130 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-2" }, offset: 0 }) }
|
| 1969 | 2026-01-14T21:22:48.617Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 130 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-46" }, offset: 0 }) }
|
| 1970 | 2026-01-14T21:22:48.622Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-1" }): asked for number of component details
num_details = 1
slot = sidecar 0
|
| 1971 | 2026-01-14T21:22:48.622Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-1" }): asked for component details for a sensor
details = Measurement(Measurement { name: "South", kind: Temperature, value: Err(DeviceError) })
index = 0
slot = sidecar 0
|
| 1972 | 2026-01-14T21:22:48.622Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-2" }): asked for number of component details
num_details = 1
slot = gimlet 0
|
| 1973 | 2026-01-14T21:22:48.623Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-2" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Southeast", kind: Temperature, value: Ok(41.570313) })
index = 0
slot = gimlet 0
|
| 1974 | 2026-01-14T21:22:48.623Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-46" }): asked for number of component details
num_details = 1
slot = gimlet 1
|
| 1975 | 2026-01-14T21:22:48.623Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-46" }): asked for component details for a sensor
details = Measurement(Measurement { name: "CPU", kind: Temperature, value: Ok(62.6) })
index = 0
slot = gimlet 1
|
| 1976 | 2026-01-14T21:22:48.624Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 86 }
interface = fake-switch0
response = ComponentDetails(TlvPage { offset: 0, total: 1 })
|
| 1977 | 2026-01-14T21:22:48.624Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 130 }
interface = fake-sled0
response = ComponentDetails(TlvPage { offset: 0, total: 1 })
|
| 1978 | 2026-01-14T21:22:48.625Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 130 }
interface = fake-sled1
response = ComponentDetails(TlvPage { offset: 0, total: 1 })
|
| 1979 | 2026-01-14T21:22:48.631Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch0
request = Message { header: Header { version: 22, message_id: 87 }, kind: MgsRequest(SpState) }
|
| 1980 | 2026-01-14T21:22:48.631Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 131 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-0" }, offset: 0 }) }
|
| 1981 | 2026-01-14T21:22:48.631Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 131 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-53" }, offset: 0 }) }
|
| 1982 | 2026-01-14T21:22:48.631Z | DEBG | test_vpc_firewall: received state request
reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) }
slot = sidecar 0
|
| 1983 | 2026-01-14T21:22:48.631Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-0" }): asked for number of component details
num_details = 1
slot = gimlet 0
|
| 1984 | 2026-01-14T21:22:48.631Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-0" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Southwest", kind: Temperature, value: Err(DeviceError) })
index = 0
slot = gimlet 0
|
| 1985 | 2026-01-14T21:22:48.631Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for number of component details
num_details = 6
slot = gimlet 1
|
| 1986 | 2026-01-14T21:22:48.631Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Southeast", kind: Speed, value: Ok(2510.0) })
index = 0
slot = gimlet 1
|
| 1987 | 2026-01-14T21:22:48.631Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Northeast", kind: Speed, value: Ok(2390.0) })
index = 1
slot = gimlet 1
|
| 1988 | 2026-01-14T21:22:48.631Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor
details = Measurement(Measurement { name: "South", kind: Speed, value: Ok(2467.0) })
index = 2
slot = gimlet 1
|
| 1989 | 2026-01-14T21:22:48.631Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor
details = Measurement(Measurement { name: "North", kind: Speed, value: Ok(2195.0) })
index = 3
slot = gimlet 1
|
| 1990 | 2026-01-14T21:22:48.631Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Southwest", kind: Speed, value: Ok(2680.0) })
index = 4
slot = gimlet 1
|
| 1991 | 2026-01-14T21:22:48.632Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Northwest", kind: Speed, value: Ok(2212.0) })
index = 5
slot = gimlet 1
|
| 1992 | 2026-01-14T21:22:48.632Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 87 }
interface = fake-switch0
response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
|
| 1993 | 2026-01-14T21:22:48.632Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 131 }
interface = fake-sled0
response = ComponentDetails(TlvPage { offset: 0, total: 1 })
|
| 1994 | 2026-01-14T21:22:48.632Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 131 }
interface = fake-sled1
response = ComponentDetails(TlvPage { offset: 0, total: 6 })
|
| 1995 | 2026-01-14T21:22:48.632Z | TRAC | test_vpc_firewall (sensor-poller): polled SP successfully
chassis_type = Switch
num_samples = 3
sp_slot = 0
|
| 1996 | 2026-01-14T21:22:48.637Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 132 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-7" }, offset: 0 }) }
|
| 1997 | 2026-01-14T21:22:48.637Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 132 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-0" }, offset: 0 }) }
|
| 1998 | 2026-01-14T21:22:48.637Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-7" }): asked for number of component details
num_details = 4
slot = gimlet 0
|
| 1999 | 2026-01-14T21:22:48.637Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor
details = Measurement(Measurement { name: "V12_U2A_A0", kind: Current, value: Ok(0.45898438) })
index = 0
slot = gimlet 0
|
| 2000 | 2026-01-14T21:22:48.637Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor
details = Measurement(Measurement { name: "V3P3_U2A_A0", kind: Current, value: Ok(0.024414063) })
index = 1
slot = gimlet 0
|
| 2001 | 2026-01-14T21:22:48.637Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor
details = Measurement(Measurement { name: "V12_U2A_A0", kind: Voltage, value: Ok(12.03125) })
index = 2
slot = gimlet 0
|
| 2002 | 2026-01-14T21:22:48.638Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor
details = Measurement(Measurement { name: "V3P3_U2A_A0", kind: Voltage, value: Ok(3.328125) })
index = 3
slot = gimlet 0
|
| 2003 | 2026-01-14T21:22:48.638Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-0" }): asked for number of component details
num_details = 1
slot = gimlet 1
|
| 2004 | 2026-01-14T21:22:48.638Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-0" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Southwest", kind: Temperature, value: Ok(41.3629) })
index = 0
slot = gimlet 1
|
| 2005 | 2026-01-14T21:22:48.638Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 132 }
interface = fake-sled0
response = ComponentDetails(TlvPage { offset: 0, total: 4 })
|
| 2006 | 2026-01-14T21:22:48.638Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 132 }
interface = fake-sled1
response = ComponentDetails(TlvPage { offset: 0, total: 1 })
|
| 2007 | 2026-01-14T21:22:48.642Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 133 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-39" }, offset: 0 }) }
|
| 2008 | 2026-01-14T21:22:48.642Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 133 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-2" }, offset: 0 }) }
|
| 2009 | 2026-01-14T21:22:48.642Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-39" }): asked for number of component details
num_details = 1
slot = gimlet 0
|
| 2010 | 2026-01-14T21:22:48.642Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-39" }): asked for component details for a sensor
details = Measurement(Measurement { name: "t6", kind: Temperature, value: Ok(70.625) })
index = 0
slot = gimlet 0
|
| 2011 | 2026-01-14T21:22:48.642Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-2" }): asked for number of component details
num_details = 1
slot = gimlet 1
|
| 2012 | 2026-01-14T21:22:48.642Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-2" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Southeast", kind: Temperature, value: Ok(41.570313) })
index = 0
slot = gimlet 1
|
| 2013 | 2026-01-14T21:22:48.642Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 133 }
interface = fake-sled0
response = ComponentDetails(TlvPage { offset: 0, total: 1 })
|
| 2014 | 2026-01-14T21:22:48.642Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 133 }
interface = fake-sled1
response = ComponentDetails(TlvPage { offset: 0, total: 1 })
|
| 2015 | 2026-01-14T21:22:48.644Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 134 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-46" }, offset: 0 }) }
|
| 2016 | 2026-01-14T21:22:48.644Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 134 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-1" }, offset: 0 }) }
|
| 2017 | 2026-01-14T21:22:48.645Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-46" }): asked for number of component details
num_details = 1
slot = gimlet 0
|
| 2018 | 2026-01-14T21:22:48.645Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-46" }): asked for component details for a sensor
details = Measurement(Measurement { name: "CPU", kind: Temperature, value: Ok(64.5) })
index = 0
slot = gimlet 0
|
| 2019 | 2026-01-14T21:22:48.645Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-1" }): asked for number of component details
num_details = 1
slot = gimlet 1
|
| 2020 | 2026-01-14T21:22:48.645Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-1" }): asked for component details for a sensor
details = Measurement(Measurement { name: "South", kind: Temperature, value: Ok(42.5625) })
index = 0
slot = gimlet 1
|
| 2021 | 2026-01-14T21:22:48.645Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 134 }
interface = fake-sled0
response = ComponentDetails(TlvPage { offset: 0, total: 1 })
|
| 2022 | 2026-01-14T21:22:48.645Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 134 }
interface = fake-sled1
response = ComponentDetails(TlvPage { offset: 0, total: 1 })
|
| 2023 | 2026-01-14T21:22:48.649Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 135 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-8" }, offset: 0 }) }
|
| 2024 | 2026-01-14T21:22:48.649Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 135 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-7" }, offset: 0 }) }
|
| 2025 | 2026-01-14T21:22:48.649Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-8" }): asked for number of component details
num_details = 1
slot = gimlet 0
|
| 2026 | 2026-01-14T21:22:48.649Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-8" }): asked for component details for a sensor
details = Measurement(Measurement { name: "U2_N0", kind: Temperature, value: Ok(56.0) })
index = 0
slot = gimlet 0
|
| 2027 | 2026-01-14T21:22:48.649Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-7" }): asked for number of component details
num_details = 4
slot = gimlet 1
|
| 2028 | 2026-01-14T21:22:48.649Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor
details = Measurement(Measurement { name: "V12_U2A_A0", kind: Current, value: Ok(0.41893438) })
index = 0
slot = gimlet 1
|
| 2029 | 2026-01-14T21:22:48.649Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor
details = Measurement(Measurement { name: "V3P3_U2A_A0", kind: Current, value: Ok(0.025614602) })
index = 1
slot = gimlet 1
|
| 2030 | 2026-01-14T21:22:48.649Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor
details = Measurement(Measurement { name: "V12_U2A_A0", kind: Voltage, value: Ok(12.02914) })
index = 2
slot = gimlet 1
|
| 2031 | 2026-01-14T21:22:48.650Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor
details = Measurement(Measurement { name: "V3P3_U2A_A0", kind: Voltage, value: Ok(3.2618) })
index = 3
slot = gimlet 1
|
| 2032 | 2026-01-14T21:22:48.650Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 135 }
interface = fake-sled0
response = ComponentDetails(TlvPage { offset: 0, total: 1 })
|
| 2033 | 2026-01-14T21:22:48.650Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 135 }
interface = fake-sled1
response = ComponentDetails(TlvPage { offset: 0, total: 4 })
|
| 2034 | 2026-01-14T21:22:48.654Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 136 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-53" }, offset: 0 }) }
|
| 2035 | 2026-01-14T21:22:48.654Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 136 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-39" }, offset: 0 }) }
|
| 2036 | 2026-01-14T21:22:48.654Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for number of component details
num_details = 6
slot = gimlet 0
|
| 2037 | 2026-01-14T21:22:48.654Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Southeast", kind: Speed, value: Ok(2607.0) })
index = 0
slot = gimlet 0
|
| 2038 | 2026-01-14T21:22:48.654Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Northeast", kind: Speed, value: Ok(2476.0) })
index = 1
slot = gimlet 0
|
| 2039 | 2026-01-14T21:22:48.654Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor
details = Measurement(Measurement { name: "South", kind: Speed, value: Ok(2553.0) })
index = 2
slot = gimlet 0
|
| 2040 | 2026-01-14T21:22:48.654Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor
details = Measurement(Measurement { name: "North", kind: Speed, value: Ok(2265.0) })
index = 3
slot = gimlet 0
|
| 2041 | 2026-01-14T21:22:48.654Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Southwest", kind: Speed, value: Ok(2649.0) })
index = 4
slot = gimlet 0
|
| 2042 | 2026-01-14T21:22:48.654Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Northwest", kind: Speed, value: Ok(2275.0) })
index = 5
slot = gimlet 0
|
| 2043 | 2026-01-14T21:22:48.654Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-39" }): asked for number of component details
num_details = 1
slot = gimlet 1
|
| 2044 | 2026-01-14T21:22:48.654Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-39" }): asked for component details for a sensor
details = Measurement(Measurement { name: "t6", kind: Temperature, value: Ok(70.625) })
index = 0
slot = gimlet 1
|
| 2045 | 2026-01-14T21:22:48.654Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 136 }
interface = fake-sled0
response = ComponentDetails(TlvPage { offset: 0, total: 6 })
|
| 2046 | 2026-01-14T21:22:48.655Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 136 }
interface = fake-sled1
response = ComponentDetails(TlvPage { offset: 0, total: 1 })
|
| 2047 | 2026-01-14T21:22:48.660Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 137 }, kind: MgsRequest(SpState) }
|
| 2048 | 2026-01-14T21:22:48.660Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 137 }, kind: MgsRequest(SpState) }
|
| 2049 | 2026-01-14T21:22:48.661Z | DEBG | test_vpc_firewall: received state request
reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) }
slot = gimlet 0
|
| 2050 | 2026-01-14T21:22:48.661Z | DEBG | test_vpc_firewall: received state request
reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) }
slot = gimlet 1
|
| 2051 | 2026-01-14T21:22:48.661Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 137 }
interface = fake-sled0
response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
|
| 2052 | 2026-01-14T21:22:48.661Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 137 }
interface = fake-sled1
response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
|
| 2053 | 2026-01-14T21:22:48.661Z | TRAC | test_vpc_firewall (sensor-poller): polled SP successfully
chassis_type = Sled
num_samples = 17
sp_slot = 0
|
| 2054 | 2026-01-14T21:22:48.661Z | TRAC | test_vpc_firewall (sensor-poller): polled SP successfully
chassis_type = Sled
num_samples = 16
sp_slot = 1
|
| 2055 | 2026-01-14T21:22:49.440Z | INFO | test_vpc_firewall (dropshot): accepted connection
local_addr = [::1]:59250
remote_addr = [::1]:46538
|
| 2056 | 2026-01-14T21:22:49.585Z | TRAC | test_vpc_firewall (dropshot): incoming request
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:46538
req_id = 84a06048-19f8-48e8-befa-509f2d9d1b4f
uri = /ignition
|
| 2057 | 2026-01-14T21:22:49.585Z | DEBG | test_vpc_firewall (dropshot): determined request API version
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:46538
req_id = 84a06048-19f8-48e8-befa-509f2d9d1b4f
uri = /ignition
version = 3.0.0
|
| 2058 | 2026-01-14T21:22:49.586Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch0
request = Message { header: Header { version: 22, message_id: 88 }, kind: MgsRequest(BulkIgnitionState { offset: 0 }) }
|
| 2059 | 2026-01-14T21:22:49.591Z | DEBG | test_vpc_firewall: received bulk ignition state request
offset = 0
slot = sidecar 0
state = [IgnitionState { receiver: ReceiverStatus { aligned: true, locked: true, polarity_inverted: false }, target: Some(TargetState { system_type: Sidecar, power_state: On, power_reset_in_progress: false, faults: SystemFaults { power_a3: false, power_a2: false, sp: false, rot: false }, controller0_present: true, controller1_present: false, link0_receiver_status: ReceiverStatus { aligned: true, locked: true, polarity_inverted: false }, link1_receiver_status: ReceiverStatus { aligned: true, locked: true, polarity_inverted: false } }) }, IgnitionState { receiver: ReceiverStatus { aligned: true, locked: true, polarity_inverted: false }, target: Some(TargetState { system_type: Sidecar, power_state: On, power_reset_in_progress: false, faults: SystemFaults { power_a3: false, power_a2: false, sp: false, rot: false }, controller0_present: true, controller1_present: false, link0_receiver_status: ReceiverStatus { aligned: true, locked: true, polarity_inverted: false }, link1_receiver_status: ReceiverStatus { aligned: true, locked: true, polarity_inverted: false } }) }, IgnitionState { receiver: ReceiverStatus { aligned: true, locked: true, polarity_inverted: false }, target: Some(TargetState { system_type: Gimlet, power_state: On, power_reset_in_progress: false, faults: SystemFaults { power_a3: false, power_a2: false, sp: false, rot: false }, controller0_present: true, controller1_present: false, link0_receiver_status: ReceiverStatus { aligned: true, locked: true, polarity_inverted: false }, link1_receiver_status: ReceiverStatus { aligned: true, locked: true, polarity_inverted: false } }) }, IgnitionState { receiver: ReceiverStatus { aligned: true, locked: true, polarity_inverted: false }, target: Some(TargetState { system_type: Gimlet, power_state: On, power_reset_in_progress: false, faults: SystemFaults { power_a3: false, power_a2: false, sp: false, rot: false }, controller0_present: true, controller1_present: false, link0_receiver_status: ReceiverStatus { aligned: true, locked: true, polarity_inverted: false }, link1_receiver_status: ReceiverStatus { aligned: true, locked: true, polarity_inverted: false } }) }, IgnitionState { receiver: ReceiverStatus { aligned: false, locked: false, polarity_inverted: false }, target: None }, IgnitionState { receiver: ReceiverStatus { aligned: false, locked: false, polarity_inverted: false }, target: None }, IgnitionState { receiver: ReceiverStatus { aligned: false, locked: false, polarity_inverted: false }, target: None }, IgnitionState { receiver: ReceiverStatus { aligned: false, locked: false, polarity_inverted: false }, target: None }, IgnitionState { receiver: ReceiverStatus { aligned: false, locked: false, polarity_inverted: false }, target: None }, IgnitionState { receiver: ReceiverStatus { aligned: false, locked: false, polarity_inverted: false }, target: None }, IgnitionState { receiver: ReceiverStatus { aligned: false, locked: false, polarity_inverted: false }, target: None }, IgnitionState { receiver: ReceiverStatus { aligned: false, locked: false, polarity_inverted: false }, target: None }, IgnitionState { receiver: ReceiverStatus { aligned: false, locked: false, polarity_inverted: false }, target: None }, IgnitionState { receiver: ReceiverStatus { aligned: false, locked: false, polarity_inverted: false }, target: None }, IgnitionState { receiver: ReceiverStatus { aligned: false, locked: false, polarity_inverted: false }, target: None }, IgnitionState { receiver: ReceiverStatus { aligned: false, locked: false, polarity_inverted: false }, target: None }, IgnitionState { receiver: ReceiverStatus { aligned: false, locked: false, polarity_inverted: false }, target: None }, IgnitionState { receiver: ReceiverStatus { aligned: false, locked: false, polarity_inverted: false }, target: None }, IgnitionState { receiver: ReceiverStatus { aligned: false, locked: false, polarity_inverted: false }, target: None }, IgnitionState { receiver: ReceiverStatus { aligned: false, locked: false, polarity_inverted: false }, target: None }, IgnitionState { receiver: ReceiverStatus { aligned: false, locked: false, polarity_inverted: false }, target: None }, IgnitionState { receiver: ReceiverStatus { aligned: false, locked: false, polarity_inverted: false }, target: None }, IgnitionState { receiver: ReceiverStatus { aligned: false, locked: false, polarity_inverted: false }, target: None }, IgnitionState { receiver: ReceiverStatus { aligned: false, locked: false, polarity_inverted: false }, target: None }, IgnitionState { receiver: ReceiverStatus { aligned: false, locked: false, polarity_inverted: false }, target: None }, IgnitionState { receiver: ReceiverStatus { aligned: false, locked: false, polarity_inverted: false }, target: None }, IgnitionState { receiver: ReceiverStatus { aligned: false, locked: false, polarity_inverted: false }, target: None }, IgnitionState { receiver: ReceiverStatus { aligned: false, locked: false, polarity_inverted: false }, target: None }, IgnitionState { receiver: ReceiverStatus { aligned: false, locked: false, polarity_inverted: false }, target: None }, IgnitionState { receiver: ReceiverStatus { aligned: false, locked: false, polarity_inverted: false }, target: None }, IgnitionState { receiver: ReceiverStatus { aligned: false, locked: false, polarity_inverted: false }, target: None }, IgnitionState { receiver: ReceiverStatus { aligned: false, locked: false, polarity_inverted: false }, target: None }, IgnitionState { receiver: ReceiverStatus { aligned: false, locked: false, polarity_inverted: false }, target: None }, IgnitionState { receiver: ReceiverStatus { aligned: false, locked: false, polarity_inverted: false }, target: None }, IgnitionState { receiver: ReceiverStatus { aligned: false, locked: false, polarity_inverted: false }, target: None }]
|
| 2060 | 2026-01-14T21:22:49.595Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 88 }
interface = fake-switch0
response = BulkIgnitionState(TlvPage { offset: 0, total: 35 })
|
| 2061 | 2026-01-14T21:22:49.595Z | TRAC | test_vpc_firewall (sensor-poller): interval elapsed, polling SP...
chassis_type = Switch
sp_slot = 1
|
| 2062 | 2026-01-14T21:22:49.595Z | TRAC | test_vpc_firewall (sensor-poller): interval elapsed, polling SP...
chassis_type = Switch
sp_slot = 0
|
| 2063 | 2026-01-14T21:22:49.595Z | TRAC | test_vpc_firewall (sensor-poller): interval elapsed, polling SP...
chassis_type = Sled
sp_slot = 0
|
| 2064 | 2026-01-14T21:22:49.595Z | TRAC | test_vpc_firewall (sensor-poller): interval elapsed, polling SP...
chassis_type = Sled
sp_slot = 1
|
| 2065 | 2026-01-14T21:22:49.595Z | WARN | test_vpc_firewall (ManagementSwitch): ignoring unknown ignition target 4 returned by ignition controller SP
|
| 2066 | 2026-01-14T21:22:49.595Z | WARN | test_vpc_firewall (ManagementSwitch): ignoring unknown ignition target 5 returned by ignition controller SP
|
| 2067 | 2026-01-14T21:22:49.595Z | WARN | test_vpc_firewall (ManagementSwitch): ignoring unknown ignition target 6 returned by ignition controller SP
|
| 2068 | 2026-01-14T21:22:49.595Z | WARN | test_vpc_firewall (ManagementSwitch): ignoring unknown ignition target 7 returned by ignition controller SP
|
| 2069 | 2026-01-14T21:22:49.595Z | WARN | test_vpc_firewall (ManagementSwitch): ignoring unknown ignition target 8 returned by ignition controller SP
|
| 2070 | 2026-01-14T21:22:49.595Z | WARN | test_vpc_firewall (ManagementSwitch): ignoring unknown ignition target 9 returned by ignition controller SP
|
| 2071 | 2026-01-14T21:22:49.595Z | WARN | test_vpc_firewall (ManagementSwitch): ignoring unknown ignition target 10 returned by ignition controller SP
|
| 2072 | 2026-01-14T21:22:49.596Z | WARN | test_vpc_firewall (ManagementSwitch): ignoring unknown ignition target 11 returned by ignition controller SP
|
| 2073 | 2026-01-14T21:22:49.596Z | WARN | test_vpc_firewall (ManagementSwitch): ignoring unknown ignition target 12 returned by ignition controller SP
|
| 2074 | 2026-01-14T21:22:49.596Z | WARN | test_vpc_firewall (ManagementSwitch): ignoring unknown ignition target 13 returned by ignition controller SP
|
| 2075 | 2026-01-14T21:22:49.596Z | WARN | test_vpc_firewall (ManagementSwitch): ignoring unknown ignition target 14 returned by ignition controller SP
|
| 2076 | 2026-01-14T21:22:49.596Z | WARN | test_vpc_firewall (ManagementSwitch): ignoring unknown ignition target 15 returned by ignition controller SP
|
| 2077 | 2026-01-14T21:22:49.596Z | WARN | test_vpc_firewall (ManagementSwitch): ignoring unknown ignition target 16 returned by ignition controller SP
|
| 2078 | 2026-01-14T21:22:49.596Z | WARN | test_vpc_firewall (ManagementSwitch): ignoring unknown ignition target 17 returned by ignition controller SP
|
| 2079 | 2026-01-14T21:22:49.596Z | WARN | test_vpc_firewall (ManagementSwitch): ignoring unknown ignition target 18 returned by ignition controller SP
|
| 2080 | 2026-01-14T21:22:49.596Z | WARN | test_vpc_firewall (ManagementSwitch): ignoring unknown ignition target 19 returned by ignition controller SP
|
| 2081 | 2026-01-14T21:22:49.596Z | WARN | test_vpc_firewall (ManagementSwitch): ignoring unknown ignition target 20 returned by ignition controller SP
|
| 2082 | 2026-01-14T21:22:49.596Z | WARN | test_vpc_firewall (ManagementSwitch): ignoring unknown ignition target 21 returned by ignition controller SP
|
| 2083 | 2026-01-14T21:22:49.596Z | WARN | test_vpc_firewall (ManagementSwitch): ignoring unknown ignition target 22 returned by ignition controller SP
|
| 2084 | 2026-01-14T21:22:49.596Z | WARN | test_vpc_firewall (ManagementSwitch): ignoring unknown ignition target 23 returned by ignition controller SP
|
| 2085 | 2026-01-14T21:22:49.596Z | WARN | test_vpc_firewall (ManagementSwitch): ignoring unknown ignition target 24 returned by ignition controller SP
|
| 2086 | 2026-01-14T21:22:49.596Z | WARN | test_vpc_firewall (ManagementSwitch): ignoring unknown ignition target 25 returned by ignition controller SP
|
| 2087 | 2026-01-14T21:22:49.596Z | WARN | test_vpc_firewall (ManagementSwitch): ignoring unknown ignition target 26 returned by ignition controller SP
|
| 2088 | 2026-01-14T21:22:49.596Z | WARN | test_vpc_firewall (ManagementSwitch): ignoring unknown ignition target 27 returned by ignition controller SP
|
| 2089 | 2026-01-14T21:22:49.596Z | WARN | test_vpc_firewall (ManagementSwitch): ignoring unknown ignition target 28 returned by ignition controller SP
|
| 2090 | 2026-01-14T21:22:49.596Z | WARN | test_vpc_firewall (ManagementSwitch): ignoring unknown ignition target 29 returned by ignition controller SP
|
| 2091 | 2026-01-14T21:22:49.596Z | WARN | test_vpc_firewall (ManagementSwitch): ignoring unknown ignition target 30 returned by ignition controller SP
|
| 2092 | 2026-01-14T21:22:49.596Z | WARN | test_vpc_firewall (ManagementSwitch): ignoring unknown ignition target 31 returned by ignition controller SP
|
| 2093 | 2026-01-14T21:22:49.596Z | WARN | test_vpc_firewall (ManagementSwitch): ignoring unknown ignition target 32 returned by ignition controller SP
|
| 2094 | 2026-01-14T21:22:49.596Z | WARN | test_vpc_firewall (ManagementSwitch): ignoring unknown ignition target 33 returned by ignition controller SP
|
| 2095 | 2026-01-14T21:22:49.596Z | WARN | test_vpc_firewall (ManagementSwitch): ignoring unknown ignition target 34 returned by ignition controller SP
|
| 2096 | 2026-01-14T21:22:49.598Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch1
request = Message { header: Header { version: 22, message_id: 65 }, kind: MgsRequest(SpState) }
|
| 2097 | 2026-01-14T21:22:49.598Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch0
request = Message { header: Header { version: 22, message_id: 89 }, kind: MgsRequest(SpState) }
|
| 2098 | 2026-01-14T21:22:49.598Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 138 }, kind: MgsRequest(SpState) }
|
| 2099 | 2026-01-14T21:22:49.598Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 138 }, kind: MgsRequest(SpState) }
|
| 2100 | 2026-01-14T21:22:49.598Z | INFO | test_vpc_firewall (dropshot): request completed
latency_us = 13209
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:46538
req_id = 84a06048-19f8-48e8-befa-509f2d9d1b4f
response_code = 200
uri = /ignition
|
| 2101 | 2026-01-14T21:22:49.603Z | DEBG | test_vpc_firewall: received state request
reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) }
slot = sidecar 0
|
| 2102 | 2026-01-14T21:22:49.603Z | DEBG | test_vpc_firewall: received state request
reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) }
slot = sidecar 1
|
| 2103 | 2026-01-14T21:22:49.603Z | DEBG | test_vpc_firewall: received state request
reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) }
slot = gimlet 0
|
| 2104 | 2026-01-14T21:22:49.603Z | DEBG | test_vpc_firewall: received state request
reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) }
slot = gimlet 1
|
| 2105 | 2026-01-14T21:22:49.605Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 89 }
interface = fake-switch0
response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
|
| 2106 | 2026-01-14T21:22:49.605Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 65 }
interface = fake-switch1
response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
|
| 2107 | 2026-01-14T21:22:49.605Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 138 }
interface = fake-sled0
response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
|
| 2108 | 2026-01-14T21:22:49.606Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 138 }
interface = fake-sled1
response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
|
| 2109 | 2026-01-14T21:22:49.606Z | TRAC | test_vpc_firewall (dropshot): incoming request
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:46538
req_id = 0f52412a-e5c7-460a-ad1d-6e6a3483bb35
uri = /sp/switch/0
|
| 2110 | 2026-01-14T21:22:49.606Z | DEBG | test_vpc_firewall (dropshot): determined request API version
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:46538
req_id = 0f52412a-e5c7-460a-ad1d-6e6a3483bb35
uri = /sp/switch/0
version = 3.0.0
|
| 2111 | 2026-01-14T21:22:49.607Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch0
request = Message { header: Header { version: 22, message_id: 90 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-0" }, offset: 0 }) }
|
| 2112 | 2026-01-14T21:22:49.607Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch1
request = Message { header: Header { version: 22, message_id: 66 }, kind: MgsRequest(SpState) }
|
| 2113 | 2026-01-14T21:22:49.608Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 139 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-1" }, offset: 0 }) }
|
| 2114 | 2026-01-14T21:22:49.608Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 139 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-8" }, offset: 0 }) }
|
| 2115 | 2026-01-14T21:22:49.608Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-0" }): asked for number of component details
num_details = 1
slot = sidecar 0
|
| 2116 | 2026-01-14T21:22:49.608Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-0" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Southwest", kind: Temperature, value: Ok(41.789063) })
index = 0
slot = sidecar 0
|
| 2117 | 2026-01-14T21:22:49.608Z | DEBG | test_vpc_firewall: received state request
reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) }
slot = sidecar 1
|
| 2118 | 2026-01-14T21:22:49.608Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-1" }): asked for number of component details
num_details = 1
slot = gimlet 0
|
| 2119 | 2026-01-14T21:22:49.608Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-1" }): asked for component details for a sensor
details = Measurement(Measurement { name: "South", kind: Temperature, value: Ok(42.5625) })
index = 0
slot = gimlet 0
|
| 2120 | 2026-01-14T21:22:49.608Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-8" }): asked for number of component details
num_details = 1
slot = gimlet 1
|
| 2121 | 2026-01-14T21:22:49.608Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-8" }): asked for component details for a sensor
details = Measurement(Measurement { name: "U2_N0", kind: Temperature, value: Ok(56.0) })
index = 0
slot = gimlet 1
|
| 2122 | 2026-01-14T21:22:49.608Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 90 }
interface = fake-switch0
response = ComponentDetails(TlvPage { offset: 0, total: 1 })
|
| 2123 | 2026-01-14T21:22:49.609Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch0
request = Message { header: Header { version: 22, message_id: 91 }, kind: MgsRequest(SpState) }
|
| 2124 | 2026-01-14T21:22:49.609Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 66 }
interface = fake-switch1
response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
|
| 2125 | 2026-01-14T21:22:49.609Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 139 }
interface = fake-sled0
response = ComponentDetails(TlvPage { offset: 0, total: 1 })
|
| 2126 | 2026-01-14T21:22:49.609Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 139 }
interface = fake-sled1
response = ComponentDetails(TlvPage { offset: 0, total: 1 })
|
| 2127 | 2026-01-14T21:22:49.610Z | TRAC | test_vpc_firewall (sensor-poller): polled SP, no samples returned
chassis_type = Switch
num_samples = 0
sp_slot = 1
|
| 2128 | 2026-01-14T21:22:49.613Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 140 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-2" }, offset: 0 }) }
|
| 2129 | 2026-01-14T21:22:49.613Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 140 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-46" }, offset: 0 }) }
|
| 2130 | 2026-01-14T21:22:49.613Z | DEBG | test_vpc_firewall: received state request
reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) }
slot = sidecar 0
|
| 2131 | 2026-01-14T21:22:49.613Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-2" }): asked for number of component details
num_details = 1
slot = gimlet 0
|
| 2132 | 2026-01-14T21:22:49.617Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-2" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Southeast", kind: Temperature, value: Ok(41.570313) })
index = 0
slot = gimlet 0
|
| 2133 | 2026-01-14T21:22:49.619Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-46" }): asked for number of component details
num_details = 1
slot = gimlet 1
|
| 2134 | 2026-01-14T21:22:49.619Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-46" }): asked for component details for a sensor
details = Measurement(Measurement { name: "CPU", kind: Temperature, value: Ok(62.6) })
index = 0
slot = gimlet 1
|
| 2135 | 2026-01-14T21:22:49.619Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 91 }
interface = fake-switch0
response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
|
| 2136 | 2026-01-14T21:22:49.619Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch0
request = Message { header: Header { version: 22, message_id: 92 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-1" }, offset: 0 }) }
|
| 2137 | 2026-01-14T21:22:49.619Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 140 }
interface = fake-sled0
response = ComponentDetails(TlvPage { offset: 0, total: 1 })
|
| 2138 | 2026-01-14T21:22:49.619Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 140 }
interface = fake-sled1
response = ComponentDetails(TlvPage { offset: 0, total: 1 })
|
| 2139 | 2026-01-14T21:22:49.622Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 141 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-0" }, offset: 0 }) }
|
| 2140 | 2026-01-14T21:22:49.622Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 141 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-53" }, offset: 0 }) }
|
| 2141 | 2026-01-14T21:22:49.622Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-1" }): asked for number of component details
num_details = 1
slot = sidecar 0
|
| 2142 | 2026-01-14T21:22:49.622Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-1" }): asked for component details for a sensor
details = Measurement(Measurement { name: "South", kind: Temperature, value: Err(DeviceError) })
index = 0
slot = sidecar 0
|
| 2143 | 2026-01-14T21:22:49.623Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-0" }): asked for number of component details
num_details = 1
slot = gimlet 0
|
| 2144 | 2026-01-14T21:22:49.623Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-0" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Southwest", kind: Temperature, value: Err(DeviceError) })
index = 0
slot = gimlet 0
|
| 2145 | 2026-01-14T21:22:49.623Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for number of component details
num_details = 6
slot = gimlet 1
|
| 2146 | 2026-01-14T21:22:49.623Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Southeast", kind: Speed, value: Ok(2510.0) })
index = 0
slot = gimlet 1
|
| 2147 | 2026-01-14T21:22:49.623Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Northeast", kind: Speed, value: Ok(2390.0) })
index = 1
slot = gimlet 1
|
| 2148 | 2026-01-14T21:22:49.623Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor
details = Measurement(Measurement { name: "South", kind: Speed, value: Ok(2467.0) })
index = 2
slot = gimlet 1
|
| 2149 | 2026-01-14T21:22:49.623Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor
details = Measurement(Measurement { name: "North", kind: Speed, value: Ok(2195.0) })
index = 3
slot = gimlet 1
|
| 2150 | 2026-01-14T21:22:49.623Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Southwest", kind: Speed, value: Ok(2680.0) })
index = 4
slot = gimlet 1
|
| 2151 | 2026-01-14T21:22:49.623Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Northwest", kind: Speed, value: Ok(2212.0) })
index = 5
slot = gimlet 1
|
| 2152 | 2026-01-14T21:22:49.624Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 92 }
interface = fake-switch0
response = ComponentDetails(TlvPage { offset: 0, total: 1 })
|
| 2153 | 2026-01-14T21:22:49.624Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch0
request = Message { header: Header { version: 22, message_id: 93 }, kind: MgsRequest(VersionedRotBootInfo { version: 3 }) }
|
| 2154 | 2026-01-14T21:22:49.624Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 141 }
interface = fake-sled0
response = ComponentDetails(TlvPage { offset: 0, total: 1 })
|
| 2155 | 2026-01-14T21:22:49.624Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 141 }
interface = fake-sled1
response = ComponentDetails(TlvPage { offset: 0, total: 6 })
|
| 2156 | 2026-01-14T21:22:49.635Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 142 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-7" }, offset: 0 }) }
|
| 2157 | 2026-01-14T21:22:49.635Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 142 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-0" }, offset: 0 }) }
|
| 2158 | 2026-01-14T21:22:49.636Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-7" }): asked for number of component details
num_details = 4
slot = gimlet 0
|
| 2159 | 2026-01-14T21:22:49.636Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor
details = Measurement(Measurement { name: "V12_U2A_A0", kind: Current, value: Ok(0.45898438) })
index = 0
slot = gimlet 0
|
| 2160 | 2026-01-14T21:22:49.636Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor
details = Measurement(Measurement { name: "V3P3_U2A_A0", kind: Current, value: Ok(0.024414063) })
index = 1
slot = gimlet 0
|
| 2161 | 2026-01-14T21:22:49.636Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor
details = Measurement(Measurement { name: "V12_U2A_A0", kind: Voltage, value: Ok(12.03125) })
index = 2
slot = gimlet 0
|
| 2162 | 2026-01-14T21:22:49.636Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor
details = Measurement(Measurement { name: "V3P3_U2A_A0", kind: Voltage, value: Ok(3.328125) })
index = 3
slot = gimlet 0
|
| 2163 | 2026-01-14T21:22:49.636Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-0" }): asked for number of component details
num_details = 1
slot = gimlet 1
|
| 2164 | 2026-01-14T21:22:49.636Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-0" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Southwest", kind: Temperature, value: Ok(41.3629) })
index = 0
slot = gimlet 1
|
| 2165 | 2026-01-14T21:22:49.637Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 93 }
interface = fake-switch0
response = RotBootInfo(V3(RotStateV3 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_fwid: Sha3_256([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_fwid: Sha3_256([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]), stage0_fwid: Sha3_256([204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204]), stage0next_fwid: Sha3_256([221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221]), slot_a_status: Ok(()), slot_b_status: Ok(()), stage0_status: Ok(()), stage0next_status: Ok(()) }))
|
| 2166 | 2026-01-14T21:22:49.637Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch0
request = Message { header: Header { version: 22, message_id: 94 }, kind: MgsRequest(SpState) }
|
| 2167 | 2026-01-14T21:22:49.637Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 142 }
interface = fake-sled0
response = ComponentDetails(TlvPage { offset: 0, total: 4 })
|
| 2168 | 2026-01-14T21:22:49.637Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 142 }
interface = fake-sled1
response = ComponentDetails(TlvPage { offset: 0, total: 1 })
|
| 2169 | 2026-01-14T21:22:49.642Z | INFO | test_vpc_firewall (dropshot): request completed
latency_us = 36254
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:46538
req_id = 0f52412a-e5c7-460a-ad1d-6e6a3483bb35
response_code = 200
uri = /sp/switch/0
|
| 2170 | 2026-01-14T21:22:49.642Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 143 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-39" }, offset: 0 }) }
|
| 2171 | 2026-01-14T21:22:49.642Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 143 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-2" }, offset: 0 }) }
|
| 2172 | 2026-01-14T21:22:49.652Z | DEBG | test_vpc_firewall: received state request
reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) }
slot = sidecar 0
|
| 2173 | 2026-01-14T21:22:49.652Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-39" }): asked for number of component details
num_details = 1
slot = gimlet 0
|
| 2174 | 2026-01-14T21:22:49.652Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-39" }): asked for component details for a sensor
details = Measurement(Measurement { name: "t6", kind: Temperature, value: Ok(70.625) })
index = 0
slot = gimlet 0
|
| 2175 | 2026-01-14T21:22:49.652Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-2" }): asked for number of component details
num_details = 1
slot = gimlet 1
|
| 2176 | 2026-01-14T21:22:49.652Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-2" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Southeast", kind: Temperature, value: Ok(41.570313) })
index = 0
slot = gimlet 1
|
| 2177 | 2026-01-14T21:22:49.654Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 94 }
interface = fake-switch0
response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
|
| 2178 | 2026-01-14T21:22:49.654Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 143 }
interface = fake-sled0
response = ComponentDetails(TlvPage { offset: 0, total: 1 })
|
| 2179 | 2026-01-14T21:22:49.654Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 143 }
interface = fake-sled1
response = ComponentDetails(TlvPage { offset: 0, total: 1 })
|
| 2180 | 2026-01-14T21:22:49.654Z | TRAC | test_vpc_firewall (dropshot): incoming request
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:46538
req_id = 6c998af3-7407-4335-86c6-cdc249858d2a
uri = /sp/switch/0/component/sp/caboose?firmware_slot=0
|
| 2181 | 2026-01-14T21:22:49.654Z | DEBG | test_vpc_firewall (dropshot): determined request API version
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:46538
req_id = 6c998af3-7407-4335-86c6-cdc249858d2a
uri = /sp/switch/0/component/sp/caboose?firmware_slot=0
version = 3.0.0
|
| 2182 | 2026-01-14T21:22:49.654Z | TRAC | test_vpc_firewall (sensor-poller): polled SP successfully
chassis_type = Switch
num_samples = 3
sp_slot = 0
|
| 2183 | 2026-01-14T21:22:49.664Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 144 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-46" }, offset: 0 }) }
|
| 2184 | 2026-01-14T21:22:49.664Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 144 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-1" }, offset: 0 }) }
|
| 2185 | 2026-01-14T21:22:49.665Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch0
request = Message { header: Header { version: 22, message_id: 95 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "sp" }, slot: 0, key: [71, 73, 84, 67] }) }
|
| 2186 | 2026-01-14T21:22:49.666Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-46" }): asked for number of component details
num_details = 1
slot = gimlet 0
|
| 2187 | 2026-01-14T21:22:49.666Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-46" }): asked for component details for a sensor
details = Measurement(Measurement { name: "CPU", kind: Temperature, value: Ok(64.5) })
index = 0
slot = gimlet 0
|
| 2188 | 2026-01-14T21:22:49.666Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-1" }): asked for number of component details
num_details = 1
slot = gimlet 1
|
| 2189 | 2026-01-14T21:22:49.666Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-1" }): asked for component details for a sensor
details = Measurement(Measurement { name: "South", kind: Temperature, value: Ok(42.5625) })
index = 0
slot = gimlet 1
|
| 2190 | 2026-01-14T21:22:49.666Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 95 }
interface = fake-switch0
response = CabooseValue
|
| 2191 | 2026-01-14T21:22:49.667Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 144 }
interface = fake-sled0
response = ComponentDetails(TlvPage { offset: 0, total: 1 })
|
| 2192 | 2026-01-14T21:22:49.667Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 144 }
interface = fake-sled1
response = ComponentDetails(TlvPage { offset: 0, total: 1 })
|
| 2193 | 2026-01-14T21:22:49.669Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch0
request = Message { header: Header { version: 22, message_id: 96 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "sp" }, slot: 0, key: [66, 79, 82, 68] }) }
|
| 2194 | 2026-01-14T21:22:49.669Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 145 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-8" }, offset: 0 }) }
|
| 2195 | 2026-01-14T21:22:49.669Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 145 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-7" }, offset: 0 }) }
|
| 2196 | 2026-01-14T21:22:49.674Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-8" }): asked for number of component details
num_details = 1
slot = gimlet 0
|
| 2197 | 2026-01-14T21:22:49.674Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-8" }): asked for component details for a sensor
details = Measurement(Measurement { name: "U2_N0", kind: Temperature, value: Ok(56.0) })
index = 0
slot = gimlet 0
|
| 2198 | 2026-01-14T21:22:49.674Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-7" }): asked for number of component details
num_details = 4
slot = gimlet 1
|
| 2199 | 2026-01-14T21:22:49.674Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor
details = Measurement(Measurement { name: "V12_U2A_A0", kind: Current, value: Ok(0.41893438) })
index = 0
slot = gimlet 1
|
| 2200 | 2026-01-14T21:22:49.674Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor
details = Measurement(Measurement { name: "V3P3_U2A_A0", kind: Current, value: Ok(0.025614602) })
index = 1
slot = gimlet 1
|
| 2201 | 2026-01-14T21:22:49.674Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor
details = Measurement(Measurement { name: "V12_U2A_A0", kind: Voltage, value: Ok(12.02914) })
index = 2
slot = gimlet 1
|
| 2202 | 2026-01-14T21:22:49.674Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor
details = Measurement(Measurement { name: "V3P3_U2A_A0", kind: Voltage, value: Ok(3.2618) })
index = 3
slot = gimlet 1
|
| 2203 | 2026-01-14T21:22:49.675Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 96 }
interface = fake-switch0
response = CabooseValue
|
| 2204 | 2026-01-14T21:22:49.675Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 145 }
interface = fake-sled0
response = ComponentDetails(TlvPage { offset: 0, total: 1 })
|
| 2205 | 2026-01-14T21:22:49.675Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 145 }
interface = fake-sled1
response = ComponentDetails(TlvPage { offset: 0, total: 4 })
|
| 2206 | 2026-01-14T21:22:49.678Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch0
request = Message { header: Header { version: 22, message_id: 97 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "sp" }, slot: 0, key: [78, 65, 77, 69] }) }
|
| 2207 | 2026-01-14T21:22:49.679Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 146 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-53" }, offset: 0 }) }
|
| 2208 | 2026-01-14T21:22:49.679Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 146 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-39" }, offset: 0 }) }
|
| 2209 | 2026-01-14T21:22:49.679Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for number of component details
num_details = 6
slot = gimlet 0
|
| 2210 | 2026-01-14T21:22:49.679Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Southeast", kind: Speed, value: Ok(2607.0) })
index = 0
slot = gimlet 0
|
| 2211 | 2026-01-14T21:22:49.679Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Northeast", kind: Speed, value: Ok(2476.0) })
index = 1
slot = gimlet 0
|
| 2212 | 2026-01-14T21:22:49.679Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor
details = Measurement(Measurement { name: "South", kind: Speed, value: Ok(2553.0) })
index = 2
slot = gimlet 0
|
| 2213 | 2026-01-14T21:22:49.679Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor
details = Measurement(Measurement { name: "North", kind: Speed, value: Ok(2265.0) })
index = 3
slot = gimlet 0
|
| 2214 | 2026-01-14T21:22:49.679Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Southwest", kind: Speed, value: Ok(2649.0) })
index = 4
slot = gimlet 0
|
| 2215 | 2026-01-14T21:22:49.679Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Northwest", kind: Speed, value: Ok(2275.0) })
index = 5
slot = gimlet 0
|
| 2216 | 2026-01-14T21:22:49.679Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-39" }): asked for number of component details
num_details = 1
slot = gimlet 1
|
| 2217 | 2026-01-14T21:22:49.679Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-39" }): asked for component details for a sensor
details = Measurement(Measurement { name: "t6", kind: Temperature, value: Ok(70.625) })
index = 0
slot = gimlet 1
|
| 2218 | 2026-01-14T21:22:49.679Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 97 }
interface = fake-switch0
response = CabooseValue
|
| 2219 | 2026-01-14T21:22:49.679Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 146 }
interface = fake-sled0
response = ComponentDetails(TlvPage { offset: 0, total: 6 })
|
| 2220 | 2026-01-14T21:22:49.679Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 146 }
interface = fake-sled1
response = ComponentDetails(TlvPage { offset: 0, total: 1 })
|
| 2221 | 2026-01-14T21:22:49.687Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch0
request = Message { header: Header { version: 22, message_id: 98 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "sp" }, slot: 0, key: [86, 69, 82, 83] }) }
|
| 2222 | 2026-01-14T21:22:49.687Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 147 }, kind: MgsRequest(SpState) }
|
| 2223 | 2026-01-14T21:22:49.687Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 147 }, kind: MgsRequest(SpState) }
|
| 2224 | 2026-01-14T21:22:49.767Z | DEBG | test_vpc_firewall: received state request
reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) }
slot = gimlet 0
|
| 2225 | 2026-01-14T21:22:49.768Z | DEBG | test_vpc_firewall: received state request
reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) }
slot = gimlet 1
|
| 2226 | 2026-01-14T21:22:49.770Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 98 }
interface = fake-switch0
response = CabooseValue
|
| 2227 | 2026-01-14T21:22:49.770Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 147 }
interface = fake-sled0
response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
|
| 2228 | 2026-01-14T21:22:49.771Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 147 }
interface = fake-sled1
response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
|
| 2229 | 2026-01-14T21:22:49.771Z | TRAC | test_vpc_firewall (sensor-poller): polled SP successfully
chassis_type = Sled
num_samples = 17
sp_slot = 0
|
| 2230 | 2026-01-14T21:22:49.771Z | TRAC | test_vpc_firewall (sensor-poller): polled SP successfully
chassis_type = Sled
num_samples = 16
sp_slot = 1
|
| 2231 | 2026-01-14T21:22:49.771Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch0
request = Message { header: Header { version: 22, message_id: 99 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "sp" }, slot: 0, key: [83, 73, 71, 78] }) }
|
| 2232 | 2026-01-14T21:22:49.772Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 99 }
interface = fake-switch0
response = Error(NoSuchCabooseKey([83, 73, 71, 78]))
|
| 2233 | 2026-01-14T21:22:49.772Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch0
request = Message { header: Header { version: 22, message_id: 100 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "sp" }, slot: 0, key: [69, 80, 79, 67] }) }
|
| 2234 | 2026-01-14T21:22:49.773Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 100 }
interface = fake-switch0
response = Error(NoSuchCabooseKey([69, 80, 79, 67]))
|
| 2235 | 2026-01-14T21:22:49.773Z | INFO | test_vpc_firewall (dropshot): request completed
latency_us = 118918
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:46538
req_id = 6c998af3-7407-4335-86c6-cdc249858d2a
response_code = 200
uri = /sp/switch/0/component/sp/caboose?firmware_slot=0
|
| 2236 | 2026-01-14T21:22:49.774Z | TRAC | test_vpc_firewall (dropshot): incoming request
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:46538
req_id = bb5a15ee-3e32-44d6-9d3c-7a8e428c128a
uri = /sp/switch/0/component/sp/caboose?firmware_slot=1
|
| 2237 | 2026-01-14T21:22:49.774Z | DEBG | test_vpc_firewall (dropshot): determined request API version
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:46538
req_id = bb5a15ee-3e32-44d6-9d3c-7a8e428c128a
uri = /sp/switch/0/component/sp/caboose?firmware_slot=1
version = 3.0.0
|
| 2238 | 2026-01-14T21:22:49.775Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch0
request = Message { header: Header { version: 22, message_id: 101 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "sp" }, slot: 1, key: [71, 73, 84, 67] }) }
|
| 2239 | 2026-01-14T21:22:49.781Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 101 }
interface = fake-switch0
response = CabooseValue
|
| 2240 | 2026-01-14T21:22:49.781Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch0
request = Message { header: Header { version: 22, message_id: 102 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "sp" }, slot: 1, key: [66, 79, 82, 68] }) }
|
| 2241 | 2026-01-14T21:22:49.782Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 102 }
interface = fake-switch0
response = CabooseValue
|
| 2242 | 2026-01-14T21:22:49.782Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch0
request = Message { header: Header { version: 22, message_id: 103 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "sp" }, slot: 1, key: [78, 65, 77, 69] }) }
|
| 2243 | 2026-01-14T21:22:49.782Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 103 }
interface = fake-switch0
response = CabooseValue
|
| 2244 | 2026-01-14T21:22:49.782Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch0
request = Message { header: Header { version: 22, message_id: 104 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "sp" }, slot: 1, key: [86, 69, 82, 83] }) }
|
| 2245 | 2026-01-14T21:22:49.782Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 104 }
interface = fake-switch0
response = CabooseValue
|
| 2246 | 2026-01-14T21:22:49.783Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch0
request = Message { header: Header { version: 22, message_id: 105 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "sp" }, slot: 1, key: [83, 73, 71, 78] }) }
|
| 2247 | 2026-01-14T21:22:49.783Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 105 }
interface = fake-switch0
response = Error(NoSuchCabooseKey([83, 73, 71, 78]))
|
| 2248 | 2026-01-14T21:22:49.783Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch0
request = Message { header: Header { version: 22, message_id: 106 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "sp" }, slot: 1, key: [69, 80, 79, 67] }) }
|
| 2249 | 2026-01-14T21:22:49.783Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 106 }
interface = fake-switch0
response = Error(NoSuchCabooseKey([69, 80, 79, 67]))
|
| 2250 | 2026-01-14T21:22:49.783Z | INFO | test_vpc_firewall (dropshot): request completed
latency_us = 9214
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:46538
req_id = bb5a15ee-3e32-44d6-9d3c-7a8e428c128a
response_code = 200
uri = /sp/switch/0/component/sp/caboose?firmware_slot=1
|
| 2251 | 2026-01-14T21:22:49.787Z | TRAC | test_vpc_firewall (dropshot): incoming request
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:46538
req_id = ed91135a-0847-4aba-b698-8582fb55c044
uri = /sp/switch/0/component/rot/caboose?firmware_slot=0
|
| 2252 | 2026-01-14T21:22:49.787Z | DEBG | test_vpc_firewall (dropshot): determined request API version
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:46538
req_id = ed91135a-0847-4aba-b698-8582fb55c044
uri = /sp/switch/0/component/rot/caboose?firmware_slot=0
version = 3.0.0
|
| 2253 | 2026-01-14T21:22:49.787Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch0
request = Message { header: Header { version: 22, message_id: 107 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "rot" }, slot: 0, key: [71, 73, 84, 67] }) }
|
| 2254 | 2026-01-14T21:22:49.787Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 107 }
interface = fake-switch0
response = CabooseValue
|
| 2255 | 2026-01-14T21:22:49.788Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch0
request = Message { header: Header { version: 22, message_id: 108 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "rot" }, slot: 0, key: [66, 79, 82, 68] }) }
|
| 2256 | 2026-01-14T21:22:49.788Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 108 }
interface = fake-switch0
response = CabooseValue
|
| 2257 | 2026-01-14T21:22:49.788Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch0
request = Message { header: Header { version: 22, message_id: 109 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "rot" }, slot: 0, key: [78, 65, 77, 69] }) }
|
| 2258 | 2026-01-14T21:22:49.788Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 109 }
interface = fake-switch0
response = CabooseValue
|
| 2259 | 2026-01-14T21:22:49.788Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch0
request = Message { header: Header { version: 22, message_id: 110 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "rot" }, slot: 0, key: [86, 69, 82, 83] }) }
|
| 2260 | 2026-01-14T21:22:49.788Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 110 }
interface = fake-switch0
response = CabooseValue
|
| 2261 | 2026-01-14T21:22:49.788Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch0
request = Message { header: Header { version: 22, message_id: 111 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "rot" }, slot: 0, key: [83, 73, 71, 78] }) }
|
| 2262 | 2026-01-14T21:22:49.788Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 111 }
interface = fake-switch0
response = CabooseValue
|
| 2263 | 2026-01-14T21:22:49.788Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch0
request = Message { header: Header { version: 22, message_id: 112 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "rot" }, slot: 0, key: [69, 80, 79, 67] }) }
|
| 2264 | 2026-01-14T21:22:49.789Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 112 }
interface = fake-switch0
response = Error(NoSuchCabooseKey([69, 80, 79, 67]))
|
| 2265 | 2026-01-14T21:22:49.789Z | INFO | test_vpc_firewall (dropshot): request completed
latency_us = 1897
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:46538
req_id = ed91135a-0847-4aba-b698-8582fb55c044
response_code = 200
uri = /sp/switch/0/component/rot/caboose?firmware_slot=0
|
| 2266 | 2026-01-14T21:22:49.792Z | TRAC | test_vpc_firewall (dropshot): incoming request
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:46538
req_id = f9cef0a8-1a5a-45e7-bf70-e400afbe66d0
uri = /sp/switch/0/component/rot/caboose?firmware_slot=1
|
| 2267 | 2026-01-14T21:22:49.792Z | DEBG | test_vpc_firewall (dropshot): determined request API version
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:46538
req_id = f9cef0a8-1a5a-45e7-bf70-e400afbe66d0
uri = /sp/switch/0/component/rot/caboose?firmware_slot=1
version = 3.0.0
|
| 2268 | 2026-01-14T21:22:49.792Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch0
request = Message { header: Header { version: 22, message_id: 113 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "rot" }, slot: 1, key: [71, 73, 84, 67] }) }
|
| 2269 | 2026-01-14T21:22:49.792Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 113 }
interface = fake-switch0
response = CabooseValue
|
| 2270 | 2026-01-14T21:22:49.793Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch0
request = Message { header: Header { version: 22, message_id: 114 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "rot" }, slot: 1, key: [66, 79, 82, 68] }) }
|
| 2271 | 2026-01-14T21:22:49.793Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 114 }
interface = fake-switch0
response = CabooseValue
|
| 2272 | 2026-01-14T21:22:49.793Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch0
request = Message { header: Header { version: 22, message_id: 115 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "rot" }, slot: 1, key: [78, 65, 77, 69] }) }
|
| 2273 | 2026-01-14T21:22:49.793Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 115 }
interface = fake-switch0
response = CabooseValue
|
| 2274 | 2026-01-14T21:22:49.793Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch0
request = Message { header: Header { version: 22, message_id: 116 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "rot" }, slot: 1, key: [86, 69, 82, 83] }) }
|
| 2275 | 2026-01-14T21:22:49.793Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 116 }
interface = fake-switch0
response = CabooseValue
|
| 2276 | 2026-01-14T21:22:49.793Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch0
request = Message { header: Header { version: 22, message_id: 117 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "rot" }, slot: 1, key: [83, 73, 71, 78] }) }
|
| 2277 | 2026-01-14T21:22:49.793Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 117 }
interface = fake-switch0
response = CabooseValue
|
| 2278 | 2026-01-14T21:22:49.793Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch0
request = Message { header: Header { version: 22, message_id: 118 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "rot" }, slot: 1, key: [69, 80, 79, 67] }) }
|
| 2279 | 2026-01-14T21:22:49.793Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 118 }
interface = fake-switch0
response = Error(NoSuchCabooseKey([69, 80, 79, 67]))
|
| 2280 | 2026-01-14T21:22:49.794Z | INFO | test_vpc_firewall (dropshot): request completed
latency_us = 1896
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:46538
req_id = f9cef0a8-1a5a-45e7-bf70-e400afbe66d0
response_code = 200
uri = /sp/switch/0/component/rot/caboose?firmware_slot=1
|
| 2281 | 2026-01-14T21:22:49.795Z | TRAC | test_vpc_firewall (dropshot): incoming request
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:46538
req_id = 38d91f3c-426b-4423-bc63-4d9b7a932f01
uri = /sp/switch/0/component/stage0/caboose?firmware_slot=0
|
| 2282 | 2026-01-14T21:22:49.795Z | DEBG | test_vpc_firewall (dropshot): determined request API version
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:46538
req_id = 38d91f3c-426b-4423-bc63-4d9b7a932f01
uri = /sp/switch/0/component/stage0/caboose?firmware_slot=0
version = 3.0.0
|
| 2283 | 2026-01-14T21:22:49.795Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch0
request = Message { header: Header { version: 22, message_id: 119 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "stage0" }, slot: 0, key: [71, 73, 84, 67] }) }
|
| 2284 | 2026-01-14T21:22:49.796Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 119 }
interface = fake-switch0
response = CabooseValue
|
| 2285 | 2026-01-14T21:22:49.796Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch0
request = Message { header: Header { version: 22, message_id: 120 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "stage0" }, slot: 0, key: [66, 79, 82, 68] }) }
|
| 2286 | 2026-01-14T21:22:49.796Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 120 }
interface = fake-switch0
response = CabooseValue
|
| 2287 | 2026-01-14T21:22:49.796Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch0
request = Message { header: Header { version: 22, message_id: 121 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "stage0" }, slot: 0, key: [78, 65, 77, 69] }) }
|
| 2288 | 2026-01-14T21:22:49.796Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 121 }
interface = fake-switch0
response = CabooseValue
|
| 2289 | 2026-01-14T21:22:49.796Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch0
request = Message { header: Header { version: 22, message_id: 122 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "stage0" }, slot: 0, key: [86, 69, 82, 83] }) }
|
| 2290 | 2026-01-14T21:22:49.797Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 122 }
interface = fake-switch0
response = CabooseValue
|
| 2291 | 2026-01-14T21:22:49.797Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch0
request = Message { header: Header { version: 22, message_id: 123 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "stage0" }, slot: 0, key: [83, 73, 71, 78] }) }
|
| 2292 | 2026-01-14T21:22:49.797Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 123 }
interface = fake-switch0
response = CabooseValue
|
| 2293 | 2026-01-14T21:22:49.797Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch0
request = Message { header: Header { version: 22, message_id: 124 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "stage0" }, slot: 0, key: [69, 80, 79, 67] }) }
|
| 2294 | 2026-01-14T21:22:49.797Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 124 }
interface = fake-switch0
response = Error(NoSuchCabooseKey([69, 80, 79, 67]))
|
| 2295 | 2026-01-14T21:22:49.797Z | INFO | test_vpc_firewall (dropshot): request completed
latency_us = 2324
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:46538
req_id = 38d91f3c-426b-4423-bc63-4d9b7a932f01
response_code = 200
uri = /sp/switch/0/component/stage0/caboose?firmware_slot=0
|
| 2296 | 2026-01-14T21:22:49.798Z | TRAC | test_vpc_firewall (dropshot): incoming request
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:46538
req_id = 48474332-c15b-40e4-8851-c0e74c13d6b9
uri = /sp/switch/0/component/stage0/caboose?firmware_slot=1
|
| 2297 | 2026-01-14T21:22:49.798Z | DEBG | test_vpc_firewall (dropshot): determined request API version
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:46538
req_id = 48474332-c15b-40e4-8851-c0e74c13d6b9
uri = /sp/switch/0/component/stage0/caboose?firmware_slot=1
version = 3.0.0
|
| 2298 | 2026-01-14T21:22:49.799Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch0
request = Message { header: Header { version: 22, message_id: 125 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "stage0" }, slot: 1, key: [71, 73, 84, 67] }) }
|
| 2299 | 2026-01-14T21:22:49.799Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 125 }
interface = fake-switch0
response = CabooseValue
|
| 2300 | 2026-01-14T21:22:49.799Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch0
request = Message { header: Header { version: 22, message_id: 126 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "stage0" }, slot: 1, key: [66, 79, 82, 68] }) }
|
| 2301 | 2026-01-14T21:22:49.799Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 126 }
interface = fake-switch0
response = CabooseValue
|
| 2302 | 2026-01-14T21:22:49.799Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch0
request = Message { header: Header { version: 22, message_id: 127 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "stage0" }, slot: 1, key: [78, 65, 77, 69] }) }
|
| 2303 | 2026-01-14T21:22:49.799Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 127 }
interface = fake-switch0
response = CabooseValue
|
| 2304 | 2026-01-14T21:22:49.799Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch0
request = Message { header: Header { version: 22, message_id: 128 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "stage0" }, slot: 1, key: [86, 69, 82, 83] }) }
|
| 2305 | 2026-01-14T21:22:49.800Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 128 }
interface = fake-switch0
response = CabooseValue
|
| 2306 | 2026-01-14T21:22:49.800Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch0
request = Message { header: Header { version: 22, message_id: 129 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "stage0" }, slot: 1, key: [83, 73, 71, 78] }) }
|
| 2307 | 2026-01-14T21:22:49.800Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 129 }
interface = fake-switch0
response = CabooseValue
|
| 2308 | 2026-01-14T21:22:49.800Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch0
request = Message { header: Header { version: 22, message_id: 130 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "stage0" }, slot: 1, key: [69, 80, 79, 67] }) }
|
| 2309 | 2026-01-14T21:22:49.800Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 130 }
interface = fake-switch0
response = Error(NoSuchCabooseKey([69, 80, 79, 67]))
|
| 2310 | 2026-01-14T21:22:49.800Z | INFO | test_vpc_firewall (dropshot): request completed
latency_us = 1837
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:46538
req_id = 48474332-c15b-40e4-8851-c0e74c13d6b9
response_code = 200
uri = /sp/switch/0/component/stage0/caboose?firmware_slot=1
|
| 2311 | 2026-01-14T21:22:49.801Z | TRAC | test_vpc_firewall (dropshot): incoming request
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:46538
req_id = ed75abaf-a6df-4fa0-8312-71b4e1a796b0
uri = /sp/switch/0/component/rot/cmpa
|
| 2312 | 2026-01-14T21:22:49.801Z | DEBG | test_vpc_firewall (dropshot): determined request API version
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:46538
req_id = ed75abaf-a6df-4fa0-8312-71b4e1a796b0
uri = /sp/switch/0/component/rot/cmpa
version = 3.0.0
|
| 2313 | 2026-01-14T21:22:49.801Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch0
request = Message { header: Header { version: 22, message_id: 131 }, kind: MgsRequest(ReadRot(ReadCmpa)) }
|
| 2314 | 2026-01-14T21:22:49.801Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 131 }
interface = fake-switch0
response = ReadRot(Ok)
|
| 2315 | 2026-01-14T21:22:49.801Z | INFO | test_vpc_firewall (dropshot): request completed
latency_us = 554
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:46538
req_id = ed75abaf-a6df-4fa0-8312-71b4e1a796b0
response_code = 200
uri = /sp/switch/0/component/rot/cmpa
|
| 2316 | 2026-01-14T21:22:49.802Z | TRAC | test_vpc_firewall (dropshot): incoming request
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:46538
req_id = b5e5f5bd-97ba-4e4a-bd30-6eb20c3df6f6
uri = /sp/switch/0/component/rot/cfpa
|
| 2317 | 2026-01-14T21:22:49.802Z | DEBG | test_vpc_firewall (dropshot): determined request API version
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:46538
req_id = b5e5f5bd-97ba-4e4a-bd30-6eb20c3df6f6
uri = /sp/switch/0/component/rot/cfpa
version = 3.0.0
|
| 2318 | 2026-01-14T21:22:49.803Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch0
request = Message { header: Header { version: 22, message_id: 132 }, kind: MgsRequest(ReadRot(ReadCfpa(Active))) }
|
| 2319 | 2026-01-14T21:22:49.803Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 132 }
interface = fake-switch0
response = ReadRot(Ok)
|
| 2320 | 2026-01-14T21:22:49.803Z | INFO | test_vpc_firewall (dropshot): request completed
latency_us = 643
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:46538
req_id = b5e5f5bd-97ba-4e4a-bd30-6eb20c3df6f6
response_code = 200
uri = /sp/switch/0/component/rot/cfpa
|
| 2321 | 2026-01-14T21:22:49.804Z | TRAC | test_vpc_firewall (dropshot): incoming request
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:46538
req_id = f381509c-ed5d-49de-9d17-03c6fd4a4819
uri = /sp/switch/0/component/rot/cfpa
|
| 2322 | 2026-01-14T21:22:49.804Z | DEBG | test_vpc_firewall (dropshot): determined request API version
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:46538
req_id = f381509c-ed5d-49de-9d17-03c6fd4a4819
uri = /sp/switch/0/component/rot/cfpa
version = 3.0.0
|
| 2323 | 2026-01-14T21:22:49.804Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch0
request = Message { header: Header { version: 22, message_id: 133 }, kind: MgsRequest(ReadRot(ReadCfpa(Inactive))) }
|
| 2324 | 2026-01-14T21:22:49.804Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 133 }
interface = fake-switch0
response = ReadRot(Ok)
|
| 2325 | 2026-01-14T21:22:49.804Z | INFO | test_vpc_firewall (dropshot): request completed
latency_us = 594
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:46538
req_id = f381509c-ed5d-49de-9d17-03c6fd4a4819
response_code = 200
uri = /sp/switch/0/component/rot/cfpa
|
| 2326 | 2026-01-14T21:22:49.813Z | TRAC | test_vpc_firewall (dropshot): incoming request
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:46538
req_id = 1070a561-f83a-46e3-989a-b4625732b79d
uri = /sp/switch/0/component/rot/cfpa
|
| 2327 | 2026-01-14T21:22:49.813Z | DEBG | test_vpc_firewall (dropshot): determined request API version
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:46538
req_id = 1070a561-f83a-46e3-989a-b4625732b79d
uri = /sp/switch/0/component/rot/cfpa
version = 3.0.0
|
| 2328 | 2026-01-14T21:22:49.814Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch0
request = Message { header: Header { version: 22, message_id: 134 }, kind: MgsRequest(ReadRot(ReadCfpa(Scratch))) }
|
| 2329 | 2026-01-14T21:22:49.814Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 134 }
interface = fake-switch0
response = ReadRot(Ok)
|
| 2330 | 2026-01-14T21:22:49.814Z | INFO | test_vpc_firewall (dropshot): request completed
latency_us = 1102
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:46538
req_id = 1070a561-f83a-46e3-989a-b4625732b79d
response_code = 200
uri = /sp/switch/0/component/rot/cfpa
|
| 2331 | 2026-01-14T21:22:49.815Z | TRAC | test_vpc_firewall (dropshot): incoming request
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:46538
req_id = 97984b89-663f-4299-a690-909f800f2d77
uri = /sp/switch/1
|
| 2332 | 2026-01-14T21:22:49.815Z | DEBG | test_vpc_firewall (dropshot): determined request API version
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:46538
req_id = 97984b89-663f-4299-a690-909f800f2d77
uri = /sp/switch/1
version = 3.0.0
|
| 2333 | 2026-01-14T21:22:49.815Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch1
request = Message { header: Header { version: 22, message_id: 67 }, kind: MgsRequest(SpState) }
|
| 2334 | 2026-01-14T21:22:49.818Z | DEBG | test_vpc_firewall: received state request
reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) }
slot = sidecar 1
|
| 2335 | 2026-01-14T21:22:49.819Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 67 }
interface = fake-switch1
response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
|
| 2336 | 2026-01-14T21:22:49.819Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch1
request = Message { header: Header { version: 22, message_id: 68 }, kind: MgsRequest(VersionedRotBootInfo { version: 3 }) }
|
| 2337 | 2026-01-14T21:22:49.820Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 68 }
interface = fake-switch1
response = RotBootInfo(V3(RotStateV3 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_fwid: Sha3_256([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_fwid: Sha3_256([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]), stage0_fwid: Sha3_256([204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204]), stage0next_fwid: Sha3_256([221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221]), slot_a_status: Ok(()), slot_b_status: Ok(()), stage0_status: Ok(()), stage0next_status: Ok(()) }))
|
| 2338 | 2026-01-14T21:22:49.820Z | INFO | test_vpc_firewall (dropshot): request completed
latency_us = 4546
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:46538
req_id = 97984b89-663f-4299-a690-909f800f2d77
response_code = 200
uri = /sp/switch/1
|
| 2339 | 2026-01-14T21:22:49.821Z | TRAC | test_vpc_firewall (dropshot): incoming request
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:46538
req_id = 9ac9699c-8089-4e4c-b454-851c34a302e7
uri = /sp/switch/1/component/sp/caboose?firmware_slot=0
|
| 2340 | 2026-01-14T21:22:49.821Z | DEBG | test_vpc_firewall (dropshot): determined request API version
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:46538
req_id = 9ac9699c-8089-4e4c-b454-851c34a302e7
uri = /sp/switch/1/component/sp/caboose?firmware_slot=0
version = 3.0.0
|
| 2341 | 2026-01-14T21:22:49.822Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch1
request = Message { header: Header { version: 22, message_id: 69 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "sp" }, slot: 0, key: [71, 73, 84, 67] }) }
|
| 2342 | 2026-01-14T21:22:49.822Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 69 }
interface = fake-switch1
response = CabooseValue
|
| 2343 | 2026-01-14T21:22:49.822Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch1
request = Message { header: Header { version: 22, message_id: 70 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "sp" }, slot: 0, key: [66, 79, 82, 68] }) }
|
| 2344 | 2026-01-14T21:22:49.822Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 70 }
interface = fake-switch1
response = CabooseValue
|
| 2345 | 2026-01-14T21:22:49.822Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch1
request = Message { header: Header { version: 22, message_id: 71 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "sp" }, slot: 0, key: [78, 65, 77, 69] }) }
|
| 2346 | 2026-01-14T21:22:49.822Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 71 }
interface = fake-switch1
response = CabooseValue
|
| 2347 | 2026-01-14T21:22:49.822Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch1
request = Message { header: Header { version: 22, message_id: 72 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "sp" }, slot: 0, key: [86, 69, 82, 83] }) }
|
| 2348 | 2026-01-14T21:22:49.822Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 72 }
interface = fake-switch1
response = CabooseValue
|
| 2349 | 2026-01-14T21:22:49.822Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch1
request = Message { header: Header { version: 22, message_id: 73 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "sp" }, slot: 0, key: [83, 73, 71, 78] }) }
|
| 2350 | 2026-01-14T21:22:49.822Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 73 }
interface = fake-switch1
response = Error(NoSuchCabooseKey([83, 73, 71, 78]))
|
| 2351 | 2026-01-14T21:22:49.823Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch1
request = Message { header: Header { version: 22, message_id: 74 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "sp" }, slot: 0, key: [69, 80, 79, 67] }) }
|
| 2352 | 2026-01-14T21:22:49.823Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 74 }
interface = fake-switch1
response = Error(NoSuchCabooseKey([69, 80, 79, 67]))
|
| 2353 | 2026-01-14T21:22:49.823Z | INFO | test_vpc_firewall (dropshot): request completed
latency_us = 1633
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:46538
req_id = 9ac9699c-8089-4e4c-b454-851c34a302e7
response_code = 200
uri = /sp/switch/1/component/sp/caboose?firmware_slot=0
|
| 2354 | 2026-01-14T21:22:49.824Z | TRAC | test_vpc_firewall (dropshot): incoming request
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:46538
req_id = 75466c1d-4207-40e9-b773-6e90542fd9e7
uri = /sp/switch/1/component/sp/caboose?firmware_slot=1
|
| 2355 | 2026-01-14T21:22:49.824Z | DEBG | test_vpc_firewall (dropshot): determined request API version
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:46538
req_id = 75466c1d-4207-40e9-b773-6e90542fd9e7
uri = /sp/switch/1/component/sp/caboose?firmware_slot=1
version = 3.0.0
|
| 2356 | 2026-01-14T21:22:49.824Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch1
request = Message { header: Header { version: 22, message_id: 75 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "sp" }, slot: 1, key: [71, 73, 84, 67] }) }
|
| 2357 | 2026-01-14T21:22:49.824Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 75 }
interface = fake-switch1
response = CabooseValue
|
| 2358 | 2026-01-14T21:22:49.824Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch1
request = Message { header: Header { version: 22, message_id: 76 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "sp" }, slot: 1, key: [66, 79, 82, 68] }) }
|
| 2359 | 2026-01-14T21:22:49.826Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 76 }
interface = fake-switch1
response = CabooseValue
|
| 2360 | 2026-01-14T21:22:49.826Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch1
request = Message { header: Header { version: 22, message_id: 77 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "sp" }, slot: 1, key: [78, 65, 77, 69] }) }
|
| 2361 | 2026-01-14T21:22:49.827Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 77 }
interface = fake-switch1
response = CabooseValue
|
| 2362 | 2026-01-14T21:22:49.827Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch1
request = Message { header: Header { version: 22, message_id: 78 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "sp" }, slot: 1, key: [86, 69, 82, 83] }) }
|
| 2363 | 2026-01-14T21:22:49.827Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 78 }
interface = fake-switch1
response = CabooseValue
|
| 2364 | 2026-01-14T21:22:49.827Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch1
request = Message { header: Header { version: 22, message_id: 79 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "sp" }, slot: 1, key: [83, 73, 71, 78] }) }
|
| 2365 | 2026-01-14T21:22:49.827Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 79 }
interface = fake-switch1
response = Error(NoSuchCabooseKey([83, 73, 71, 78]))
|
| 2366 | 2026-01-14T21:22:49.827Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch1
request = Message { header: Header { version: 22, message_id: 80 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "sp" }, slot: 1, key: [69, 80, 79, 67] }) }
|
| 2367 | 2026-01-14T21:22:49.828Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 80 }
interface = fake-switch1
response = Error(NoSuchCabooseKey([69, 80, 79, 67]))
|
| 2368 | 2026-01-14T21:22:49.828Z | INFO | test_vpc_firewall (dropshot): request completed
latency_us = 4250
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:46538
req_id = 75466c1d-4207-40e9-b773-6e90542fd9e7
response_code = 200
uri = /sp/switch/1/component/sp/caboose?firmware_slot=1
|
| 2369 | 2026-01-14T21:22:49.833Z | TRAC | test_vpc_firewall (dropshot): incoming request
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:46538
req_id = 56a54102-ac7e-49a5-93ed-5b5552b9a2bf
uri = /sp/switch/1/component/rot/caboose?firmware_slot=0
|
| 2370 | 2026-01-14T21:22:49.833Z | DEBG | test_vpc_firewall (dropshot): determined request API version
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:46538
req_id = 56a54102-ac7e-49a5-93ed-5b5552b9a2bf
uri = /sp/switch/1/component/rot/caboose?firmware_slot=0
version = 3.0.0
|
| 2371 | 2026-01-14T21:22:49.836Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch1
request = Message { header: Header { version: 22, message_id: 81 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "rot" }, slot: 0, key: [71, 73, 84, 67] }) }
|
| 2372 | 2026-01-14T21:22:49.836Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 81 }
interface = fake-switch1
response = CabooseValue
|
| 2373 | 2026-01-14T21:22:49.836Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch1
request = Message { header: Header { version: 22, message_id: 82 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "rot" }, slot: 0, key: [66, 79, 82, 68] }) }
|
| 2374 | 2026-01-14T21:22:49.836Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 82 }
interface = fake-switch1
response = CabooseValue
|
| 2375 | 2026-01-14T21:22:49.836Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch1
request = Message { header: Header { version: 22, message_id: 83 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "rot" }, slot: 0, key: [78, 65, 77, 69] }) }
|
| 2376 | 2026-01-14T21:22:49.836Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 83 }
interface = fake-switch1
response = CabooseValue
|
| 2377 | 2026-01-14T21:22:49.836Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch1
request = Message { header: Header { version: 22, message_id: 84 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "rot" }, slot: 0, key: [86, 69, 82, 83] }) }
|
| 2378 | 2026-01-14T21:22:49.837Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 84 }
interface = fake-switch1
response = CabooseValue
|
| 2379 | 2026-01-14T21:22:49.837Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch1
request = Message { header: Header { version: 22, message_id: 85 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "rot" }, slot: 0, key: [83, 73, 71, 78] }) }
|
| 2380 | 2026-01-14T21:22:49.837Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 85 }
interface = fake-switch1
response = CabooseValue
|
| 2381 | 2026-01-14T21:22:49.837Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch1
request = Message { header: Header { version: 22, message_id: 86 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "rot" }, slot: 0, key: [69, 80, 79, 67] }) }
|
| 2382 | 2026-01-14T21:22:49.837Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 86 }
interface = fake-switch1
response = Error(NoSuchCabooseKey([69, 80, 79, 67]))
|
| 2383 | 2026-01-14T21:22:49.837Z | INFO | test_vpc_firewall (dropshot): request completed
latency_us = 4865
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:46538
req_id = 56a54102-ac7e-49a5-93ed-5b5552b9a2bf
response_code = 200
uri = /sp/switch/1/component/rot/caboose?firmware_slot=0
|
| 2384 | 2026-01-14T21:22:49.839Z | TRAC | test_vpc_firewall (dropshot): incoming request
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:46538
req_id = 6f836106-9bde-4823-9161-9e0fa2cfbf87
uri = /sp/switch/1/component/rot/caboose?firmware_slot=1
|
| 2385 | 2026-01-14T21:22:49.840Z | DEBG | test_vpc_firewall (dropshot): determined request API version
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:46538
req_id = 6f836106-9bde-4823-9161-9e0fa2cfbf87
uri = /sp/switch/1/component/rot/caboose?firmware_slot=1
version = 3.0.0
|
| 2386 | 2026-01-14T21:22:49.840Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch1
request = Message { header: Header { version: 22, message_id: 87 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "rot" }, slot: 1, key: [71, 73, 84, 67] }) }
|
| 2387 | 2026-01-14T21:22:49.841Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 87 }
interface = fake-switch1
response = CabooseValue
|
| 2388 | 2026-01-14T21:22:49.841Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch1
request = Message { header: Header { version: 22, message_id: 88 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "rot" }, slot: 1, key: [66, 79, 82, 68] }) }
|
| 2389 | 2026-01-14T21:22:49.841Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 88 }
interface = fake-switch1
response = CabooseValue
|
| 2390 | 2026-01-14T21:22:49.841Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch1
request = Message { header: Header { version: 22, message_id: 89 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "rot" }, slot: 1, key: [78, 65, 77, 69] }) }
|
| 2391 | 2026-01-14T21:22:49.841Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 89 }
interface = fake-switch1
response = CabooseValue
|
| 2392 | 2026-01-14T21:22:49.841Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch1
request = Message { header: Header { version: 22, message_id: 90 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "rot" }, slot: 1, key: [86, 69, 82, 83] }) }
|
| 2393 | 2026-01-14T21:22:49.841Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 90 }
interface = fake-switch1
response = CabooseValue
|
| 2394 | 2026-01-14T21:22:49.842Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch1
request = Message { header: Header { version: 22, message_id: 91 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "rot" }, slot: 1, key: [83, 73, 71, 78] }) }
|
| 2395 | 2026-01-14T21:22:49.842Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 91 }
interface = fake-switch1
response = CabooseValue
|
| 2396 | 2026-01-14T21:22:49.842Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch1
request = Message { header: Header { version: 22, message_id: 92 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "rot" }, slot: 1, key: [69, 80, 79, 67] }) }
|
| 2397 | 2026-01-14T21:22:49.843Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 92 }
interface = fake-switch1
response = Error(NoSuchCabooseKey([69, 80, 79, 67]))
|
| 2398 | 2026-01-14T21:22:49.843Z | INFO | test_vpc_firewall (dropshot): request completed
latency_us = 4222
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:46538
req_id = 6f836106-9bde-4823-9161-9e0fa2cfbf87
response_code = 200
uri = /sp/switch/1/component/rot/caboose?firmware_slot=1
|
| 2399 | 2026-01-14T21:22:49.860Z | TRAC | test_vpc_firewall (dropshot): incoming request
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:46538
req_id = a39cfb47-8c47-47e5-86be-21ff1c533d2e
uri = /sp/switch/1/component/stage0/caboose?firmware_slot=0
|
| 2400 | 2026-01-14T21:22:49.860Z | DEBG | test_vpc_firewall (dropshot): determined request API version
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:46538
req_id = a39cfb47-8c47-47e5-86be-21ff1c533d2e
uri = /sp/switch/1/component/stage0/caboose?firmware_slot=0
version = 3.0.0
|
| 2401 | 2026-01-14T21:22:49.861Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch1
request = Message { header: Header { version: 22, message_id: 93 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "stage0" }, slot: 0, key: [71, 73, 84, 67] }) }
|
| 2402 | 2026-01-14T21:22:49.862Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 93 }
interface = fake-switch1
response = CabooseValue
|
| 2403 | 2026-01-14T21:22:49.862Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch1
request = Message { header: Header { version: 22, message_id: 94 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "stage0" }, slot: 0, key: [66, 79, 82, 68] }) }
|
| 2404 | 2026-01-14T21:22:49.862Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 94 }
interface = fake-switch1
response = CabooseValue
|
| 2405 | 2026-01-14T21:22:49.862Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch1
request = Message { header: Header { version: 22, message_id: 95 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "stage0" }, slot: 0, key: [78, 65, 77, 69] }) }
|
| 2406 | 2026-01-14T21:22:49.862Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 95 }
interface = fake-switch1
response = CabooseValue
|
| 2407 | 2026-01-14T21:22:49.862Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch1
request = Message { header: Header { version: 22, message_id: 96 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "stage0" }, slot: 0, key: [86, 69, 82, 83] }) }
|
| 2408 | 2026-01-14T21:22:49.862Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 96 }
interface = fake-switch1
response = CabooseValue
|
| 2409 | 2026-01-14T21:22:49.862Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch1
request = Message { header: Header { version: 22, message_id: 97 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "stage0" }, slot: 0, key: [83, 73, 71, 78] }) }
|
| 2410 | 2026-01-14T21:22:49.862Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 97 }
interface = fake-switch1
response = CabooseValue
|
| 2411 | 2026-01-14T21:22:49.863Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch1
request = Message { header: Header { version: 22, message_id: 98 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "stage0" }, slot: 0, key: [69, 80, 79, 67] }) }
|
| 2412 | 2026-01-14T21:22:49.863Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 98 }
interface = fake-switch1
response = Error(NoSuchCabooseKey([69, 80, 79, 67]))
|
| 2413 | 2026-01-14T21:22:49.863Z | INFO | test_vpc_firewall (dropshot): request completed
latency_us = 2777
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:46538
req_id = a39cfb47-8c47-47e5-86be-21ff1c533d2e
response_code = 200
uri = /sp/switch/1/component/stage0/caboose?firmware_slot=0
|
| 2414 | 2026-01-14T21:22:49.864Z | TRAC | test_vpc_firewall (dropshot): incoming request
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:46538
req_id = 23ed68ef-333b-4853-86f0-85ca8a39bdd7
uri = /sp/switch/1/component/stage0/caboose?firmware_slot=1
|
| 2415 | 2026-01-14T21:22:49.864Z | DEBG | test_vpc_firewall (dropshot): determined request API version
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:46538
req_id = 23ed68ef-333b-4853-86f0-85ca8a39bdd7
uri = /sp/switch/1/component/stage0/caboose?firmware_slot=1
version = 3.0.0
|
| 2416 | 2026-01-14T21:22:49.864Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch1
request = Message { header: Header { version: 22, message_id: 99 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "stage0" }, slot: 1, key: [71, 73, 84, 67] }) }
|
| 2417 | 2026-01-14T21:22:49.864Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 99 }
interface = fake-switch1
response = CabooseValue
|
| 2418 | 2026-01-14T21:22:49.864Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch1
request = Message { header: Header { version: 22, message_id: 100 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "stage0" }, slot: 1, key: [66, 79, 82, 68] }) }
|
| 2419 | 2026-01-14T21:22:49.865Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 100 }
interface = fake-switch1
response = CabooseValue
|
| 2420 | 2026-01-14T21:22:49.865Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch1
request = Message { header: Header { version: 22, message_id: 101 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "stage0" }, slot: 1, key: [78, 65, 77, 69] }) }
|
| 2421 | 2026-01-14T21:22:49.865Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 101 }
interface = fake-switch1
response = CabooseValue
|
| 2422 | 2026-01-14T21:22:49.865Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch1
request = Message { header: Header { version: 22, message_id: 102 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "stage0" }, slot: 1, key: [86, 69, 82, 83] }) }
|
| 2423 | 2026-01-14T21:22:49.865Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 102 }
interface = fake-switch1
response = CabooseValue
|
| 2424 | 2026-01-14T21:22:49.865Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch1
request = Message { header: Header { version: 22, message_id: 103 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "stage0" }, slot: 1, key: [83, 73, 71, 78] }) }
|
| 2425 | 2026-01-14T21:22:49.865Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 103 }
interface = fake-switch1
response = CabooseValue
|
| 2426 | 2026-01-14T21:22:49.865Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch1
request = Message { header: Header { version: 22, message_id: 104 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "stage0" }, slot: 1, key: [69, 80, 79, 67] }) }
|
| 2427 | 2026-01-14T21:22:49.865Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 104 }
interface = fake-switch1
response = Error(NoSuchCabooseKey([69, 80, 79, 67]))
|
| 2428 | 2026-01-14T21:22:49.866Z | INFO | test_vpc_firewall (dropshot): request completed
latency_us = 1567
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:46538
req_id = 23ed68ef-333b-4853-86f0-85ca8a39bdd7
response_code = 200
uri = /sp/switch/1/component/stage0/caboose?firmware_slot=1
|
| 2429 | 2026-01-14T21:22:49.869Z | TRAC | test_vpc_firewall (dropshot): incoming request
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:46538
req_id = d3ef301a-7049-4789-a1e8-f6cd072e0f81
uri = /sp/switch/1/component/rot/cmpa
|
| 2430 | 2026-01-14T21:22:49.869Z | DEBG | test_vpc_firewall (dropshot): determined request API version
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:46538
req_id = d3ef301a-7049-4789-a1e8-f6cd072e0f81
uri = /sp/switch/1/component/rot/cmpa
version = 3.0.0
|
| 2431 | 2026-01-14T21:22:49.869Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch1
request = Message { header: Header { version: 22, message_id: 105 }, kind: MgsRequest(ReadRot(ReadCmpa)) }
|
| 2432 | 2026-01-14T21:22:49.870Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 105 }
interface = fake-switch1
response = ReadRot(Ok)
|
| 2433 | 2026-01-14T21:22:49.870Z | INFO | test_vpc_firewall (dropshot): request completed
latency_us = 1286
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:46538
req_id = d3ef301a-7049-4789-a1e8-f6cd072e0f81
response_code = 200
uri = /sp/switch/1/component/rot/cmpa
|
| 2434 | 2026-01-14T21:22:49.871Z | TRAC | test_vpc_firewall (dropshot): incoming request
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:46538
req_id = 5b862a2a-6d19-406e-921f-12bf5016aabd
uri = /sp/switch/1/component/rot/cfpa
|
| 2435 | 2026-01-14T21:22:49.871Z | DEBG | test_vpc_firewall (dropshot): determined request API version
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:46538
req_id = 5b862a2a-6d19-406e-921f-12bf5016aabd
uri = /sp/switch/1/component/rot/cfpa
version = 3.0.0
|
| 2436 | 2026-01-14T21:22:49.872Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch1
request = Message { header: Header { version: 22, message_id: 106 }, kind: MgsRequest(ReadRot(ReadCfpa(Active))) }
|
| 2437 | 2026-01-14T21:22:49.872Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 106 }
interface = fake-switch1
response = ReadRot(Ok)
|
| 2438 | 2026-01-14T21:22:49.872Z | INFO | test_vpc_firewall (dropshot): request completed
latency_us = 748
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:46538
req_id = 5b862a2a-6d19-406e-921f-12bf5016aabd
response_code = 200
uri = /sp/switch/1/component/rot/cfpa
|
| 2439 | 2026-01-14T21:22:49.875Z | TRAC | test_vpc_firewall (dropshot): incoming request
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:46538
req_id = 4f735541-eb00-46f4-9141-4838e2df3e32
uri = /sp/switch/1/component/rot/cfpa
|
| 2440 | 2026-01-14T21:22:49.875Z | DEBG | test_vpc_firewall (dropshot): determined request API version
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:46538
req_id = 4f735541-eb00-46f4-9141-4838e2df3e32
uri = /sp/switch/1/component/rot/cfpa
version = 3.0.0
|
| 2441 | 2026-01-14T21:22:49.875Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch1
request = Message { header: Header { version: 22, message_id: 107 }, kind: MgsRequest(ReadRot(ReadCfpa(Inactive))) }
|
| 2442 | 2026-01-14T21:22:49.876Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 107 }
interface = fake-switch1
response = ReadRot(Ok)
|
| 2443 | 2026-01-14T21:22:49.876Z | INFO | test_vpc_firewall (dropshot): request completed
latency_us = 1212
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:46538
req_id = 4f735541-eb00-46f4-9141-4838e2df3e32
response_code = 200
uri = /sp/switch/1/component/rot/cfpa
|
| 2444 | 2026-01-14T21:22:49.884Z | TRAC | test_vpc_firewall (dropshot): incoming request
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:46538
req_id = c506c068-ac5b-403c-b531-c62ef5c8e25b
uri = /sp/switch/1/component/rot/cfpa
|
| 2445 | 2026-01-14T21:22:49.884Z | DEBG | test_vpc_firewall (dropshot): determined request API version
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:46538
req_id = c506c068-ac5b-403c-b531-c62ef5c8e25b
uri = /sp/switch/1/component/rot/cfpa
version = 3.0.0
|
| 2446 | 2026-01-14T21:22:49.885Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch1
request = Message { header: Header { version: 22, message_id: 108 }, kind: MgsRequest(ReadRot(ReadCfpa(Scratch))) }
|
| 2447 | 2026-01-14T21:22:49.885Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 108 }
interface = fake-switch1
response = ReadRot(Ok)
|
| 2448 | 2026-01-14T21:22:49.886Z | INFO | test_vpc_firewall (dropshot): request completed
latency_us = 1223
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:46538
req_id = c506c068-ac5b-403c-b531-c62ef5c8e25b
response_code = 200
uri = /sp/switch/1/component/rot/cfpa
|
| 2449 | 2026-01-14T21:22:49.889Z | TRAC | test_vpc_firewall (dropshot): incoming request
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:46538
req_id = 57ac1cc2-99ae-43b6-b621-1a42d2a442a8
uri = /sp/sled/0
|
| 2450 | 2026-01-14T21:22:49.889Z | DEBG | test_vpc_firewall (dropshot): determined request API version
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:46538
req_id = 57ac1cc2-99ae-43b6-b621-1a42d2a442a8
uri = /sp/sled/0
version = 3.0.0
|
| 2451 | 2026-01-14T21:22:49.889Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 148 }, kind: MgsRequest(SpState) }
|
| 2452 | 2026-01-14T21:22:49.904Z | DEBG | test_vpc_firewall: received state request
reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) }
slot = gimlet 0
|
| 2453 | 2026-01-14T21:22:49.904Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 148 }
interface = fake-sled0
response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
|
| 2454 | 2026-01-14T21:22:49.905Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 149 }, kind: MgsRequest(VersionedRotBootInfo { version: 3 }) }
|
| 2455 | 2026-01-14T21:22:49.905Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 149 }
interface = fake-sled0
response = RotBootInfo(V3(RotStateV3 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_fwid: Sha3_256([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_fwid: Sha3_256([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]), stage0_fwid: Sha3_256([204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204]), stage0next_fwid: Sha3_256([221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221]), slot_a_status: Ok(()), slot_b_status: Ok(()), stage0_status: Ok(()), stage0next_status: Ok(()) }))
|
| 2456 | 2026-01-14T21:22:49.905Z | INFO | test_vpc_firewall (dropshot): request completed
latency_us = 16732
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:46538
req_id = 57ac1cc2-99ae-43b6-b621-1a42d2a442a8
response_code = 200
uri = /sp/sled/0
|
| 2457 | 2026-01-14T21:22:49.907Z | TRAC | test_vpc_firewall (dropshot): incoming request
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:46538
req_id = 5706b16e-be67-4229-9e35-0154b6f0390f
uri = /sp/sled/0/component/host-boot-flash/active-slot
|
| 2458 | 2026-01-14T21:22:49.907Z | DEBG | test_vpc_firewall (dropshot): determined request API version
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:46538
req_id = 5706b16e-be67-4229-9e35-0154b6f0390f
uri = /sp/sled/0/component/host-boot-flash/active-slot
version = 3.0.0
|
| 2459 | 2026-01-14T21:22:49.907Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 150 }, kind: MgsRequest(ComponentGetActiveSlot(SpComponent { id: "host-boot-flash" })) }
|
| 2460 | 2026-01-14T21:22:49.907Z | DEBG | test_vpc_firewall (SpComponent { id: "host-boot-flash" }): asked for component active slot
slot = gimlet 0
|
| 2461 | 2026-01-14T21:22:49.907Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 150 }
interface = fake-sled0
response = ComponentActiveSlot(0)
|
| 2462 | 2026-01-14T21:22:49.907Z | INFO | test_vpc_firewall (dropshot): request completed
latency_us = 685
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:46538
req_id = 5706b16e-be67-4229-9e35-0154b6f0390f
response_code = 200
uri = /sp/sled/0/component/host-boot-flash/active-slot
|
| 2463 | 2026-01-14T21:22:49.910Z | TRAC | test_vpc_firewall (dropshot): incoming request
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:46538
req_id = 6ef9fc88-25e8-4d7d-bf52-6eea327ef289
uri = /sp/sled/0/component/host-boot-flash/hash/0
|
| 2464 | 2026-01-14T21:22:49.910Z | DEBG | test_vpc_firewall (dropshot): determined request API version
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:46538
req_id = 6ef9fc88-25e8-4d7d-bf52-6eea327ef289
uri = /sp/sled/0/component/host-boot-flash/hash/0
version = 3.0.0
|
| 2465 | 2026-01-14T21:22:49.910Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 151 }, kind: MgsRequest(GetHostFlashHash { slot: 0 }) }
|
| 2466 | 2026-01-14T21:22:49.911Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 151 }
interface = fake-sled0
response = HostFlashHash([53, 107, 239, 110, 220, 143, 200, 15, 34, 112, 182, 59, 102, 171, 195, 123, 41, 60, 85, 66, 172, 201, 244, 15, 90, 150, 217, 20, 162, 63, 97, 19])
|
| 2467 | 2026-01-14T21:22:49.911Z | INFO | test_vpc_firewall (dropshot): request completed
latency_us = 1304
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:46538
req_id = 6ef9fc88-25e8-4d7d-bf52-6eea327ef289
response_code = 200
uri = /sp/sled/0/component/host-boot-flash/hash/0
|
| 2468 | 2026-01-14T21:22:49.913Z | TRAC | test_vpc_firewall (dropshot): incoming request
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:46538
req_id = 66eac08d-0dd2-4523-90e0-01d1d02fca3c
uri = /sp/sled/0/component/host-boot-flash/hash/1
|
| 2469 | 2026-01-14T21:22:49.913Z | DEBG | test_vpc_firewall (dropshot): determined request API version
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:46538
req_id = 66eac08d-0dd2-4523-90e0-01d1d02fca3c
uri = /sp/sled/0/component/host-boot-flash/hash/1
version = 3.0.0
|
| 2470 | 2026-01-14T21:22:49.913Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 152 }, kind: MgsRequest(GetHostFlashHash { slot: 1 }) }
|
| 2471 | 2026-01-14T21:22:49.913Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 152 }
interface = fake-sled0
response = HostFlashHash([11, 47, 169, 143, 81, 51, 178, 136, 162, 190, 126, 80, 46, 170, 224, 134, 194, 112, 189, 43, 164, 70, 214, 26, 90, 235, 161, 253, 140, 26, 154, 197])
|
| 2472 | 2026-01-14T21:22:49.914Z | INFO | test_vpc_firewall (dropshot): request completed
latency_us = 915
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:46538
req_id = 66eac08d-0dd2-4523-90e0-01d1d02fca3c
response_code = 200
uri = /sp/sled/0/component/host-boot-flash/hash/1
|
| 2473 | 2026-01-14T21:22:49.915Z | TRAC | test_vpc_firewall (dropshot): incoming request
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:46538
req_id = 019d5bf3-8c52-436d-bfca-b471db65ead8
uri = /sp/sled/0/component/sp/caboose?firmware_slot=0
|
| 2474 | 2026-01-14T21:22:49.915Z | DEBG | test_vpc_firewall (dropshot): determined request API version
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:46538
req_id = 019d5bf3-8c52-436d-bfca-b471db65ead8
uri = /sp/sled/0/component/sp/caboose?firmware_slot=0
version = 3.0.0
|
| 2475 | 2026-01-14T21:22:49.915Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 153 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "sp" }, slot: 0, key: [71, 73, 84, 67] }) }
|
| 2476 | 2026-01-14T21:22:49.918Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 153 }
interface = fake-sled0
response = CabooseValue
|
| 2477 | 2026-01-14T21:22:49.918Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 154 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "sp" }, slot: 0, key: [66, 79, 82, 68] }) }
|
| 2478 | 2026-01-14T21:22:49.918Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 154 }
interface = fake-sled0
response = CabooseValue
|
| 2479 | 2026-01-14T21:22:49.918Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 155 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "sp" }, slot: 0, key: [78, 65, 77, 69] }) }
|
| 2480 | 2026-01-14T21:22:49.919Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 155 }
interface = fake-sled0
response = CabooseValue
|
| 2481 | 2026-01-14T21:22:49.919Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 156 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "sp" }, slot: 0, key: [86, 69, 82, 83] }) }
|
| 2482 | 2026-01-14T21:22:49.919Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 156 }
interface = fake-sled0
response = CabooseValue
|
| 2483 | 2026-01-14T21:22:49.919Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 157 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "sp" }, slot: 0, key: [83, 73, 71, 78] }) }
|
| 2484 | 2026-01-14T21:22:49.919Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 157 }
interface = fake-sled0
response = Error(NoSuchCabooseKey([83, 73, 71, 78]))
|
| 2485 | 2026-01-14T21:22:49.919Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 158 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "sp" }, slot: 0, key: [69, 80, 79, 67] }) }
|
| 2486 | 2026-01-14T21:22:49.919Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 158 }
interface = fake-sled0
response = Error(NoSuchCabooseKey([69, 80, 79, 67]))
|
| 2487 | 2026-01-14T21:22:49.920Z | INFO | test_vpc_firewall (dropshot): request completed
latency_us = 5009
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:46538
req_id = 019d5bf3-8c52-436d-bfca-b471db65ead8
response_code = 200
uri = /sp/sled/0/component/sp/caboose?firmware_slot=0
|
| 2488 | 2026-01-14T21:22:49.923Z | TRAC | test_vpc_firewall (dropshot): incoming request
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:46538
req_id = 379b5131-c631-4f92-96ff-014a4699a14e
uri = /sp/sled/0/component/sp/caboose?firmware_slot=1
|
| 2489 | 2026-01-14T21:22:49.923Z | DEBG | test_vpc_firewall (dropshot): determined request API version
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:46538
req_id = 379b5131-c631-4f92-96ff-014a4699a14e
uri = /sp/sled/0/component/sp/caboose?firmware_slot=1
version = 3.0.0
|
| 2490 | 2026-01-14T21:22:49.924Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 159 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "sp" }, slot: 1, key: [71, 73, 84, 67] }) }
|
| 2491 | 2026-01-14T21:22:49.924Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 159 }
interface = fake-sled0
response = CabooseValue
|
| 2492 | 2026-01-14T21:22:49.924Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 160 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "sp" }, slot: 1, key: [66, 79, 82, 68] }) }
|
| 2493 | 2026-01-14T21:22:49.924Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 160 }
interface = fake-sled0
response = CabooseValue
|
| 2494 | 2026-01-14T21:22:49.924Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 161 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "sp" }, slot: 1, key: [78, 65, 77, 69] }) }
|
| 2495 | 2026-01-14T21:22:49.925Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 161 }
interface = fake-sled0
response = CabooseValue
|
| 2496 | 2026-01-14T21:22:49.925Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 162 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "sp" }, slot: 1, key: [86, 69, 82, 83] }) }
|
| 2497 | 2026-01-14T21:22:49.925Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 162 }
interface = fake-sled0
response = CabooseValue
|
| 2498 | 2026-01-14T21:22:49.925Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 163 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "sp" }, slot: 1, key: [83, 73, 71, 78] }) }
|
| 2499 | 2026-01-14T21:22:49.925Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 163 }
interface = fake-sled0
response = Error(NoSuchCabooseKey([83, 73, 71, 78]))
|
| 2500 | 2026-01-14T21:22:49.925Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 164 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "sp" }, slot: 1, key: [69, 80, 79, 67] }) }
|
| 2501 | 2026-01-14T21:22:49.925Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 164 }
interface = fake-sled0
response = Error(NoSuchCabooseKey([69, 80, 79, 67]))
|
| 2502 | 2026-01-14T21:22:49.926Z | INFO | test_vpc_firewall (dropshot): request completed
latency_us = 2774
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:46538
req_id = 379b5131-c631-4f92-96ff-014a4699a14e
response_code = 200
uri = /sp/sled/0/component/sp/caboose?firmware_slot=1
|
| 2503 | 2026-01-14T21:22:49.929Z | TRAC | test_vpc_firewall (dropshot): incoming request
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:46538
req_id = 4e855aa9-422e-44fa-b778-fe9025312016
uri = /sp/sled/0/component/rot/caboose?firmware_slot=0
|
| 2504 | 2026-01-14T21:22:49.930Z | DEBG | test_vpc_firewall (dropshot): determined request API version
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:46538
req_id = 4e855aa9-422e-44fa-b778-fe9025312016
uri = /sp/sled/0/component/rot/caboose?firmware_slot=0
version = 3.0.0
|
| 2505 | 2026-01-14T21:22:49.930Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 165 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "rot" }, slot: 0, key: [71, 73, 84, 67] }) }
|
| 2506 | 2026-01-14T21:22:49.931Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 165 }
interface = fake-sled0
response = CabooseValue
|
| 2507 | 2026-01-14T21:22:49.931Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 166 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "rot" }, slot: 0, key: [66, 79, 82, 68] }) }
|
| 2508 | 2026-01-14T21:22:49.931Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 166 }
interface = fake-sled0
response = CabooseValue
|
| 2509 | 2026-01-14T21:22:49.931Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 167 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "rot" }, slot: 0, key: [78, 65, 77, 69] }) }
|
| 2510 | 2026-01-14T21:22:49.931Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 167 }
interface = fake-sled0
response = CabooseValue
|
| 2511 | 2026-01-14T21:22:49.931Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 168 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "rot" }, slot: 0, key: [86, 69, 82, 83] }) }
|
| 2512 | 2026-01-14T21:22:49.932Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 168 }
interface = fake-sled0
response = CabooseValue
|
| 2513 | 2026-01-14T21:22:49.932Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 169 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "rot" }, slot: 0, key: [83, 73, 71, 78] }) }
|
| 2514 | 2026-01-14T21:22:49.932Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 169 }
interface = fake-sled0
response = CabooseValue
|
| 2515 | 2026-01-14T21:22:49.932Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 170 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "rot" }, slot: 0, key: [69, 80, 79, 67] }) }
|
| 2516 | 2026-01-14T21:22:49.933Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 170 }
interface = fake-sled0
response = Error(NoSuchCabooseKey([69, 80, 79, 67]))
|
| 2517 | 2026-01-14T21:22:49.933Z | INFO | test_vpc_firewall (dropshot): request completed
latency_us = 3234
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:46538
req_id = 4e855aa9-422e-44fa-b778-fe9025312016
response_code = 200
uri = /sp/sled/0/component/rot/caboose?firmware_slot=0
|
| 2518 | 2026-01-14T21:22:49.934Z | TRAC | test_vpc_firewall (dropshot): incoming request
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:46538
req_id = ec17032e-b02b-429a-a23e-e464bcdf3b1d
uri = /sp/sled/0/component/rot/caboose?firmware_slot=1
|
| 2519 | 2026-01-14T21:22:49.934Z | DEBG | test_vpc_firewall (dropshot): determined request API version
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:46538
req_id = ec17032e-b02b-429a-a23e-e464bcdf3b1d
uri = /sp/sled/0/component/rot/caboose?firmware_slot=1
version = 3.0.0
|
| 2520 | 2026-01-14T21:22:49.934Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 171 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "rot" }, slot: 1, key: [71, 73, 84, 67] }) }
|
| 2521 | 2026-01-14T21:22:49.936Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 171 }
interface = fake-sled0
response = CabooseValue
|
| 2522 | 2026-01-14T21:22:49.937Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 172 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "rot" }, slot: 1, key: [66, 79, 82, 68] }) }
|
| 2523 | 2026-01-14T21:22:49.937Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 172 }
interface = fake-sled0
response = CabooseValue
|
| 2524 | 2026-01-14T21:22:49.937Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 173 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "rot" }, slot: 1, key: [78, 65, 77, 69] }) }
|
| 2525 | 2026-01-14T21:22:49.937Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 173 }
interface = fake-sled0
response = CabooseValue
|
| 2526 | 2026-01-14T21:22:49.938Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 174 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "rot" }, slot: 1, key: [86, 69, 82, 83] }) }
|
| 2527 | 2026-01-14T21:22:49.938Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 174 }
interface = fake-sled0
response = CabooseValue
|
| 2528 | 2026-01-14T21:22:49.938Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 175 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "rot" }, slot: 1, key: [83, 73, 71, 78] }) }
|
| 2529 | 2026-01-14T21:22:49.938Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 175 }
interface = fake-sled0
response = CabooseValue
|
| 2530 | 2026-01-14T21:22:49.938Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 176 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "rot" }, slot: 1, key: [69, 80, 79, 67] }) }
|
| 2531 | 2026-01-14T21:22:49.938Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 176 }
interface = fake-sled0
response = Error(NoSuchCabooseKey([69, 80, 79, 67]))
|
| 2532 | 2026-01-14T21:22:49.938Z | INFO | test_vpc_firewall (dropshot): request completed
latency_us = 4416
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:46538
req_id = ec17032e-b02b-429a-a23e-e464bcdf3b1d
response_code = 200
uri = /sp/sled/0/component/rot/caboose?firmware_slot=1
|
| 2533 | 2026-01-14T21:22:49.941Z | TRAC | test_vpc_firewall (dropshot): incoming request
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:46538
req_id = e7a0daa7-2172-465f-ade0-ada92894efc2
uri = /sp/sled/0/component/stage0/caboose?firmware_slot=0
|
| 2534 | 2026-01-14T21:22:49.941Z | DEBG | test_vpc_firewall (dropshot): determined request API version
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:46538
req_id = e7a0daa7-2172-465f-ade0-ada92894efc2
uri = /sp/sled/0/component/stage0/caboose?firmware_slot=0
version = 3.0.0
|
| 2535 | 2026-01-14T21:22:49.941Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 177 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "stage0" }, slot: 0, key: [71, 73, 84, 67] }) }
|
| 2536 | 2026-01-14T21:22:49.942Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 177 }
interface = fake-sled0
response = CabooseValue
|
| 2537 | 2026-01-14T21:22:49.942Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 178 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "stage0" }, slot: 0, key: [66, 79, 82, 68] }) }
|
| 2538 | 2026-01-14T21:22:49.942Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 178 }
interface = fake-sled0
response = CabooseValue
|
| 2539 | 2026-01-14T21:22:49.942Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 179 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "stage0" }, slot: 0, key: [78, 65, 77, 69] }) }
|
| 2540 | 2026-01-14T21:22:49.942Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 179 }
interface = fake-sled0
response = CabooseValue
|
| 2541 | 2026-01-14T21:22:49.942Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 180 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "stage0" }, slot: 0, key: [86, 69, 82, 83] }) }
|
| 2542 | 2026-01-14T21:22:49.942Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 180 }
interface = fake-sled0
response = CabooseValue
|
| 2543 | 2026-01-14T21:22:49.942Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 181 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "stage0" }, slot: 0, key: [83, 73, 71, 78] }) }
|
| 2544 | 2026-01-14T21:22:49.942Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 181 }
interface = fake-sled0
response = CabooseValue
|
| 2545 | 2026-01-14T21:22:49.943Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 182 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "stage0" }, slot: 0, key: [69, 80, 79, 67] }) }
|
| 2546 | 2026-01-14T21:22:49.943Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 182 }
interface = fake-sled0
response = Error(NoSuchCabooseKey([69, 80, 79, 67]))
|
| 2547 | 2026-01-14T21:22:49.943Z | INFO | test_vpc_firewall (dropshot): request completed
latency_us = 2245
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:46538
req_id = e7a0daa7-2172-465f-ade0-ada92894efc2
response_code = 200
uri = /sp/sled/0/component/stage0/caboose?firmware_slot=0
|
| 2548 | 2026-01-14T21:22:49.944Z | TRAC | test_vpc_firewall (dropshot): incoming request
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:46538
req_id = ec0d1d59-6d8a-468d-b0ba-f49d6a8c2318
uri = /sp/sled/0/component/stage0/caboose?firmware_slot=1
|
| 2549 | 2026-01-14T21:22:49.944Z | DEBG | test_vpc_firewall (dropshot): determined request API version
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:46538
req_id = ec0d1d59-6d8a-468d-b0ba-f49d6a8c2318
uri = /sp/sled/0/component/stage0/caboose?firmware_slot=1
version = 3.0.0
|
| 2550 | 2026-01-14T21:22:49.944Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 183 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "stage0" }, slot: 1, key: [71, 73, 84, 67] }) }
|
| 2551 | 2026-01-14T21:22:49.958Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 183 }
interface = fake-sled0
response = CabooseValue
|
| 2552 | 2026-01-14T21:22:49.958Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 184 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "stage0" }, slot: 1, key: [66, 79, 82, 68] }) }
|
| 2553 | 2026-01-14T21:22:49.959Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 184 }
interface = fake-sled0
response = CabooseValue
|
| 2554 | 2026-01-14T21:22:49.959Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 185 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "stage0" }, slot: 1, key: [78, 65, 77, 69] }) }
|
| 2555 | 2026-01-14T21:22:49.959Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 185 }
interface = fake-sled0
response = CabooseValue
|
| 2556 | 2026-01-14T21:22:49.959Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 186 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "stage0" }, slot: 1, key: [86, 69, 82, 83] }) }
|
| 2557 | 2026-01-14T21:22:49.959Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 186 }
interface = fake-sled0
response = CabooseValue
|
| 2558 | 2026-01-14T21:22:49.959Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 187 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "stage0" }, slot: 1, key: [83, 73, 71, 78] }) }
|
| 2559 | 2026-01-14T21:22:49.960Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 187 }
interface = fake-sled0
response = CabooseValue
|
| 2560 | 2026-01-14T21:22:49.960Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 188 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "stage0" }, slot: 1, key: [69, 80, 79, 67] }) }
|
| 2561 | 2026-01-14T21:22:49.960Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 188 }
interface = fake-sled0
response = Error(NoSuchCabooseKey([69, 80, 79, 67]))
|
| 2562 | 2026-01-14T21:22:49.961Z | INFO | test_vpc_firewall (dropshot): request completed
latency_us = 16492
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:46538
req_id = ec0d1d59-6d8a-468d-b0ba-f49d6a8c2318
response_code = 200
uri = /sp/sled/0/component/stage0/caboose?firmware_slot=1
|
| 2563 | 2026-01-14T21:22:49.965Z | TRAC | test_vpc_firewall (dropshot): incoming request
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:46538
req_id = 8394d20a-5eb0-4baf-a691-6af97be1ab7a
uri = /sp/sled/0/component/rot/cmpa
|
| 2564 | 2026-01-14T21:22:49.965Z | DEBG | test_vpc_firewall (dropshot): determined request API version
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:46538
req_id = 8394d20a-5eb0-4baf-a691-6af97be1ab7a
uri = /sp/sled/0/component/rot/cmpa
version = 3.0.0
|
| 2565 | 2026-01-14T21:22:49.966Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 189 }, kind: MgsRequest(ReadRot(ReadCmpa)) }
|
| 2566 | 2026-01-14T21:22:49.967Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 189 }
interface = fake-sled0
response = ReadRot(Ok)
|
| 2567 | 2026-01-14T21:22:49.967Z | INFO | test_vpc_firewall (dropshot): request completed
latency_us = 2478
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:46538
req_id = 8394d20a-5eb0-4baf-a691-6af97be1ab7a
response_code = 200
uri = /sp/sled/0/component/rot/cmpa
|
| 2568 | 2026-01-14T21:22:49.968Z | TRAC | test_vpc_firewall (dropshot): incoming request
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:46538
req_id = a90ba466-4577-4c78-a438-f892ac0fe8e2
uri = /sp/sled/0/component/rot/cfpa
|
| 2569 | 2026-01-14T21:22:49.969Z | DEBG | test_vpc_firewall (dropshot): determined request API version
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:46538
req_id = a90ba466-4577-4c78-a438-f892ac0fe8e2
uri = /sp/sled/0/component/rot/cfpa
version = 3.0.0
|
| 2570 | 2026-01-14T21:22:49.969Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 190 }, kind: MgsRequest(ReadRot(ReadCfpa(Active))) }
|
| 2571 | 2026-01-14T21:22:49.970Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 190 }
interface = fake-sled0
response = ReadRot(Ok)
|
| 2572 | 2026-01-14T21:22:49.970Z | INFO | test_vpc_firewall (dropshot): request completed
latency_us = 1313
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:46538
req_id = a90ba466-4577-4c78-a438-f892ac0fe8e2
response_code = 200
uri = /sp/sled/0/component/rot/cfpa
|
| 2573 | 2026-01-14T21:22:49.972Z | TRAC | test_vpc_firewall (dropshot): incoming request
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:46538
req_id = 19bdde2b-1cd6-4dd3-920a-c385751607de
uri = /sp/sled/0/component/rot/cfpa
|
| 2574 | 2026-01-14T21:22:49.973Z | DEBG | test_vpc_firewall (dropshot): determined request API version
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:46538
req_id = 19bdde2b-1cd6-4dd3-920a-c385751607de
uri = /sp/sled/0/component/rot/cfpa
version = 3.0.0
|
| 2575 | 2026-01-14T21:22:49.973Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 191 }, kind: MgsRequest(ReadRot(ReadCfpa(Inactive))) }
|
| 2576 | 2026-01-14T21:22:49.974Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 191 }
interface = fake-sled0
response = ReadRot(Ok)
|
| 2577 | 2026-01-14T21:22:49.975Z | INFO | test_vpc_firewall (dropshot): request completed
latency_us = 2242
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:46538
req_id = 19bdde2b-1cd6-4dd3-920a-c385751607de
response_code = 200
uri = /sp/sled/0/component/rot/cfpa
|
| 2578 | 2026-01-14T21:22:49.976Z | TRAC | test_vpc_firewall (dropshot): incoming request
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:46538
req_id = 6bab6044-3253-46e4-95a1-fbc5d243af36
uri = /sp/sled/0/component/rot/cfpa
|
| 2579 | 2026-01-14T21:22:49.976Z | DEBG | test_vpc_firewall (dropshot): determined request API version
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:46538
req_id = 6bab6044-3253-46e4-95a1-fbc5d243af36
uri = /sp/sled/0/component/rot/cfpa
version = 3.0.0
|
| 2580 | 2026-01-14T21:22:49.977Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 192 }, kind: MgsRequest(ReadRot(ReadCfpa(Scratch))) }
|
| 2581 | 2026-01-14T21:22:49.977Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 192 }
interface = fake-sled0
response = ReadRot(Ok)
|
| 2582 | 2026-01-14T21:22:49.979Z | INFO | test_vpc_firewall (dropshot): request completed
latency_us = 2526
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:46538
req_id = 6bab6044-3253-46e4-95a1-fbc5d243af36
response_code = 200
uri = /sp/sled/0/component/rot/cfpa
|
| 2583 | 2026-01-14T21:22:49.984Z | TRAC | test_vpc_firewall (dropshot): incoming request
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:46538
req_id = dc651d02-fc9d-493b-b70c-0e405d56a379
uri = /sp/sled/1
|
| 2584 | 2026-01-14T21:22:49.984Z | DEBG | test_vpc_firewall (dropshot): determined request API version
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:46538
req_id = dc651d02-fc9d-493b-b70c-0e405d56a379
uri = /sp/sled/1
version = 3.0.0
|
| 2585 | 2026-01-14T21:22:49.984Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 148 }, kind: MgsRequest(SpState) }
|
| 2586 | 2026-01-14T21:22:49.985Z | DEBG | test_vpc_firewall: received state request
reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) }
slot = gimlet 1
|
| 2587 | 2026-01-14T21:22:49.985Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 148 }
interface = fake-sled1
response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
|
| 2588 | 2026-01-14T21:22:49.986Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 149 }, kind: MgsRequest(VersionedRotBootInfo { version: 3 }) }
|
| 2589 | 2026-01-14T21:22:49.986Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 149 }
interface = fake-sled1
response = RotBootInfo(V3(RotStateV3 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_fwid: Sha3_256([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_fwid: Sha3_256([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]), stage0_fwid: Sha3_256([204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204]), stage0next_fwid: Sha3_256([221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221]), slot_a_status: Ok(()), slot_b_status: Ok(()), stage0_status: Ok(()), stage0next_status: Ok(()) }))
|
| 2590 | 2026-01-14T21:22:49.986Z | INFO | test_vpc_firewall (dropshot): request completed
latency_us = 2957
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:46538
req_id = dc651d02-fc9d-493b-b70c-0e405d56a379
response_code = 200
uri = /sp/sled/1
|
| 2591 | 2026-01-14T21:22:49.988Z | TRAC | test_vpc_firewall (dropshot): incoming request
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:46538
req_id = 9d5220fa-6cda-402a-9f48-2715dce56f28
uri = /sp/sled/1/component/host-boot-flash/active-slot
|
| 2592 | 2026-01-14T21:22:49.988Z | DEBG | test_vpc_firewall (dropshot): determined request API version
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:46538
req_id = 9d5220fa-6cda-402a-9f48-2715dce56f28
uri = /sp/sled/1/component/host-boot-flash/active-slot
version = 3.0.0
|
| 2593 | 2026-01-14T21:22:49.988Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 150 }, kind: MgsRequest(ComponentGetActiveSlot(SpComponent { id: "host-boot-flash" })) }
|
| 2594 | 2026-01-14T21:22:49.988Z | DEBG | test_vpc_firewall (SpComponent { id: "host-boot-flash" }): asked for component active slot
slot = gimlet 1
|
| 2595 | 2026-01-14T21:22:49.988Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 150 }
interface = fake-sled1
response = ComponentActiveSlot(0)
|
| 2596 | 2026-01-14T21:22:49.988Z | INFO | test_vpc_firewall (dropshot): request completed
latency_us = 553
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:46538
req_id = 9d5220fa-6cda-402a-9f48-2715dce56f28
response_code = 200
uri = /sp/sled/1/component/host-boot-flash/active-slot
|
| 2597 | 2026-01-14T21:22:49.993Z | TRAC | test_vpc_firewall (dropshot): incoming request
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:46538
req_id = a87f6547-92c6-459e-ad14-68808f7d72ee
uri = /sp/sled/1/component/host-boot-flash/hash/0
|
| 2598 | 2026-01-14T21:22:49.993Z | DEBG | test_vpc_firewall (dropshot): determined request API version
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:46538
req_id = a87f6547-92c6-459e-ad14-68808f7d72ee
uri = /sp/sled/1/component/host-boot-flash/hash/0
version = 3.0.0
|
| 2599 | 2026-01-14T21:22:49.994Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 151 }, kind: MgsRequest(GetHostFlashHash { slot: 0 }) }
|
| 2600 | 2026-01-14T21:22:49.995Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 151 }
interface = fake-sled1
response = HostFlashHash([53, 107, 239, 110, 220, 143, 200, 15, 34, 112, 182, 59, 102, 171, 195, 123, 41, 60, 85, 66, 172, 201, 244, 15, 90, 150, 217, 20, 162, 63, 97, 19])
|
| 2601 | 2026-01-14T21:22:49.995Z | INFO | test_vpc_firewall (dropshot): request completed
latency_us = 1765
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:46538
req_id = a87f6547-92c6-459e-ad14-68808f7d72ee
response_code = 200
uri = /sp/sled/1/component/host-boot-flash/hash/0
|
| 2602 | 2026-01-14T21:22:49.998Z | TRAC | test_vpc_firewall (dropshot): incoming request
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:46538
req_id = 0354c0c0-c49b-4073-a6f0-b654e693ebea
uri = /sp/sled/1/component/host-boot-flash/hash/1
|
| 2603 | 2026-01-14T21:22:49.998Z | DEBG | test_vpc_firewall (dropshot): determined request API version
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:46538
req_id = 0354c0c0-c49b-4073-a6f0-b654e693ebea
uri = /sp/sled/1/component/host-boot-flash/hash/1
version = 3.0.0
|
| 2604 | 2026-01-14T21:22:49.999Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 152 }, kind: MgsRequest(GetHostFlashHash { slot: 1 }) }
|
| 2605 | 2026-01-14T21:22:50.003Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 152 }
interface = fake-sled1
response = HostFlashHash([11, 47, 169, 143, 81, 51, 178, 136, 162, 190, 126, 80, 46, 170, 224, 134, 194, 112, 189, 43, 164, 70, 214, 26, 90, 235, 161, 253, 140, 26, 154, 197])
|
| 2606 | 2026-01-14T21:22:50.003Z | INFO | test_vpc_firewall (dropshot): request completed
latency_us = 4569
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:46538
req_id = 0354c0c0-c49b-4073-a6f0-b654e693ebea
response_code = 200
uri = /sp/sled/1/component/host-boot-flash/hash/1
|
| 2607 | 2026-01-14T21:22:50.006Z | TRAC | test_vpc_firewall (dropshot): incoming request
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:46538
req_id = 5a5a8e26-c3a5-42e7-95f3-5f2349bcbd65
uri = /sp/sled/1/component/sp/caboose?firmware_slot=0
|
| 2608 | 2026-01-14T21:22:50.006Z | DEBG | test_vpc_firewall (dropshot): determined request API version
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:46538
req_id = 5a5a8e26-c3a5-42e7-95f3-5f2349bcbd65
uri = /sp/sled/1/component/sp/caboose?firmware_slot=0
version = 3.0.0
|
| 2609 | 2026-01-14T21:22:50.007Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 153 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "sp" }, slot: 0, key: [71, 73, 84, 67] }) }
|
| 2610 | 2026-01-14T21:22:50.008Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 153 }
interface = fake-sled1
response = CabooseValue
|
| 2611 | 2026-01-14T21:22:50.008Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 154 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "sp" }, slot: 0, key: [66, 79, 82, 68] }) }
|
| 2612 | 2026-01-14T21:22:50.008Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 154 }
interface = fake-sled1
response = CabooseValue
|
| 2613 | 2026-01-14T21:22:50.008Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 155 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "sp" }, slot: 0, key: [78, 65, 77, 69] }) }
|
| 2614 | 2026-01-14T21:22:50.008Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 155 }
interface = fake-sled1
response = CabooseValue
|
| 2615 | 2026-01-14T21:22:50.008Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 156 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "sp" }, slot: 0, key: [86, 69, 82, 83] }) }
|
| 2616 | 2026-01-14T21:22:50.011Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 156 }
interface = fake-sled1
response = CabooseValue
|
| 2617 | 2026-01-14T21:22:50.012Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 157 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "sp" }, slot: 0, key: [83, 73, 71, 78] }) }
|
| 2618 | 2026-01-14T21:22:50.012Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 157 }
interface = fake-sled1
response = Error(NoSuchCabooseKey([83, 73, 71, 78]))
|
| 2619 | 2026-01-14T21:22:50.012Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 158 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "sp" }, slot: 0, key: [69, 80, 79, 67] }) }
|
| 2620 | 2026-01-14T21:22:50.012Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 158 }
interface = fake-sled1
response = Error(NoSuchCabooseKey([69, 80, 79, 67]))
|
| 2621 | 2026-01-14T21:22:50.012Z | INFO | test_vpc_firewall (dropshot): request completed
latency_us = 5694
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:46538
req_id = 5a5a8e26-c3a5-42e7-95f3-5f2349bcbd65
response_code = 200
uri = /sp/sled/1/component/sp/caboose?firmware_slot=0
|
| 2622 | 2026-01-14T21:22:50.016Z | TRAC | test_vpc_firewall (dropshot): incoming request
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:46538
req_id = c3147186-8a09-4a79-bda1-f191e07ecd84
uri = /sp/sled/1/component/sp/caboose?firmware_slot=1
|
| 2623 | 2026-01-14T21:22:50.017Z | DEBG | test_vpc_firewall (dropshot): determined request API version
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:46538
req_id = c3147186-8a09-4a79-bda1-f191e07ecd84
uri = /sp/sled/1/component/sp/caboose?firmware_slot=1
version = 3.0.0
|
| 2624 | 2026-01-14T21:22:50.017Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 159 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "sp" }, slot: 1, key: [71, 73, 84, 67] }) }
|
| 2625 | 2026-01-14T21:22:50.017Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 159 }
interface = fake-sled1
response = CabooseValue
|
| 2626 | 2026-01-14T21:22:50.017Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 160 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "sp" }, slot: 1, key: [66, 79, 82, 68] }) }
|
| 2627 | 2026-01-14T21:22:50.017Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 160 }
interface = fake-sled1
response = CabooseValue
|
| 2628 | 2026-01-14T21:22:50.017Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 161 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "sp" }, slot: 1, key: [78, 65, 77, 69] }) }
|
| 2629 | 2026-01-14T21:22:50.035Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 161 }
interface = fake-sled1
response = CabooseValue
|
| 2630 | 2026-01-14T21:22:50.036Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 162 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "sp" }, slot: 1, key: [86, 69, 82, 83] }) }
|
| 2631 | 2026-01-14T21:22:50.036Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 162 }
interface = fake-sled1
response = CabooseValue
|
| 2632 | 2026-01-14T21:22:50.037Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 163 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "sp" }, slot: 1, key: [83, 73, 71, 78] }) }
|
| 2633 | 2026-01-14T21:22:50.038Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 163 }
interface = fake-sled1
response = Error(NoSuchCabooseKey([83, 73, 71, 78]))
|
| 2634 | 2026-01-14T21:22:50.038Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 164 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "sp" }, slot: 1, key: [69, 80, 79, 67] }) }
|
| 2635 | 2026-01-14T21:22:50.038Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 164 }
interface = fake-sled1
response = Error(NoSuchCabooseKey([69, 80, 79, 67]))
|
| 2636 | 2026-01-14T21:22:50.039Z | INFO | test_vpc_firewall (dropshot): request completed
latency_us = 22285
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:46538
req_id = c3147186-8a09-4a79-bda1-f191e07ecd84
response_code = 200
uri = /sp/sled/1/component/sp/caboose?firmware_slot=1
|
| 2637 | 2026-01-14T21:22:50.042Z | TRAC | test_vpc_firewall (dropshot): incoming request
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:46538
req_id = 2bbe282b-28d5-4e65-adb2-e508b9e77407
uri = /sp/sled/1/component/rot/caboose?firmware_slot=0
|
| 2638 | 2026-01-14T21:22:50.042Z | DEBG | test_vpc_firewall (dropshot): determined request API version
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:46538
req_id = 2bbe282b-28d5-4e65-adb2-e508b9e77407
uri = /sp/sled/1/component/rot/caboose?firmware_slot=0
version = 3.0.0
|
| 2639 | 2026-01-14T21:22:50.043Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 165 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "rot" }, slot: 0, key: [71, 73, 84, 67] }) }
|
| 2640 | 2026-01-14T21:22:50.043Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 165 }
interface = fake-sled1
response = CabooseValue
|
| 2641 | 2026-01-14T21:22:50.043Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 166 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "rot" }, slot: 0, key: [66, 79, 82, 68] }) }
|
| 2642 | 2026-01-14T21:22:50.048Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 166 }
interface = fake-sled1
response = CabooseValue
|
| 2643 | 2026-01-14T21:22:50.048Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 167 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "rot" }, slot: 0, key: [78, 65, 77, 69] }) }
|
| 2644 | 2026-01-14T21:22:50.048Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 167 }
interface = fake-sled1
response = CabooseValue
|
| 2645 | 2026-01-14T21:22:50.048Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 168 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "rot" }, slot: 0, key: [86, 69, 82, 83] }) }
|
| 2646 | 2026-01-14T21:22:50.048Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 168 }
interface = fake-sled1
response = CabooseValue
|
| 2647 | 2026-01-14T21:22:50.048Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 169 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "rot" }, slot: 0, key: [83, 73, 71, 78] }) }
|
| 2648 | 2026-01-14T21:22:50.048Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 169 }
interface = fake-sled1
response = CabooseValue
|
| 2649 | 2026-01-14T21:22:50.048Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 170 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "rot" }, slot: 0, key: [69, 80, 79, 67] }) }
|
| 2650 | 2026-01-14T21:22:50.048Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 170 }
interface = fake-sled1
response = Error(NoSuchCabooseKey([69, 80, 79, 67]))
|
| 2651 | 2026-01-14T21:22:50.048Z | INFO | test_vpc_firewall (dropshot): request completed
latency_us = 3396
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:46538
req_id = 2bbe282b-28d5-4e65-adb2-e508b9e77407
response_code = 200
uri = /sp/sled/1/component/rot/caboose?firmware_slot=0
|
| 2652 | 2026-01-14T21:22:50.049Z | TRAC | test_vpc_firewall (dropshot): incoming request
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:46538
req_id = e9fd38c3-f2c2-4139-84af-0e5b2fe54237
uri = /sp/sled/1/component/rot/caboose?firmware_slot=1
|
| 2653 | 2026-01-14T21:22:50.049Z | DEBG | test_vpc_firewall (dropshot): determined request API version
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:46538
req_id = e9fd38c3-f2c2-4139-84af-0e5b2fe54237
uri = /sp/sled/1/component/rot/caboose?firmware_slot=1
version = 3.0.0
|
| 2654 | 2026-01-14T21:22:50.049Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 171 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "rot" }, slot: 1, key: [71, 73, 84, 67] }) }
|
| 2655 | 2026-01-14T21:22:50.049Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 171 }
interface = fake-sled1
response = CabooseValue
|
| 2656 | 2026-01-14T21:22:50.049Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 172 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "rot" }, slot: 1, key: [66, 79, 82, 68] }) }
|
| 2657 | 2026-01-14T21:22:50.050Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 172 }
interface = fake-sled1
response = CabooseValue
|
| 2658 | 2026-01-14T21:22:50.051Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 173 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "rot" }, slot: 1, key: [78, 65, 77, 69] }) }
|
| 2659 | 2026-01-14T21:22:50.051Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 173 }
interface = fake-sled1
response = CabooseValue
|
| 2660 | 2026-01-14T21:22:50.051Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 174 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "rot" }, slot: 1, key: [86, 69, 82, 83] }) }
|
| 2661 | 2026-01-14T21:22:50.051Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 174 }
interface = fake-sled1
response = CabooseValue
|
| 2662 | 2026-01-14T21:22:50.051Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 175 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "rot" }, slot: 1, key: [83, 73, 71, 78] }) }
|
| 2663 | 2026-01-14T21:22:50.051Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 175 }
interface = fake-sled1
response = CabooseValue
|
| 2664 | 2026-01-14T21:22:50.051Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 176 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "rot" }, slot: 1, key: [69, 80, 79, 67] }) }
|
| 2665 | 2026-01-14T21:22:50.051Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 176 }
interface = fake-sled1
response = Error(NoSuchCabooseKey([69, 80, 79, 67]))
|
| 2666 | 2026-01-14T21:22:50.051Z | INFO | test_vpc_firewall (dropshot): request completed
latency_us = 2728
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:46538
req_id = e9fd38c3-f2c2-4139-84af-0e5b2fe54237
response_code = 200
uri = /sp/sled/1/component/rot/caboose?firmware_slot=1
|
| 2667 | 2026-01-14T21:22:50.052Z | TRAC | test_vpc_firewall (dropshot): incoming request
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:46538
req_id = df1dc756-053d-41d4-9abb-89441c4479d0
uri = /sp/sled/1/component/stage0/caboose?firmware_slot=0
|
| 2668 | 2026-01-14T21:22:50.052Z | DEBG | test_vpc_firewall (dropshot): determined request API version
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:46538
req_id = df1dc756-053d-41d4-9abb-89441c4479d0
uri = /sp/sled/1/component/stage0/caboose?firmware_slot=0
version = 3.0.0
|
| 2669 | 2026-01-14T21:22:50.052Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 177 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "stage0" }, slot: 0, key: [71, 73, 84, 67] }) }
|
| 2670 | 2026-01-14T21:22:50.053Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 177 }
interface = fake-sled1
response = CabooseValue
|
| 2671 | 2026-01-14T21:22:50.053Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 178 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "stage0" }, slot: 0, key: [66, 79, 82, 68] }) }
|
| 2672 | 2026-01-14T21:22:50.075Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 178 }
interface = fake-sled1
response = CabooseValue
|
| 2673 | 2026-01-14T21:22:50.075Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 179 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "stage0" }, slot: 0, key: [78, 65, 77, 69] }) }
|
| 2674 | 2026-01-14T21:22:50.076Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 179 }
interface = fake-sled1
response = CabooseValue
|
| 2675 | 2026-01-14T21:22:50.076Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 180 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "stage0" }, slot: 0, key: [86, 69, 82, 83] }) }
|
| 2676 | 2026-01-14T21:22:50.077Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 180 }
interface = fake-sled1
response = CabooseValue
|
| 2677 | 2026-01-14T21:22:50.077Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 181 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "stage0" }, slot: 0, key: [83, 73, 71, 78] }) }
|
| 2678 | 2026-01-14T21:22:50.077Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 181 }
interface = fake-sled1
response = CabooseValue
|
| 2679 | 2026-01-14T21:22:50.077Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 182 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "stage0" }, slot: 0, key: [69, 80, 79, 67] }) }
|
| 2680 | 2026-01-14T21:22:50.077Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 182 }
interface = fake-sled1
response = Error(NoSuchCabooseKey([69, 80, 79, 67]))
|
| 2681 | 2026-01-14T21:22:50.077Z | INFO | test_vpc_firewall (dropshot): request completed
latency_us = 25291
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:46538
req_id = df1dc756-053d-41d4-9abb-89441c4479d0
response_code = 200
uri = /sp/sled/1/component/stage0/caboose?firmware_slot=0
|
| 2682 | 2026-01-14T21:22:50.079Z | TRAC | test_vpc_firewall (dropshot): incoming request
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:46538
req_id = 05cecb9b-2c39-4977-b980-da5d9484eaf6
uri = /sp/sled/1/component/stage0/caboose?firmware_slot=1
|
| 2683 | 2026-01-14T21:22:50.079Z | DEBG | test_vpc_firewall (dropshot): determined request API version
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:46538
req_id = 05cecb9b-2c39-4977-b980-da5d9484eaf6
uri = /sp/sled/1/component/stage0/caboose?firmware_slot=1
version = 3.0.0
|
| 2684 | 2026-01-14T21:22:50.080Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 183 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "stage0" }, slot: 1, key: [71, 73, 84, 67] }) }
|
| 2685 | 2026-01-14T21:22:50.083Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 183 }
interface = fake-sled1
response = CabooseValue
|
| 2686 | 2026-01-14T21:22:50.083Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 184 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "stage0" }, slot: 1, key: [66, 79, 82, 68] }) }
|
| 2687 | 2026-01-14T21:22:50.083Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 184 }
interface = fake-sled1
response = CabooseValue
|
| 2688 | 2026-01-14T21:22:50.083Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 185 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "stage0" }, slot: 1, key: [78, 65, 77, 69] }) }
|
| 2689 | 2026-01-14T21:22:50.084Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 185 }
interface = fake-sled1
response = CabooseValue
|
| 2690 | 2026-01-14T21:22:50.084Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 186 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "stage0" }, slot: 1, key: [86, 69, 82, 83] }) }
|
| 2691 | 2026-01-14T21:22:50.084Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 186 }
interface = fake-sled1
response = CabooseValue
|
| 2692 | 2026-01-14T21:22:50.084Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 187 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "stage0" }, slot: 1, key: [83, 73, 71, 78] }) }
|
| 2693 | 2026-01-14T21:22:50.084Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 187 }
interface = fake-sled1
response = CabooseValue
|
| 2694 | 2026-01-14T21:22:50.085Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 188 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "stage0" }, slot: 1, key: [69, 80, 79, 67] }) }
|
| 2695 | 2026-01-14T21:22:50.085Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 188 }
interface = fake-sled1
response = Error(NoSuchCabooseKey([69, 80, 79, 67]))
|
| 2696 | 2026-01-14T21:22:50.085Z | INFO | test_vpc_firewall (dropshot): request completed
latency_us = 6042
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:46538
req_id = 05cecb9b-2c39-4977-b980-da5d9484eaf6
response_code = 200
uri = /sp/sled/1/component/stage0/caboose?firmware_slot=1
|
| 2697 | 2026-01-14T21:22:50.090Z | TRAC | test_vpc_firewall (dropshot): incoming request
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:46538
req_id = 49e39649-0d0f-46ef-b88e-52b4efa9a3e1
uri = /sp/sled/1/component/rot/cmpa
|
| 2698 | 2026-01-14T21:22:50.090Z | DEBG | test_vpc_firewall (dropshot): determined request API version
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:46538
req_id = 49e39649-0d0f-46ef-b88e-52b4efa9a3e1
uri = /sp/sled/1/component/rot/cmpa
version = 3.0.0
|
| 2699 | 2026-01-14T21:22:50.091Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 189 }, kind: MgsRequest(ReadRot(ReadCmpa)) }
|
| 2700 | 2026-01-14T21:22:50.091Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 189 }
interface = fake-sled1
response = ReadRot(Ok)
|
| 2701 | 2026-01-14T21:22:50.092Z | INFO | test_vpc_firewall (dropshot): request completed
latency_us = 1802
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:46538
req_id = 49e39649-0d0f-46ef-b88e-52b4efa9a3e1
response_code = 200
uri = /sp/sled/1/component/rot/cmpa
|
| 2702 | 2026-01-14T21:22:50.094Z | TRAC | test_vpc_firewall (dropshot): incoming request
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:46538
req_id = 8c3605ef-589e-430a-be7a-068f09d31955
uri = /sp/sled/1/component/rot/cfpa
|
| 2703 | 2026-01-14T21:22:50.094Z | DEBG | test_vpc_firewall (dropshot): determined request API version
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:46538
req_id = 8c3605ef-589e-430a-be7a-068f09d31955
uri = /sp/sled/1/component/rot/cfpa
version = 3.0.0
|
| 2704 | 2026-01-14T21:22:50.094Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 190 }, kind: MgsRequest(ReadRot(ReadCfpa(Active))) }
|
| 2705 | 2026-01-14T21:22:50.094Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 190 }
interface = fake-sled1
response = ReadRot(Ok)
|
| 2706 | 2026-01-14T21:22:50.094Z | INFO | test_vpc_firewall (dropshot): request completed
latency_us = 1005
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:46538
req_id = 8c3605ef-589e-430a-be7a-068f09d31955
response_code = 200
uri = /sp/sled/1/component/rot/cfpa
|
| 2707 | 2026-01-14T21:22:50.098Z | TRAC | test_vpc_firewall (dropshot): incoming request
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:46538
req_id = 8485085a-23be-4e95-8e05-1f5f740796ae
uri = /sp/sled/1/component/rot/cfpa
|
| 2708 | 2026-01-14T21:22:50.099Z | DEBG | test_vpc_firewall (dropshot): determined request API version
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:46538
req_id = 8485085a-23be-4e95-8e05-1f5f740796ae
uri = /sp/sled/1/component/rot/cfpa
version = 3.0.0
|
| 2709 | 2026-01-14T21:22:50.099Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 191 }, kind: MgsRequest(ReadRot(ReadCfpa(Inactive))) }
|
| 2710 | 2026-01-14T21:22:50.100Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 191 }
interface = fake-sled1
response = ReadRot(Ok)
|
| 2711 | 2026-01-14T21:22:50.100Z | INFO | test_vpc_firewall (dropshot): request completed
latency_us = 2161
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:46538
req_id = 8485085a-23be-4e95-8e05-1f5f740796ae
response_code = 200
uri = /sp/sled/1/component/rot/cfpa
|
| 2712 | 2026-01-14T21:22:50.102Z | TRAC | test_vpc_firewall (dropshot): incoming request
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:46538
req_id = 2500cc9d-bb68-4526-abc5-c2394437a0f2
uri = /sp/sled/1/component/rot/cfpa
|
| 2713 | 2026-01-14T21:22:50.102Z | DEBG | test_vpc_firewall (dropshot): determined request API version
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:46538
req_id = 2500cc9d-bb68-4526-abc5-c2394437a0f2
uri = /sp/sled/1/component/rot/cfpa
version = 3.0.0
|
| 2714 | 2026-01-14T21:22:50.103Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 192 }, kind: MgsRequest(ReadRot(ReadCfpa(Scratch))) }
|
| 2715 | 2026-01-14T21:22:50.103Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 192 }
interface = fake-sled1
response = ReadRot(Ok)
|
| 2716 | 2026-01-14T21:22:50.103Z | INFO | test_vpc_firewall (dropshot): request completed
latency_us = 1257
local_addr = [::1]:59250
method = GET
remote_addr = [::1]:46538
req_id = 2500cc9d-bb68-4526-abc5-c2394437a0f2
response_code = 200
uri = /sp/sled/1/component/rot/cfpa
|
| 2717 | 2026-01-14T21:22:50.605Z | TRAC | test_vpc_firewall (sensor-poller): interval elapsed, polling SP...
chassis_type = Switch
sp_slot = 1
|
| 2718 | 2026-01-14T21:22:50.605Z | TRAC | test_vpc_firewall (sensor-poller): interval elapsed, polling SP...
chassis_type = Switch
sp_slot = 0
|
| 2719 | 2026-01-14T21:22:50.605Z | TRAC | test_vpc_firewall (sensor-poller): interval elapsed, polling SP...
chassis_type = Sled
sp_slot = 0
|
| 2720 | 2026-01-14T21:22:50.605Z | TRAC | test_vpc_firewall (sensor-poller): interval elapsed, polling SP...
chassis_type = Sled
sp_slot = 1
|
| 2721 | 2026-01-14T21:22:50.605Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch1
request = Message { header: Header { version: 22, message_id: 109 }, kind: MgsRequest(SpState) }
|
| 2722 | 2026-01-14T21:22:50.606Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch0
request = Message { header: Header { version: 22, message_id: 135 }, kind: MgsRequest(SpState) }
|
| 2723 | 2026-01-14T21:22:50.606Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 193 }, kind: MgsRequest(SpState) }
|
| 2724 | 2026-01-14T21:22:50.610Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 193 }, kind: MgsRequest(SpState) }
|
| 2725 | 2026-01-14T21:22:50.611Z | DEBG | test_vpc_firewall: received state request
reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) }
slot = sidecar 0
|
| 2726 | 2026-01-14T21:22:50.611Z | DEBG | test_vpc_firewall: received state request
reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) }
slot = sidecar 1
|
| 2727 | 2026-01-14T21:22:50.611Z | DEBG | test_vpc_firewall: received state request
reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) }
slot = gimlet 0
|
| 2728 | 2026-01-14T21:22:50.611Z | DEBG | test_vpc_firewall: received state request
reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) }
slot = gimlet 1
|
| 2729 | 2026-01-14T21:22:50.611Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 135 }
interface = fake-switch0
response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
|
| 2730 | 2026-01-14T21:22:50.611Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 109 }
interface = fake-switch1
response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
|
| 2731 | 2026-01-14T21:22:50.612Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 193 }
interface = fake-sled0
response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
|
| 2732 | 2026-01-14T21:22:50.612Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 193 }
interface = fake-sled1
response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
|
| 2733 | 2026-01-14T21:22:50.612Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch0
request = Message { header: Header { version: 22, message_id: 136 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-0" }, offset: 0 }) }
|
| 2734 | 2026-01-14T21:22:50.612Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch1
request = Message { header: Header { version: 22, message_id: 110 }, kind: MgsRequest(SpState) }
|
| 2735 | 2026-01-14T21:22:50.612Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 194 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-1" }, offset: 0 }) }
|
| 2736 | 2026-01-14T21:22:50.612Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 194 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-8" }, offset: 0 }) }
|
| 2737 | 2026-01-14T21:22:50.612Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-0" }): asked for number of component details
num_details = 1
slot = sidecar 0
|
| 2738 | 2026-01-14T21:22:50.612Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-0" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Southwest", kind: Temperature, value: Ok(41.789063) })
index = 0
slot = sidecar 0
|
| 2739 | 2026-01-14T21:22:50.613Z | DEBG | test_vpc_firewall: received state request
reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) }
slot = sidecar 1
|
| 2740 | 2026-01-14T21:22:50.613Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-1" }): asked for number of component details
num_details = 1
slot = gimlet 0
|
| 2741 | 2026-01-14T21:22:50.613Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-1" }): asked for component details for a sensor
details = Measurement(Measurement { name: "South", kind: Temperature, value: Ok(42.5625) })
index = 0
slot = gimlet 0
|
| 2742 | 2026-01-14T21:22:50.613Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-8" }): asked for number of component details
num_details = 1
slot = gimlet 1
|
| 2743 | 2026-01-14T21:22:50.613Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-8" }): asked for component details for a sensor
details = Measurement(Measurement { name: "U2_N0", kind: Temperature, value: Ok(56.0) })
index = 0
slot = gimlet 1
|
| 2744 | 2026-01-14T21:22:50.613Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 136 }
interface = fake-switch0
response = ComponentDetails(TlvPage { offset: 0, total: 1 })
|
| 2745 | 2026-01-14T21:22:50.613Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 110 }
interface = fake-switch1
response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
|
| 2746 | 2026-01-14T21:22:50.613Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 194 }
interface = fake-sled0
response = ComponentDetails(TlvPage { offset: 0, total: 1 })
|
| 2747 | 2026-01-14T21:22:50.613Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 194 }
interface = fake-sled1
response = ComponentDetails(TlvPage { offset: 0, total: 1 })
|
| 2748 | 2026-01-14T21:22:50.614Z | TRAC | test_vpc_firewall (sensor-poller): polled SP, no samples returned
chassis_type = Switch
num_samples = 0
sp_slot = 1
|
| 2749 | 2026-01-14T21:22:50.632Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch0
request = Message { header: Header { version: 22, message_id: 137 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-1" }, offset: 0 }) }
|
| 2750 | 2026-01-14T21:22:50.632Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 195 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-2" }, offset: 0 }) }
|
| 2751 | 2026-01-14T21:22:50.633Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 195 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-46" }, offset: 0 }) }
|
| 2752 | 2026-01-14T21:22:50.635Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-1" }): asked for number of component details
num_details = 1
slot = sidecar 0
|
| 2753 | 2026-01-14T21:22:50.635Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-1" }): asked for component details for a sensor
details = Measurement(Measurement { name: "South", kind: Temperature, value: Err(DeviceError) })
index = 0
slot = sidecar 0
|
| 2754 | 2026-01-14T21:22:50.635Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-2" }): asked for number of component details
num_details = 1
slot = gimlet 0
|
| 2755 | 2026-01-14T21:22:50.636Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-2" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Southeast", kind: Temperature, value: Ok(41.570313) })
index = 0
slot = gimlet 0
|
| 2756 | 2026-01-14T21:22:50.636Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-46" }): asked for number of component details
num_details = 1
slot = gimlet 1
|
| 2757 | 2026-01-14T21:22:50.636Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-46" }): asked for component details for a sensor
details = Measurement(Measurement { name: "CPU", kind: Temperature, value: Ok(62.6) })
index = 0
slot = gimlet 1
|
| 2758 | 2026-01-14T21:22:50.636Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 137 }
interface = fake-switch0
response = ComponentDetails(TlvPage { offset: 0, total: 1 })
|
| 2759 | 2026-01-14T21:22:50.636Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 195 }
interface = fake-sled0
response = ComponentDetails(TlvPage { offset: 0, total: 1 })
|
| 2760 | 2026-01-14T21:22:50.637Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 195 }
interface = fake-sled1
response = ComponentDetails(TlvPage { offset: 0, total: 1 })
|
| 2761 | 2026-01-14T21:22:50.641Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch0
request = Message { header: Header { version: 22, message_id: 138 }, kind: MgsRequest(SpState) }
|
| 2762 | 2026-01-14T21:22:50.642Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 196 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-0" }, offset: 0 }) }
|
| 2763 | 2026-01-14T21:22:50.642Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 196 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-53" }, offset: 0 }) }
|
| 2764 | 2026-01-14T21:22:50.643Z | DEBG | test_vpc_firewall: received state request
reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) }
slot = sidecar 0
|
| 2765 | 2026-01-14T21:22:50.644Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-0" }): asked for number of component details
num_details = 1
slot = gimlet 0
|
| 2766 | 2026-01-14T21:22:50.644Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-0" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Southwest", kind: Temperature, value: Err(DeviceError) })
index = 0
slot = gimlet 0
|
| 2767 | 2026-01-14T21:22:50.644Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for number of component details
num_details = 6
slot = gimlet 1
|
| 2768 | 2026-01-14T21:22:50.644Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Southeast", kind: Speed, value: Ok(2510.0) })
index = 0
slot = gimlet 1
|
| 2769 | 2026-01-14T21:22:50.644Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Northeast", kind: Speed, value: Ok(2390.0) })
index = 1
slot = gimlet 1
|
| 2770 | 2026-01-14T21:22:50.644Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor
details = Measurement(Measurement { name: "South", kind: Speed, value: Ok(2467.0) })
index = 2
slot = gimlet 1
|
| 2771 | 2026-01-14T21:22:50.644Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor
details = Measurement(Measurement { name: "North", kind: Speed, value: Ok(2195.0) })
index = 3
slot = gimlet 1
|
| 2772 | 2026-01-14T21:22:50.644Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Southwest", kind: Speed, value: Ok(2680.0) })
index = 4
slot = gimlet 1
|
| 2773 | 2026-01-14T21:22:50.644Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Northwest", kind: Speed, value: Ok(2212.0) })
index = 5
slot = gimlet 1
|
| 2774 | 2026-01-14T21:22:50.645Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 138 }
interface = fake-switch0
response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
|
| 2775 | 2026-01-14T21:22:50.645Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 196 }
interface = fake-sled0
response = ComponentDetails(TlvPage { offset: 0, total: 1 })
|
| 2776 | 2026-01-14T21:22:50.645Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 196 }
interface = fake-sled1
response = ComponentDetails(TlvPage { offset: 0, total: 6 })
|
| 2777 | 2026-01-14T21:22:50.646Z | TRAC | test_vpc_firewall (sensor-poller): polled SP successfully
chassis_type = Switch
num_samples = 3
sp_slot = 0
|
| 2778 | 2026-01-14T21:22:50.658Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 197 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-7" }, offset: 0 }) }
|
| 2779 | 2026-01-14T21:22:50.658Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 197 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-0" }, offset: 0 }) }
|
| 2780 | 2026-01-14T21:22:50.663Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-7" }): asked for number of component details
num_details = 4
slot = gimlet 0
|
| 2781 | 2026-01-14T21:22:50.663Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor
details = Measurement(Measurement { name: "V12_U2A_A0", kind: Current, value: Ok(0.45898438) })
index = 0
slot = gimlet 0
|
| 2782 | 2026-01-14T21:22:50.663Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor
details = Measurement(Measurement { name: "V3P3_U2A_A0", kind: Current, value: Ok(0.024414063) })
index = 1
slot = gimlet 0
|
| 2783 | 2026-01-14T21:22:50.663Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor
details = Measurement(Measurement { name: "V12_U2A_A0", kind: Voltage, value: Ok(12.03125) })
index = 2
slot = gimlet 0
|
| 2784 | 2026-01-14T21:22:50.663Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor
details = Measurement(Measurement { name: "V3P3_U2A_A0", kind: Voltage, value: Ok(3.328125) })
index = 3
slot = gimlet 0
|
| 2785 | 2026-01-14T21:22:50.664Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-0" }): asked for number of component details
num_details = 1
slot = gimlet 1
|
| 2786 | 2026-01-14T21:22:50.664Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-0" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Southwest", kind: Temperature, value: Ok(41.3629) })
index = 0
slot = gimlet 1
|
| 2787 | 2026-01-14T21:22:50.667Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 197 }
interface = fake-sled0
response = ComponentDetails(TlvPage { offset: 0, total: 4 })
|
| 2788 | 2026-01-14T21:22:50.667Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 197 }
interface = fake-sled1
response = ComponentDetails(TlvPage { offset: 0, total: 1 })
|
| 2789 | 2026-01-14T21:22:50.672Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 198 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-39" }, offset: 0 }) }
|
| 2790 | 2026-01-14T21:22:50.672Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 198 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-2" }, offset: 0 }) }
|
| 2791 | 2026-01-14T21:22:50.674Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-39" }): asked for number of component details
num_details = 1
slot = gimlet 0
|
| 2792 | 2026-01-14T21:22:50.675Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-39" }): asked for component details for a sensor
details = Measurement(Measurement { name: "t6", kind: Temperature, value: Ok(70.625) })
index = 0
slot = gimlet 0
|
| 2793 | 2026-01-14T21:22:50.675Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-2" }): asked for number of component details
num_details = 1
slot = gimlet 1
|
| 2794 | 2026-01-14T21:22:50.677Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-2" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Southeast", kind: Temperature, value: Ok(41.570313) })
index = 0
slot = gimlet 1
|
| 2795 | 2026-01-14T21:22:50.695Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 198 }
interface = fake-sled0
response = ComponentDetails(TlvPage { offset: 0, total: 1 })
|
| 2796 | 2026-01-14T21:22:50.695Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 198 }
interface = fake-sled1
response = ComponentDetails(TlvPage { offset: 0, total: 1 })
|
| 2797 | 2026-01-14T21:22:50.699Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 199 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-46" }, offset: 0 }) }
|
| 2798 | 2026-01-14T21:22:50.699Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 199 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-1" }, offset: 0 }) }
|
| 2799 | 2026-01-14T21:22:50.700Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-46" }): asked for number of component details
num_details = 1
slot = gimlet 0
|
| 2800 | 2026-01-14T21:22:50.700Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-46" }): asked for component details for a sensor
details = Measurement(Measurement { name: "CPU", kind: Temperature, value: Ok(64.5) })
index = 0
slot = gimlet 0
|
| 2801 | 2026-01-14T21:22:50.700Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-1" }): asked for number of component details
num_details = 1
slot = gimlet 1
|
| 2802 | 2026-01-14T21:22:50.700Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-1" }): asked for component details for a sensor
details = Measurement(Measurement { name: "South", kind: Temperature, value: Ok(42.5625) })
index = 0
slot = gimlet 1
|
| 2803 | 2026-01-14T21:22:50.701Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 199 }
interface = fake-sled0
response = ComponentDetails(TlvPage { offset: 0, total: 1 })
|
| 2804 | 2026-01-14T21:22:50.701Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 199 }
interface = fake-sled1
response = ComponentDetails(TlvPage { offset: 0, total: 1 })
|
| 2805 | 2026-01-14T21:22:50.704Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 200 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-8" }, offset: 0 }) }
|
| 2806 | 2026-01-14T21:22:50.704Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 200 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-7" }, offset: 0 }) }
|
| 2807 | 2026-01-14T21:22:50.707Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-8" }): asked for number of component details
num_details = 1
slot = gimlet 0
|
| 2808 | 2026-01-14T21:22:50.707Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-8" }): asked for component details for a sensor
details = Measurement(Measurement { name: "U2_N0", kind: Temperature, value: Ok(56.0) })
index = 0
slot = gimlet 0
|
| 2809 | 2026-01-14T21:22:50.707Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-7" }): asked for number of component details
num_details = 4
slot = gimlet 1
|
| 2810 | 2026-01-14T21:22:50.707Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor
details = Measurement(Measurement { name: "V12_U2A_A0", kind: Current, value: Ok(0.41893438) })
index = 0
slot = gimlet 1
|
| 2811 | 2026-01-14T21:22:50.707Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor
details = Measurement(Measurement { name: "V3P3_U2A_A0", kind: Current, value: Ok(0.025614602) })
index = 1
slot = gimlet 1
|
| 2812 | 2026-01-14T21:22:50.707Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor
details = Measurement(Measurement { name: "V12_U2A_A0", kind: Voltage, value: Ok(12.02914) })
index = 2
slot = gimlet 1
|
| 2813 | 2026-01-14T21:22:50.707Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor
details = Measurement(Measurement { name: "V3P3_U2A_A0", kind: Voltage, value: Ok(3.2618) })
index = 3
slot = gimlet 1
|
| 2814 | 2026-01-14T21:22:50.710Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 200 }
interface = fake-sled0
response = ComponentDetails(TlvPage { offset: 0, total: 1 })
|
| 2815 | 2026-01-14T21:22:50.710Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 200 }
interface = fake-sled1
response = ComponentDetails(TlvPage { offset: 0, total: 4 })
|
| 2816 | 2026-01-14T21:22:50.713Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 201 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-53" }, offset: 0 }) }
|
| 2817 | 2026-01-14T21:22:50.713Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 201 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-39" }, offset: 0 }) }
|
| 2818 | 2026-01-14T21:22:50.716Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for number of component details
num_details = 6
slot = gimlet 0
|
| 2819 | 2026-01-14T21:22:50.716Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Southeast", kind: Speed, value: Ok(2607.0) })
index = 0
slot = gimlet 0
|
| 2820 | 2026-01-14T21:22:50.716Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Northeast", kind: Speed, value: Ok(2476.0) })
index = 1
slot = gimlet 0
|
| 2821 | 2026-01-14T21:22:50.716Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor
details = Measurement(Measurement { name: "South", kind: Speed, value: Ok(2553.0) })
index = 2
slot = gimlet 0
|
| 2822 | 2026-01-14T21:22:50.716Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor
details = Measurement(Measurement { name: "North", kind: Speed, value: Ok(2265.0) })
index = 3
slot = gimlet 0
|
| 2823 | 2026-01-14T21:22:50.716Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Southwest", kind: Speed, value: Ok(2649.0) })
index = 4
slot = gimlet 0
|
| 2824 | 2026-01-14T21:22:50.716Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Northwest", kind: Speed, value: Ok(2275.0) })
index = 5
slot = gimlet 0
|
| 2825 | 2026-01-14T21:22:50.716Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-39" }): asked for number of component details
num_details = 1
slot = gimlet 1
|
| 2826 | 2026-01-14T21:22:50.716Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-39" }): asked for component details for a sensor
details = Measurement(Measurement { name: "t6", kind: Temperature, value: Ok(70.625) })
index = 0
slot = gimlet 1
|
| 2827 | 2026-01-14T21:22:50.716Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 201 }
interface = fake-sled0
response = ComponentDetails(TlvPage { offset: 0, total: 6 })
|
| 2828 | 2026-01-14T21:22:50.716Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 201 }
interface = fake-sled1
response = ComponentDetails(TlvPage { offset: 0, total: 1 })
|
| 2829 | 2026-01-14T21:22:50.719Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 202 }, kind: MgsRequest(SpState) }
|
| 2830 | 2026-01-14T21:22:50.720Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 202 }, kind: MgsRequest(SpState) }
|
| 2831 | 2026-01-14T21:22:50.720Z | DEBG | test_vpc_firewall: received state request
reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) }
slot = gimlet 0
|
| 2832 | 2026-01-14T21:22:50.720Z | DEBG | test_vpc_firewall: received state request
reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) }
slot = gimlet 1
|
| 2833 | 2026-01-14T21:22:50.720Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 202 }
interface = fake-sled0
response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
|
| 2834 | 2026-01-14T21:22:50.720Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 202 }
interface = fake-sled1
response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
|
| 2835 | 2026-01-14T21:22:50.720Z | TRAC | test_vpc_firewall (sensor-poller): polled SP successfully
chassis_type = Sled
num_samples = 17
sp_slot = 0
|
| 2836 | 2026-01-14T21:22:50.720Z | TRAC | test_vpc_firewall (sensor-poller): polled SP successfully
chassis_type = Sled
num_samples = 16
sp_slot = 1
|
| 2837 | 2026-01-14T21:22:51.594Z | TRAC | test_vpc_firewall (sensor-poller): interval elapsed, polling SP...
chassis_type = Switch
sp_slot = 1
|
| 2838 | 2026-01-14T21:22:51.594Z | TRAC | test_vpc_firewall (sensor-poller): interval elapsed, polling SP...
chassis_type = Switch
sp_slot = 0
|
| 2839 | 2026-01-14T21:22:51.594Z | TRAC | test_vpc_firewall (sensor-poller): interval elapsed, polling SP...
chassis_type = Sled
sp_slot = 0
|
| 2840 | 2026-01-14T21:22:51.594Z | TRAC | test_vpc_firewall (sensor-poller): interval elapsed, polling SP...
chassis_type = Sled
sp_slot = 1
|
| 2841 | 2026-01-14T21:22:51.594Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch1
request = Message { header: Header { version: 22, message_id: 111 }, kind: MgsRequest(SpState) }
|
| 2842 | 2026-01-14T21:22:51.594Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch0
request = Message { header: Header { version: 22, message_id: 139 }, kind: MgsRequest(SpState) }
|
| 2843 | 2026-01-14T21:22:51.594Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 203 }, kind: MgsRequest(SpState) }
|
| 2844 | 2026-01-14T21:22:51.594Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 203 }, kind: MgsRequest(SpState) }
|
| 2845 | 2026-01-14T21:22:51.594Z | DEBG | test_vpc_firewall: received state request
reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) }
slot = sidecar 0
|
| 2846 | 2026-01-14T21:22:51.595Z | DEBG | test_vpc_firewall: received state request
reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) }
slot = sidecar 1
|
| 2847 | 2026-01-14T21:22:51.595Z | DEBG | test_vpc_firewall: received state request
reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) }
slot = gimlet 0
|
| 2848 | 2026-01-14T21:22:51.595Z | DEBG | test_vpc_firewall: received state request
reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) }
slot = gimlet 1
|
| 2849 | 2026-01-14T21:22:51.596Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 139 }
interface = fake-switch0
response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
|
| 2850 | 2026-01-14T21:22:51.596Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 111 }
interface = fake-switch1
response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
|
| 2851 | 2026-01-14T21:22:51.596Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 203 }
interface = fake-sled0
response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
|
| 2852 | 2026-01-14T21:22:51.596Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 203 }
interface = fake-sled1
response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
|
| 2853 | 2026-01-14T21:22:51.596Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch0
request = Message { header: Header { version: 22, message_id: 140 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-0" }, offset: 0 }) }
|
| 2854 | 2026-01-14T21:22:51.596Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch1
request = Message { header: Header { version: 22, message_id: 112 }, kind: MgsRequest(SpState) }
|
| 2855 | 2026-01-14T21:22:51.596Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 204 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-1" }, offset: 0 }) }
|
| 2856 | 2026-01-14T21:22:51.596Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 204 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-8" }, offset: 0 }) }
|
| 2857 | 2026-01-14T21:22:51.596Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-0" }): asked for number of component details
num_details = 1
slot = sidecar 0
|
| 2858 | 2026-01-14T21:22:51.596Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-0" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Southwest", kind: Temperature, value: Ok(41.789063) })
index = 0
slot = sidecar 0
|
| 2859 | 2026-01-14T21:22:51.596Z | DEBG | test_vpc_firewall: received state request
reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) }
slot = sidecar 1
|
| 2860 | 2026-01-14T21:22:51.596Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-1" }): asked for number of component details
num_details = 1
slot = gimlet 0
|
| 2861 | 2026-01-14T21:22:51.596Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-1" }): asked for component details for a sensor
details = Measurement(Measurement { name: "South", kind: Temperature, value: Ok(42.5625) })
index = 0
slot = gimlet 0
|
| 2862 | 2026-01-14T21:22:51.596Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-8" }): asked for number of component details
num_details = 1
slot = gimlet 1
|
| 2863 | 2026-01-14T21:22:51.596Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-8" }): asked for component details for a sensor
details = Measurement(Measurement { name: "U2_N0", kind: Temperature, value: Ok(56.0) })
index = 0
slot = gimlet 1
|
| 2864 | 2026-01-14T21:22:51.597Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 140 }
interface = fake-switch0
response = ComponentDetails(TlvPage { offset: 0, total: 1 })
|
| 2865 | 2026-01-14T21:22:51.597Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 112 }
interface = fake-switch1
response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
|
| 2866 | 2026-01-14T21:22:51.597Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 204 }
interface = fake-sled0
response = ComponentDetails(TlvPage { offset: 0, total: 1 })
|
| 2867 | 2026-01-14T21:22:51.597Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 204 }
interface = fake-sled1
response = ComponentDetails(TlvPage { offset: 0, total: 1 })
|
| 2868 | 2026-01-14T21:22:51.599Z | TRAC | test_vpc_firewall (sensor-poller): polled SP, no samples returned
chassis_type = Switch
num_samples = 0
sp_slot = 1
|
| 2869 | 2026-01-14T21:22:51.601Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch0
request = Message { header: Header { version: 22, message_id: 141 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-1" }, offset: 0 }) }
|
| 2870 | 2026-01-14T21:22:51.602Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 205 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-2" }, offset: 0 }) }
|
| 2871 | 2026-01-14T21:22:51.602Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 205 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-46" }, offset: 0 }) }
|
| 2872 | 2026-01-14T21:22:51.611Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-1" }): asked for number of component details
num_details = 1
slot = sidecar 0
|
| 2873 | 2026-01-14T21:22:51.612Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-1" }): asked for component details for a sensor
details = Measurement(Measurement { name: "South", kind: Temperature, value: Err(DeviceError) })
index = 0
slot = sidecar 0
|
| 2874 | 2026-01-14T21:22:51.612Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-2" }): asked for number of component details
num_details = 1
slot = gimlet 0
|
| 2875 | 2026-01-14T21:22:51.612Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-2" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Southeast", kind: Temperature, value: Ok(41.570313) })
index = 0
slot = gimlet 0
|
| 2876 | 2026-01-14T21:22:51.612Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-46" }): asked for number of component details
num_details = 1
slot = gimlet 1
|
| 2877 | 2026-01-14T21:22:51.612Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-46" }): asked for component details for a sensor
details = Measurement(Measurement { name: "CPU", kind: Temperature, value: Ok(62.6) })
index = 0
slot = gimlet 1
|
| 2878 | 2026-01-14T21:22:52.307Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 141 }
interface = fake-switch0
response = ComponentDetails(TlvPage { offset: 0, total: 1 })
|
| 2879 | 2026-01-14T21:22:52.307Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 205 }
interface = fake-sled0
response = ComponentDetails(TlvPage { offset: 0, total: 1 })
|
| 2880 | 2026-01-14T21:22:52.307Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 205 }
interface = fake-sled1
response = ComponentDetails(TlvPage { offset: 0, total: 1 })
|
| 2881 | 2026-01-14T21:22:52.399Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch0
request = Message { header: Header { version: 22, message_id: 142 }, kind: MgsRequest(SpState) }
|
| 2882 | 2026-01-14T21:22:52.400Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 206 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-0" }, offset: 0 }) }
|
| 2883 | 2026-01-14T21:22:52.400Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 206 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-53" }, offset: 0 }) }
|
| 2884 | 2026-01-14T21:22:52.400Z | DEBG | test_vpc_firewall: received state request
reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) }
slot = sidecar 0
|
| 2885 | 2026-01-14T21:22:52.401Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-0" }): asked for number of component details
num_details = 1
slot = gimlet 0
|
| 2886 | 2026-01-14T21:22:52.401Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-0" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Southwest", kind: Temperature, value: Err(DeviceError) })
index = 0
slot = gimlet 0
|
| 2887 | 2026-01-14T21:22:52.401Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for number of component details
num_details = 6
slot = gimlet 1
|
| 2888 | 2026-01-14T21:22:52.401Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Southeast", kind: Speed, value: Ok(2510.0) })
index = 0
slot = gimlet 1
|
| 2889 | 2026-01-14T21:22:52.401Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Northeast", kind: Speed, value: Ok(2390.0) })
index = 1
slot = gimlet 1
|
| 2890 | 2026-01-14T21:22:52.401Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor
details = Measurement(Measurement { name: "South", kind: Speed, value: Ok(2467.0) })
index = 2
slot = gimlet 1
|
| 2891 | 2026-01-14T21:22:52.401Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor
details = Measurement(Measurement { name: "North", kind: Speed, value: Ok(2195.0) })
index = 3
slot = gimlet 1
|
| 2892 | 2026-01-14T21:22:52.401Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Southwest", kind: Speed, value: Ok(2680.0) })
index = 4
slot = gimlet 1
|
| 2893 | 2026-01-14T21:22:52.401Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Northwest", kind: Speed, value: Ok(2212.0) })
index = 5
slot = gimlet 1
|
| 2894 | 2026-01-14T21:22:52.401Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 142 }
interface = fake-switch0
response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
|
| 2895 | 2026-01-14T21:22:52.401Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 206 }
interface = fake-sled0
response = ComponentDetails(TlvPage { offset: 0, total: 1 })
|
| 2896 | 2026-01-14T21:22:52.401Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 206 }
interface = fake-sled1
response = ComponentDetails(TlvPage { offset: 0, total: 6 })
|
| 2897 | 2026-01-14T21:22:52.402Z | TRAC | test_vpc_firewall (sensor-poller): polled SP successfully
chassis_type = Switch
num_samples = 3
sp_slot = 0
|
| 2898 | 2026-01-14T21:22:52.410Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 207 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-7" }, offset: 0 }) }
|
| 2899 | 2026-01-14T21:22:52.410Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 207 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-0" }, offset: 0 }) }
|
| 2900 | 2026-01-14T21:22:52.412Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-7" }): asked for number of component details
num_details = 4
slot = gimlet 0
|
| 2901 | 2026-01-14T21:22:52.413Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor
details = Measurement(Measurement { name: "V12_U2A_A0", kind: Current, value: Ok(0.45898438) })
index = 0
slot = gimlet 0
|
| 2902 | 2026-01-14T21:22:52.413Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor
details = Measurement(Measurement { name: "V3P3_U2A_A0", kind: Current, value: Ok(0.024414063) })
index = 1
slot = gimlet 0
|
| 2903 | 2026-01-14T21:22:52.413Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor
details = Measurement(Measurement { name: "V12_U2A_A0", kind: Voltage, value: Ok(12.03125) })
index = 2
slot = gimlet 0
|
| 2904 | 2026-01-14T21:22:52.413Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor
details = Measurement(Measurement { name: "V3P3_U2A_A0", kind: Voltage, value: Ok(3.328125) })
index = 3
slot = gimlet 0
|
| 2905 | 2026-01-14T21:22:52.413Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-0" }): asked for number of component details
num_details = 1
slot = gimlet 1
|
| 2906 | 2026-01-14T21:22:52.413Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-0" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Southwest", kind: Temperature, value: Ok(41.3629) })
index = 0
slot = gimlet 1
|
| 2907 | 2026-01-14T21:22:52.416Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 207 }
interface = fake-sled0
response = ComponentDetails(TlvPage { offset: 0, total: 4 })
|
| 2908 | 2026-01-14T21:22:52.416Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 207 }
interface = fake-sled1
response = ComponentDetails(TlvPage { offset: 0, total: 1 })
|
| 2909 | 2026-01-14T21:22:52.421Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 208 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-39" }, offset: 0 }) }
|
| 2910 | 2026-01-14T21:22:52.421Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 208 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-2" }, offset: 0 }) }
|
| 2911 | 2026-01-14T21:22:52.422Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-39" }): asked for number of component details
num_details = 1
slot = gimlet 0
|
| 2912 | 2026-01-14T21:22:52.423Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-39" }): asked for component details for a sensor
details = Measurement(Measurement { name: "t6", kind: Temperature, value: Ok(70.625) })
index = 0
slot = gimlet 0
|
| 2913 | 2026-01-14T21:22:52.423Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-2" }): asked for number of component details
num_details = 1
slot = gimlet 1
|
| 2914 | 2026-01-14T21:22:52.423Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-2" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Southeast", kind: Temperature, value: Ok(41.570313) })
index = 0
slot = gimlet 1
|
| 2915 | 2026-01-14T21:22:52.423Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 208 }
interface = fake-sled0
response = ComponentDetails(TlvPage { offset: 0, total: 1 })
|
| 2916 | 2026-01-14T21:22:52.423Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 208 }
interface = fake-sled1
response = ComponentDetails(TlvPage { offset: 0, total: 1 })
|
| 2917 | 2026-01-14T21:22:52.426Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 209 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-46" }, offset: 0 }) }
|
| 2918 | 2026-01-14T21:22:52.427Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 209 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-1" }, offset: 0 }) }
|
| 2919 | 2026-01-14T21:22:52.428Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-46" }): asked for number of component details
num_details = 1
slot = gimlet 0
|
| 2920 | 2026-01-14T21:22:52.428Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-46" }): asked for component details for a sensor
details = Measurement(Measurement { name: "CPU", kind: Temperature, value: Ok(64.5) })
index = 0
slot = gimlet 0
|
| 2921 | 2026-01-14T21:22:52.428Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-1" }): asked for number of component details
num_details = 1
slot = gimlet 1
|
| 2922 | 2026-01-14T21:22:52.428Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-1" }): asked for component details for a sensor
details = Measurement(Measurement { name: "South", kind: Temperature, value: Ok(42.5625) })
index = 0
slot = gimlet 1
|
| 2923 | 2026-01-14T21:22:52.437Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 209 }
interface = fake-sled0
response = ComponentDetails(TlvPage { offset: 0, total: 1 })
|
| 2924 | 2026-01-14T21:22:52.438Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 209 }
interface = fake-sled1
response = ComponentDetails(TlvPage { offset: 0, total: 1 })
|
| 2925 | 2026-01-14T21:22:52.549Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 210 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-8" }, offset: 0 }) }
|
| 2926 | 2026-01-14T21:22:52.549Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 210 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-7" }, offset: 0 }) }
|
| 2927 | 2026-01-14T21:22:52.551Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-8" }): asked for number of component details
num_details = 1
slot = gimlet 0
|
| 2928 | 2026-01-14T21:22:52.551Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-8" }): asked for component details for a sensor
details = Measurement(Measurement { name: "U2_N0", kind: Temperature, value: Ok(56.0) })
index = 0
slot = gimlet 0
|
| 2929 | 2026-01-14T21:22:52.551Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-7" }): asked for number of component details
num_details = 4
slot = gimlet 1
|
| 2930 | 2026-01-14T21:22:52.551Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor
details = Measurement(Measurement { name: "V12_U2A_A0", kind: Current, value: Ok(0.41893438) })
index = 0
slot = gimlet 1
|
| 2931 | 2026-01-14T21:22:52.551Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor
details = Measurement(Measurement { name: "V3P3_U2A_A0", kind: Current, value: Ok(0.025614602) })
index = 1
slot = gimlet 1
|
| 2932 | 2026-01-14T21:22:52.551Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor
details = Measurement(Measurement { name: "V12_U2A_A0", kind: Voltage, value: Ok(12.02914) })
index = 2
slot = gimlet 1
|
| 2933 | 2026-01-14T21:22:52.551Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor
details = Measurement(Measurement { name: "V3P3_U2A_A0", kind: Voltage, value: Ok(3.2618) })
index = 3
slot = gimlet 1
|
| 2934 | 2026-01-14T21:22:52.556Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 210 }
interface = fake-sled0
response = ComponentDetails(TlvPage { offset: 0, total: 1 })
|
| 2935 | 2026-01-14T21:22:52.556Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 210 }
interface = fake-sled1
response = ComponentDetails(TlvPage { offset: 0, total: 4 })
|
| 2936 | 2026-01-14T21:22:52.567Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 211 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-53" }, offset: 0 }) }
|
| 2937 | 2026-01-14T21:22:52.568Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 211 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-39" }, offset: 0 }) }
|
| 2938 | 2026-01-14T21:22:52.568Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for number of component details
num_details = 6
slot = gimlet 0
|
| 2939 | 2026-01-14T21:22:52.568Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Southeast", kind: Speed, value: Ok(2607.0) })
index = 0
slot = gimlet 0
|
| 2940 | 2026-01-14T21:22:52.568Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Northeast", kind: Speed, value: Ok(2476.0) })
index = 1
slot = gimlet 0
|
| 2941 | 2026-01-14T21:22:52.568Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor
details = Measurement(Measurement { name: "South", kind: Speed, value: Ok(2553.0) })
index = 2
slot = gimlet 0
|
| 2942 | 2026-01-14T21:22:52.569Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor
details = Measurement(Measurement { name: "North", kind: Speed, value: Ok(2265.0) })
index = 3
slot = gimlet 0
|
| 2943 | 2026-01-14T21:22:52.569Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Southwest", kind: Speed, value: Ok(2649.0) })
index = 4
slot = gimlet 0
|
| 2944 | 2026-01-14T21:22:52.569Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Northwest", kind: Speed, value: Ok(2275.0) })
index = 5
slot = gimlet 0
|
| 2945 | 2026-01-14T21:22:52.569Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-39" }): asked for number of component details
num_details = 1
slot = gimlet 1
|
| 2946 | 2026-01-14T21:22:52.569Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-39" }): asked for component details for a sensor
details = Measurement(Measurement { name: "t6", kind: Temperature, value: Ok(70.625) })
index = 0
slot = gimlet 1
|
| 2947 | 2026-01-14T21:22:52.571Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 211 }
interface = fake-sled0
response = ComponentDetails(TlvPage { offset: 0, total: 6 })
|
| 2948 | 2026-01-14T21:22:52.572Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 211 }
interface = fake-sled1
response = ComponentDetails(TlvPage { offset: 0, total: 1 })
|
| 2949 | 2026-01-14T21:22:52.578Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 212 }, kind: MgsRequest(SpState) }
|
| 2950 | 2026-01-14T21:22:52.579Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 212 }, kind: MgsRequest(SpState) }
|
| 2951 | 2026-01-14T21:22:52.581Z | DEBG | test_vpc_firewall: received state request
reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) }
slot = gimlet 0
|
| 2952 | 2026-01-14T21:22:52.581Z | DEBG | test_vpc_firewall: received state request
reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) }
slot = gimlet 1
|
| 2953 | 2026-01-14T21:22:52.583Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 212 }
interface = fake-sled0
response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
|
| 2954 | 2026-01-14T21:22:52.583Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 212 }
interface = fake-sled1
response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
|
| 2955 | 2026-01-14T21:22:52.584Z | TRAC | test_vpc_firewall (sensor-poller): polled SP successfully
chassis_type = Sled
num_samples = 17
sp_slot = 0
|
| 2956 | 2026-01-14T21:22:52.584Z | TRAC | test_vpc_firewall (sensor-poller): polled SP successfully
chassis_type = Sled
num_samples = 16
sp_slot = 1
|
| 2957 | 2026-01-14T21:22:52.595Z | TRAC | test_vpc_firewall (sensor-poller): interval elapsed, polling SP...
chassis_type = Switch
sp_slot = 1
|
| 2958 | 2026-01-14T21:22:52.595Z | TRAC | test_vpc_firewall (sensor-poller): interval elapsed, polling SP...
chassis_type = Switch
sp_slot = 0
|
| 2959 | 2026-01-14T21:22:52.595Z | TRAC | test_vpc_firewall (sensor-poller): interval elapsed, polling SP...
chassis_type = Sled
sp_slot = 0
|
| 2960 | 2026-01-14T21:22:52.595Z | TRAC | test_vpc_firewall (sensor-poller): interval elapsed, polling SP...
chassis_type = Sled
sp_slot = 1
|
| 2961 | 2026-01-14T21:22:52.595Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch1
request = Message { header: Header { version: 22, message_id: 113 }, kind: MgsRequest(SpState) }
|
| 2962 | 2026-01-14T21:22:52.595Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch0
request = Message { header: Header { version: 22, message_id: 143 }, kind: MgsRequest(SpState) }
|
| 2963 | 2026-01-14T21:22:52.595Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 213 }, kind: MgsRequest(SpState) }
|
| 2964 | 2026-01-14T21:22:52.595Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 213 }, kind: MgsRequest(SpState) }
|
| 2965 | 2026-01-14T21:22:52.600Z | DEBG | test_vpc_firewall: received state request
reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) }
slot = sidecar 0
|
| 2966 | 2026-01-14T21:22:52.601Z | DEBG | test_vpc_firewall: received state request
reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) }
slot = sidecar 1
|
| 2967 | 2026-01-14T21:22:52.601Z | DEBG | test_vpc_firewall: received state request
reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) }
slot = gimlet 0
|
| 2968 | 2026-01-14T21:22:52.601Z | DEBG | test_vpc_firewall: received state request
reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) }
slot = gimlet 1
|
| 2969 | 2026-01-14T21:22:52.682Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 143 }
interface = fake-switch0
response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
|
| 2970 | 2026-01-14T21:22:52.682Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 113 }
interface = fake-switch1
response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
|
| 2971 | 2026-01-14T21:22:52.682Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 213 }
interface = fake-sled0
response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
|
| 2972 | 2026-01-14T21:22:52.682Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 213 }
interface = fake-sled1
response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
|
| 2973 | 2026-01-14T21:22:52.689Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch0
request = Message { header: Header { version: 22, message_id: 144 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-0" }, offset: 0 }) }
|
| 2974 | 2026-01-14T21:22:52.689Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch1
request = Message { header: Header { version: 22, message_id: 114 }, kind: MgsRequest(SpState) }
|
| 2975 | 2026-01-14T21:22:52.689Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 214 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-1" }, offset: 0 }) }
|
| 2976 | 2026-01-14T21:22:52.689Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 214 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-8" }, offset: 0 }) }
|
| 2977 | 2026-01-14T21:22:52.691Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-0" }): asked for number of component details
num_details = 1
slot = sidecar 0
|
| 2978 | 2026-01-14T21:22:52.691Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-0" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Southwest", kind: Temperature, value: Ok(41.789063) })
index = 0
slot = sidecar 0
|
| 2979 | 2026-01-14T21:22:52.691Z | DEBG | test_vpc_firewall: received state request
reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) }
slot = sidecar 1
|
| 2980 | 2026-01-14T21:22:52.691Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-1" }): asked for number of component details
num_details = 1
slot = gimlet 0
|
| 2981 | 2026-01-14T21:22:52.691Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-1" }): asked for component details for a sensor
details = Measurement(Measurement { name: "South", kind: Temperature, value: Ok(42.5625) })
index = 0
slot = gimlet 0
|
| 2982 | 2026-01-14T21:22:52.691Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-8" }): asked for number of component details
num_details = 1
slot = gimlet 1
|
| 2983 | 2026-01-14T21:22:52.691Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-8" }): asked for component details for a sensor
details = Measurement(Measurement { name: "U2_N0", kind: Temperature, value: Ok(56.0) })
index = 0
slot = gimlet 1
|
| 2984 | 2026-01-14T21:22:52.717Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 144 }
interface = fake-switch0
response = ComponentDetails(TlvPage { offset: 0, total: 1 })
|
| 2985 | 2026-01-14T21:22:52.717Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 114 }
interface = fake-switch1
response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
|
| 2986 | 2026-01-14T21:22:52.718Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 214 }
interface = fake-sled0
response = ComponentDetails(TlvPage { offset: 0, total: 1 })
|
| 2987 | 2026-01-14T21:22:52.718Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 214 }
interface = fake-sled1
response = ComponentDetails(TlvPage { offset: 0, total: 1 })
|
| 2988 | 2026-01-14T21:22:52.720Z | TRAC | test_vpc_firewall (sensor-poller): polled SP, no samples returned
chassis_type = Switch
num_samples = 0
sp_slot = 1
|
| 2989 | 2026-01-14T21:22:52.732Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch0
request = Message { header: Header { version: 22, message_id: 145 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-1" }, offset: 0 }) }
|
| 2990 | 2026-01-14T21:22:52.733Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 215 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-2" }, offset: 0 }) }
|
| 2991 | 2026-01-14T21:22:52.733Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 215 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-46" }, offset: 0 }) }
|
| 2992 | 2026-01-14T21:22:52.823Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-1" }): asked for number of component details
num_details = 1
slot = sidecar 0
|
| 2993 | 2026-01-14T21:22:52.823Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-1" }): asked for component details for a sensor
details = Measurement(Measurement { name: "South", kind: Temperature, value: Err(DeviceError) })
index = 0
slot = sidecar 0
|
| 2994 | 2026-01-14T21:22:52.823Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-2" }): asked for number of component details
num_details = 1
slot = gimlet 0
|
| 2995 | 2026-01-14T21:22:52.823Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-2" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Southeast", kind: Temperature, value: Ok(41.570313) })
index = 0
slot = gimlet 0
|
| 2996 | 2026-01-14T21:22:52.824Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-46" }): asked for number of component details
num_details = 1
slot = gimlet 1
|
| 2997 | 2026-01-14T21:22:52.824Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-46" }): asked for component details for a sensor
details = Measurement(Measurement { name: "CPU", kind: Temperature, value: Ok(62.6) })
index = 0
slot = gimlet 1
|
| 2998 | 2026-01-14T21:22:52.904Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 145 }
interface = fake-switch0
response = ComponentDetails(TlvPage { offset: 0, total: 1 })
|
| 2999 | 2026-01-14T21:22:52.904Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 215 }
interface = fake-sled0
response = ComponentDetails(TlvPage { offset: 0, total: 1 })
|
| 3000 | 2026-01-14T21:22:52.904Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 215 }
interface = fake-sled1
response = ComponentDetails(TlvPage { offset: 0, total: 1 })
|
| 3001 | 2026-01-14T21:22:52.921Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch0
request = Message { header: Header { version: 22, message_id: 146 }, kind: MgsRequest(SpState) }
|
| 3002 | 2026-01-14T21:22:52.921Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 216 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-0" }, offset: 0 }) }
|
| 3003 | 2026-01-14T21:22:52.921Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 216 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-53" }, offset: 0 }) }
|
| 3004 | 2026-01-14T21:22:52.974Z | DEBG | test_vpc_firewall: received state request
reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) }
slot = sidecar 0
|
| 3005 | 2026-01-14T21:22:52.974Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-0" }): asked for number of component details
num_details = 1
slot = gimlet 0
|
| 3006 | 2026-01-14T21:22:52.974Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-0" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Southwest", kind: Temperature, value: Err(DeviceError) })
index = 0
slot = gimlet 0
|
| 3007 | 2026-01-14T21:22:52.975Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for number of component details
num_details = 6
slot = gimlet 1
|
| 3008 | 2026-01-14T21:22:52.975Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Southeast", kind: Speed, value: Ok(2510.0) })
index = 0
slot = gimlet 1
|
| 3009 | 2026-01-14T21:22:52.975Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Northeast", kind: Speed, value: Ok(2390.0) })
index = 1
slot = gimlet 1
|
| 3010 | 2026-01-14T21:22:52.975Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor
details = Measurement(Measurement { name: "South", kind: Speed, value: Ok(2467.0) })
index = 2
slot = gimlet 1
|
| 3011 | 2026-01-14T21:22:52.975Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor
details = Measurement(Measurement { name: "North", kind: Speed, value: Ok(2195.0) })
index = 3
slot = gimlet 1
|
| 3012 | 2026-01-14T21:22:52.975Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Southwest", kind: Speed, value: Ok(2680.0) })
index = 4
slot = gimlet 1
|
| 3013 | 2026-01-14T21:22:52.976Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Northwest", kind: Speed, value: Ok(2212.0) })
index = 5
slot = gimlet 1
|
| 3014 | 2026-01-14T21:22:53.055Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 146 }
interface = fake-switch0
response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
|
| 3015 | 2026-01-14T21:22:53.055Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 216 }
interface = fake-sled0
response = ComponentDetails(TlvPage { offset: 0, total: 1 })
|
| 3016 | 2026-01-14T21:22:53.055Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 216 }
interface = fake-sled1
response = ComponentDetails(TlvPage { offset: 0, total: 6 })
|
| 3017 | 2026-01-14T21:22:53.059Z | TRAC | test_vpc_firewall (sensor-poller): polled SP successfully
chassis_type = Switch
num_samples = 3
sp_slot = 0
|
| 3018 | 2026-01-14T21:22:53.066Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 217 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-7" }, offset: 0 }) }
|
| 3019 | 2026-01-14T21:22:53.066Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 217 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-0" }, offset: 0 }) }
|
| 3020 | 2026-01-14T21:22:53.088Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-7" }): asked for number of component details
num_details = 4
slot = gimlet 0
|
| 3021 | 2026-01-14T21:22:53.088Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor
details = Measurement(Measurement { name: "V12_U2A_A0", kind: Current, value: Ok(0.45898438) })
index = 0
slot = gimlet 0
|
| 3022 | 2026-01-14T21:22:53.088Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor
details = Measurement(Measurement { name: "V3P3_U2A_A0", kind: Current, value: Ok(0.024414063) })
index = 1
slot = gimlet 0
|
| 3023 | 2026-01-14T21:22:53.089Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor
details = Measurement(Measurement { name: "V12_U2A_A0", kind: Voltage, value: Ok(12.03125) })
index = 2
slot = gimlet 0
|
| 3024 | 2026-01-14T21:22:53.089Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor
details = Measurement(Measurement { name: "V3P3_U2A_A0", kind: Voltage, value: Ok(3.328125) })
index = 3
slot = gimlet 0
|
| 3025 | 2026-01-14T21:22:53.089Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-0" }): asked for number of component details
num_details = 1
slot = gimlet 1
|
| 3026 | 2026-01-14T21:22:53.089Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-0" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Southwest", kind: Temperature, value: Ok(41.3629) })
index = 0
slot = gimlet 1
|
| 3027 | 2026-01-14T21:22:53.205Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 217 }
interface = fake-sled0
response = ComponentDetails(TlvPage { offset: 0, total: 4 })
|
| 3028 | 2026-01-14T21:22:53.205Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 217 }
interface = fake-sled1
response = ComponentDetails(TlvPage { offset: 0, total: 1 })
|
| 3029 | 2026-01-14T21:22:53.218Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 218 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-39" }, offset: 0 }) }
|
| 3030 | 2026-01-14T21:22:53.219Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 218 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-2" }, offset: 0 }) }
|
| 3031 | 2026-01-14T21:22:53.243Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-39" }): asked for number of component details
num_details = 1
slot = gimlet 0
|
| 3032 | 2026-01-14T21:22:53.243Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-39" }): asked for component details for a sensor
details = Measurement(Measurement { name: "t6", kind: Temperature, value: Ok(70.625) })
index = 0
slot = gimlet 0
|
| 3033 | 2026-01-14T21:22:53.244Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-2" }): asked for number of component details
num_details = 1
slot = gimlet 1
|
| 3034 | 2026-01-14T21:22:53.244Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-2" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Southeast", kind: Temperature, value: Ok(41.570313) })
index = 0
slot = gimlet 1
|
| 3035 | 2026-01-14T21:22:53.254Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 218 }
interface = fake-sled0
response = ComponentDetails(TlvPage { offset: 0, total: 1 })
|
| 3036 | 2026-01-14T21:22:53.254Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 218 }
interface = fake-sled1
response = ComponentDetails(TlvPage { offset: 0, total: 1 })
|
| 3037 | 2026-01-14T21:22:53.259Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 219 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-46" }, offset: 0 }) }
|
| 3038 | 2026-01-14T21:22:53.259Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 219 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-1" }, offset: 0 }) }
|
| 3039 | 2026-01-14T21:22:53.285Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-46" }): asked for number of component details
num_details = 1
slot = gimlet 0
|
| 3040 | 2026-01-14T21:22:53.285Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-46" }): asked for component details for a sensor
details = Measurement(Measurement { name: "CPU", kind: Temperature, value: Ok(64.5) })
index = 0
slot = gimlet 0
|
| 3041 | 2026-01-14T21:22:53.286Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-1" }): asked for number of component details
num_details = 1
slot = gimlet 1
|
| 3042 | 2026-01-14T21:22:53.287Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-1" }): asked for component details for a sensor
details = Measurement(Measurement { name: "South", kind: Temperature, value: Ok(42.5625) })
index = 0
slot = gimlet 1
|
| 3043 | 2026-01-14T21:22:53.302Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 219 }
interface = fake-sled0
response = ComponentDetails(TlvPage { offset: 0, total: 1 })
|
| 3044 | 2026-01-14T21:22:53.303Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 219 }
interface = fake-sled1
response = ComponentDetails(TlvPage { offset: 0, total: 1 })
|
| 3045 | 2026-01-14T21:22:53.306Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 220 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-8" }, offset: 0 }) }
|
| 3046 | 2026-01-14T21:22:53.306Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 220 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-7" }, offset: 0 }) }
|
| 3047 | 2026-01-14T21:22:53.309Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-8" }): asked for number of component details
num_details = 1
slot = gimlet 0
|
| 3048 | 2026-01-14T21:22:53.309Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-8" }): asked for component details for a sensor
details = Measurement(Measurement { name: "U2_N0", kind: Temperature, value: Ok(56.0) })
index = 0
slot = gimlet 0
|
| 3049 | 2026-01-14T21:22:53.309Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-7" }): asked for number of component details
num_details = 4
slot = gimlet 1
|
| 3050 | 2026-01-14T21:22:53.309Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor
details = Measurement(Measurement { name: "V12_U2A_A0", kind: Current, value: Ok(0.41893438) })
index = 0
slot = gimlet 1
|
| 3051 | 2026-01-14T21:22:53.309Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor
details = Measurement(Measurement { name: "V3P3_U2A_A0", kind: Current, value: Ok(0.025614602) })
index = 1
slot = gimlet 1
|
| 3052 | 2026-01-14T21:22:53.309Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor
details = Measurement(Measurement { name: "V12_U2A_A0", kind: Voltage, value: Ok(12.02914) })
index = 2
slot = gimlet 1
|
| 3053 | 2026-01-14T21:22:53.309Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor
details = Measurement(Measurement { name: "V3P3_U2A_A0", kind: Voltage, value: Ok(3.2618) })
index = 3
slot = gimlet 1
|
| 3054 | 2026-01-14T21:22:53.312Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 220 }
interface = fake-sled0
response = ComponentDetails(TlvPage { offset: 0, total: 1 })
|
| 3055 | 2026-01-14T21:22:53.313Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 220 }
interface = fake-sled1
response = ComponentDetails(TlvPage { offset: 0, total: 4 })
|
| 3056 | 2026-01-14T21:22:53.321Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 221 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-53" }, offset: 0 }) }
|
| 3057 | 2026-01-14T21:22:53.321Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 221 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-39" }, offset: 0 }) }
|
| 3058 | 2026-01-14T21:22:53.326Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for number of component details
num_details = 6
slot = gimlet 0
|
| 3059 | 2026-01-14T21:22:53.326Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Southeast", kind: Speed, value: Ok(2607.0) })
index = 0
slot = gimlet 0
|
| 3060 | 2026-01-14T21:22:53.326Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Northeast", kind: Speed, value: Ok(2476.0) })
index = 1
slot = gimlet 0
|
| 3061 | 2026-01-14T21:22:53.326Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor
details = Measurement(Measurement { name: "South", kind: Speed, value: Ok(2553.0) })
index = 2
slot = gimlet 0
|
| 3062 | 2026-01-14T21:22:53.326Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor
details = Measurement(Measurement { name: "North", kind: Speed, value: Ok(2265.0) })
index = 3
slot = gimlet 0
|
| 3063 | 2026-01-14T21:22:53.326Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Southwest", kind: Speed, value: Ok(2649.0) })
index = 4
slot = gimlet 0
|
| 3064 | 2026-01-14T21:22:53.326Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Northwest", kind: Speed, value: Ok(2275.0) })
index = 5
slot = gimlet 0
|
| 3065 | 2026-01-14T21:22:53.326Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-39" }): asked for number of component details
num_details = 1
slot = gimlet 1
|
| 3066 | 2026-01-14T21:22:53.326Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-39" }): asked for component details for a sensor
details = Measurement(Measurement { name: "t6", kind: Temperature, value: Ok(70.625) })
index = 0
slot = gimlet 1
|
| 3067 | 2026-01-14T21:22:53.338Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 221 }
interface = fake-sled0
response = ComponentDetails(TlvPage { offset: 0, total: 6 })
|
| 3068 | 2026-01-14T21:22:53.338Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 221 }
interface = fake-sled1
response = ComponentDetails(TlvPage { offset: 0, total: 1 })
|
| 3069 | 2026-01-14T21:22:53.346Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 222 }, kind: MgsRequest(SpState) }
|
| 3070 | 2026-01-14T21:22:53.346Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 222 }, kind: MgsRequest(SpState) }
|
| 3071 | 2026-01-14T21:22:53.353Z | DEBG | test_vpc_firewall: received state request
reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) }
slot = gimlet 0
|
| 3072 | 2026-01-14T21:22:53.353Z | DEBG | test_vpc_firewall: received state request
reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) }
slot = gimlet 1
|
| 3073 | 2026-01-14T21:22:53.354Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 222 }
interface = fake-sled0
response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
|
| 3074 | 2026-01-14T21:22:53.354Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 222 }
interface = fake-sled1
response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
|
| 3075 | 2026-01-14T21:22:53.355Z | TRAC | test_vpc_firewall (sensor-poller): polled SP successfully
chassis_type = Sled
num_samples = 17
sp_slot = 0
|
| 3076 | 2026-01-14T21:22:53.355Z | TRAC | test_vpc_firewall (sensor-poller): polled SP successfully
chassis_type = Sled
num_samples = 16
sp_slot = 1
|
| 3077 | 2026-01-14T21:22:53.436Z | TRAC | test_vpc_firewall (internal-dns-resolver): lookup_socket_v6 srv
dns_name = _nexus._tcp.control-plane.oxide.internal
|
| 3078 | 2026-01-14T21:22:53.440Z | WARN | test_vpc_firewall (producer-registration-task): failed to register with Nexus, will retry
count = 6
delay = 15.877203778s
error = "proto error: io error: No route to host (os error 148)"
file = oximeter/producer/src/lib.rs:371
|
| 3079 | 2026-01-14T21:22:53.596Z | TRAC | test_vpc_firewall (sensor-poller): interval elapsed, polling SP...
chassis_type = Switch
sp_slot = 1
|
| 3080 | 2026-01-14T21:22:53.596Z | TRAC | test_vpc_firewall (sensor-poller): interval elapsed, polling SP...
chassis_type = Switch
sp_slot = 0
|
| 3081 | 2026-01-14T21:22:53.596Z | TRAC | test_vpc_firewall (sensor-poller): interval elapsed, polling SP...
chassis_type = Sled
sp_slot = 0
|
| 3082 | 2026-01-14T21:22:53.596Z | TRAC | test_vpc_firewall (sensor-poller): interval elapsed, polling SP...
chassis_type = Sled
sp_slot = 1
|
| 3083 | 2026-01-14T21:22:53.596Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch1
request = Message { header: Header { version: 22, message_id: 115 }, kind: MgsRequest(SpState) }
|
| 3084 | 2026-01-14T21:22:53.596Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch0
request = Message { header: Header { version: 22, message_id: 147 }, kind: MgsRequest(SpState) }
|
| 3085 | 2026-01-14T21:22:53.596Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 223 }, kind: MgsRequest(SpState) }
|
| 3086 | 2026-01-14T21:22:53.596Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 223 }, kind: MgsRequest(SpState) }
|
| 3087 | 2026-01-14T21:22:53.609Z | DEBG | test_vpc_firewall: received state request
reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) }
slot = sidecar 0
|
| 3088 | 2026-01-14T21:22:53.609Z | DEBG | test_vpc_firewall: received state request
reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) }
slot = sidecar 1
|
| 3089 | 2026-01-14T21:22:53.609Z | DEBG | test_vpc_firewall: received state request
reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) }
slot = gimlet 0
|
| 3090 | 2026-01-14T21:22:53.610Z | DEBG | test_vpc_firewall: received state request
reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) }
slot = gimlet 1
|
| 3091 | 2026-01-14T21:22:53.611Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 147 }
interface = fake-switch0
response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
|
| 3092 | 2026-01-14T21:22:53.611Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 115 }
interface = fake-switch1
response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
|
| 3093 | 2026-01-14T21:22:53.611Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 223 }
interface = fake-sled0
response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
|
| 3094 | 2026-01-14T21:22:53.611Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 223 }
interface = fake-sled1
response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
|
| 3095 | 2026-01-14T21:22:53.611Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch0
request = Message { header: Header { version: 22, message_id: 148 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-0" }, offset: 0 }) }
|
| 3096 | 2026-01-14T21:22:53.611Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch1
request = Message { header: Header { version: 22, message_id: 116 }, kind: MgsRequest(SpState) }
|
| 3097 | 2026-01-14T21:22:53.612Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 224 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-1" }, offset: 0 }) }
|
| 3098 | 2026-01-14T21:22:53.612Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 224 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-8" }, offset: 0 }) }
|
| 3099 | 2026-01-14T21:22:53.612Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-0" }): asked for number of component details
num_details = 1
slot = sidecar 0
|
| 3100 | 2026-01-14T21:22:53.613Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-0" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Southwest", kind: Temperature, value: Ok(41.789063) })
index = 0
slot = sidecar 0
|
| 3101 | 2026-01-14T21:22:53.613Z | DEBG | test_vpc_firewall: received state request
reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) }
slot = sidecar 1
|
| 3102 | 2026-01-14T21:22:53.613Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-1" }): asked for number of component details
num_details = 1
slot = gimlet 0
|
| 3103 | 2026-01-14T21:22:53.614Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-1" }): asked for component details for a sensor
details = Measurement(Measurement { name: "South", kind: Temperature, value: Ok(42.5625) })
index = 0
slot = gimlet 0
|
| 3104 | 2026-01-14T21:22:53.614Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-8" }): asked for number of component details
num_details = 1
slot = gimlet 1
|
| 3105 | 2026-01-14T21:22:53.614Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-8" }): asked for component details for a sensor
details = Measurement(Measurement { name: "U2_N0", kind: Temperature, value: Ok(56.0) })
index = 0
slot = gimlet 1
|
| 3106 | 2026-01-14T21:22:53.614Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 148 }
interface = fake-switch0
response = ComponentDetails(TlvPage { offset: 0, total: 1 })
|
| 3107 | 2026-01-14T21:22:53.615Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 116 }
interface = fake-switch1
response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
|
| 3108 | 2026-01-14T21:22:53.615Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 224 }
interface = fake-sled0
response = ComponentDetails(TlvPage { offset: 0, total: 1 })
|
| 3109 | 2026-01-14T21:22:53.615Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 224 }
interface = fake-sled1
response = ComponentDetails(TlvPage { offset: 0, total: 1 })
|
| 3110 | 2026-01-14T21:22:53.617Z | TRAC | test_vpc_firewall (sensor-poller): polled SP, no samples returned
chassis_type = Switch
num_samples = 0
sp_slot = 1
|
| 3111 | 2026-01-14T21:22:53.618Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch0
request = Message { header: Header { version: 22, message_id: 149 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-1" }, offset: 0 }) }
|
| 3112 | 2026-01-14T21:22:53.619Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 225 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-2" }, offset: 0 }) }
|
| 3113 | 2026-01-14T21:22:53.619Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 225 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-46" }, offset: 0 }) }
|
| 3114 | 2026-01-14T21:22:53.619Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-1" }): asked for number of component details
num_details = 1
slot = sidecar 0
|
| 3115 | 2026-01-14T21:22:53.619Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-1" }): asked for component details for a sensor
details = Measurement(Measurement { name: "South", kind: Temperature, value: Err(DeviceError) })
index = 0
slot = sidecar 0
|
| 3116 | 2026-01-14T21:22:53.620Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-2" }): asked for number of component details
num_details = 1
slot = gimlet 0
|
| 3117 | 2026-01-14T21:22:53.620Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-2" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Southeast", kind: Temperature, value: Ok(41.570313) })
index = 0
slot = gimlet 0
|
| 3118 | 2026-01-14T21:22:53.620Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-46" }): asked for number of component details
num_details = 1
slot = gimlet 1
|
| 3119 | 2026-01-14T21:22:53.620Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-46" }): asked for component details for a sensor
details = Measurement(Measurement { name: "CPU", kind: Temperature, value: Ok(62.6) })
index = 0
slot = gimlet 1
|
| 3120 | 2026-01-14T21:22:53.620Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 149 }
interface = fake-switch0
response = ComponentDetails(TlvPage { offset: 0, total: 1 })
|
| 3121 | 2026-01-14T21:22:53.620Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 225 }
interface = fake-sled0
response = ComponentDetails(TlvPage { offset: 0, total: 1 })
|
| 3122 | 2026-01-14T21:22:53.620Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 225 }
interface = fake-sled1
response = ComponentDetails(TlvPage { offset: 0, total: 1 })
|
| 3123 | 2026-01-14T21:22:53.625Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch0
request = Message { header: Header { version: 22, message_id: 150 }, kind: MgsRequest(SpState) }
|
| 3124 | 2026-01-14T21:22:53.626Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 226 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-0" }, offset: 0 }) }
|
| 3125 | 2026-01-14T21:22:53.626Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 226 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-53" }, offset: 0 }) }
|
| 3126 | 2026-01-14T21:22:53.626Z | DEBG | test_vpc_firewall: received state request
reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) }
slot = sidecar 0
|
| 3127 | 2026-01-14T21:22:53.626Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-0" }): asked for number of component details
num_details = 1
slot = gimlet 0
|
| 3128 | 2026-01-14T21:22:53.626Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-0" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Southwest", kind: Temperature, value: Err(DeviceError) })
index = 0
slot = gimlet 0
|
| 3129 | 2026-01-14T21:22:53.626Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for number of component details
num_details = 6
slot = gimlet 1
|
| 3130 | 2026-01-14T21:22:53.626Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Southeast", kind: Speed, value: Ok(2510.0) })
index = 0
slot = gimlet 1
|
| 3131 | 2026-01-14T21:22:53.626Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Northeast", kind: Speed, value: Ok(2390.0) })
index = 1
slot = gimlet 1
|
| 3132 | 2026-01-14T21:22:53.626Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor
details = Measurement(Measurement { name: "South", kind: Speed, value: Ok(2467.0) })
index = 2
slot = gimlet 1
|
| 3133 | 2026-01-14T21:22:53.626Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor
details = Measurement(Measurement { name: "North", kind: Speed, value: Ok(2195.0) })
index = 3
slot = gimlet 1
|
| 3134 | 2026-01-14T21:22:53.626Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Southwest", kind: Speed, value: Ok(2680.0) })
index = 4
slot = gimlet 1
|
| 3135 | 2026-01-14T21:22:53.626Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Northwest", kind: Speed, value: Ok(2212.0) })
index = 5
slot = gimlet 1
|
| 3136 | 2026-01-14T21:22:53.626Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 150 }
interface = fake-switch0
response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
|
| 3137 | 2026-01-14T21:22:53.627Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 226 }
interface = fake-sled0
response = ComponentDetails(TlvPage { offset: 0, total: 1 })
|
| 3138 | 2026-01-14T21:22:53.627Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 226 }
interface = fake-sled1
response = ComponentDetails(TlvPage { offset: 0, total: 6 })
|
| 3139 | 2026-01-14T21:22:53.627Z | TRAC | test_vpc_firewall (sensor-poller): polled SP successfully
chassis_type = Switch
num_samples = 3
sp_slot = 0
|
| 3140 | 2026-01-14T21:22:53.634Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 227 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-7" }, offset: 0 }) }
|
| 3141 | 2026-01-14T21:22:53.634Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 227 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-0" }, offset: 0 }) }
|
| 3142 | 2026-01-14T21:22:53.634Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-7" }): asked for number of component details
num_details = 4
slot = gimlet 0
|
| 3143 | 2026-01-14T21:22:53.635Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor
details = Measurement(Measurement { name: "V12_U2A_A0", kind: Current, value: Ok(0.45898438) })
index = 0
slot = gimlet 0
|
| 3144 | 2026-01-14T21:22:53.635Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor
details = Measurement(Measurement { name: "V3P3_U2A_A0", kind: Current, value: Ok(0.024414063) })
index = 1
slot = gimlet 0
|
| 3145 | 2026-01-14T21:22:53.635Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor
details = Measurement(Measurement { name: "V12_U2A_A0", kind: Voltage, value: Ok(12.03125) })
index = 2
slot = gimlet 0
|
| 3146 | 2026-01-14T21:22:53.635Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor
details = Measurement(Measurement { name: "V3P3_U2A_A0", kind: Voltage, value: Ok(3.328125) })
index = 3
slot = gimlet 0
|
| 3147 | 2026-01-14T21:22:53.635Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-0" }): asked for number of component details
num_details = 1
slot = gimlet 1
|
| 3148 | 2026-01-14T21:22:53.635Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-0" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Southwest", kind: Temperature, value: Ok(41.3629) })
index = 0
slot = gimlet 1
|
| 3149 | 2026-01-14T21:22:53.635Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 227 }
interface = fake-sled0
response = ComponentDetails(TlvPage { offset: 0, total: 4 })
|
| 3150 | 2026-01-14T21:22:53.635Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 227 }
interface = fake-sled1
response = ComponentDetails(TlvPage { offset: 0, total: 1 })
|
| 3151 | 2026-01-14T21:22:53.638Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 228 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-39" }, offset: 0 }) }
|
| 3152 | 2026-01-14T21:22:53.638Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 228 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-2" }, offset: 0 }) }
|
| 3153 | 2026-01-14T21:22:53.638Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-39" }): asked for number of component details
num_details = 1
slot = gimlet 0
|
| 3154 | 2026-01-14T21:22:53.638Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-39" }): asked for component details for a sensor
details = Measurement(Measurement { name: "t6", kind: Temperature, value: Ok(70.625) })
index = 0
slot = gimlet 0
|
| 3155 | 2026-01-14T21:22:53.638Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-2" }): asked for number of component details
num_details = 1
slot = gimlet 1
|
| 3156 | 2026-01-14T21:22:53.638Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-2" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Southeast", kind: Temperature, value: Ok(41.570313) })
index = 0
slot = gimlet 1
|
| 3157 | 2026-01-14T21:22:53.639Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 228 }
interface = fake-sled0
response = ComponentDetails(TlvPage { offset: 0, total: 1 })
|
| 3158 | 2026-01-14T21:22:53.639Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 228 }
interface = fake-sled1
response = ComponentDetails(TlvPage { offset: 0, total: 1 })
|
| 3159 | 2026-01-14T21:22:53.640Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 229 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-46" }, offset: 0 }) }
|
| 3160 | 2026-01-14T21:22:53.640Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 229 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-1" }, offset: 0 }) }
|
| 3161 | 2026-01-14T21:22:53.640Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-46" }): asked for number of component details
num_details = 1
slot = gimlet 0
|
| 3162 | 2026-01-14T21:22:53.640Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-46" }): asked for component details for a sensor
details = Measurement(Measurement { name: "CPU", kind: Temperature, value: Ok(64.5) })
index = 0
slot = gimlet 0
|
| 3163 | 2026-01-14T21:22:53.640Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-1" }): asked for number of component details
num_details = 1
slot = gimlet 1
|
| 3164 | 2026-01-14T21:22:53.640Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-1" }): asked for component details for a sensor
details = Measurement(Measurement { name: "South", kind: Temperature, value: Ok(42.5625) })
index = 0
slot = gimlet 1
|
| 3165 | 2026-01-14T21:22:53.640Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 229 }
interface = fake-sled0
response = ComponentDetails(TlvPage { offset: 0, total: 1 })
|
| 3166 | 2026-01-14T21:22:53.640Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 229 }
interface = fake-sled1
response = ComponentDetails(TlvPage { offset: 0, total: 1 })
|
| 3167 | 2026-01-14T21:22:53.642Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 230 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-8" }, offset: 0 }) }
|
| 3168 | 2026-01-14T21:22:53.642Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 230 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-7" }, offset: 0 }) }
|
| 3169 | 2026-01-14T21:22:53.642Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-8" }): asked for number of component details
num_details = 1
slot = gimlet 0
|
| 3170 | 2026-01-14T21:22:53.642Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-8" }): asked for component details for a sensor
details = Measurement(Measurement { name: "U2_N0", kind: Temperature, value: Ok(56.0) })
index = 0
slot = gimlet 0
|
| 3171 | 2026-01-14T21:22:53.642Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-7" }): asked for number of component details
num_details = 4
slot = gimlet 1
|
| 3172 | 2026-01-14T21:22:53.642Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor
details = Measurement(Measurement { name: "V12_U2A_A0", kind: Current, value: Ok(0.41893438) })
index = 0
slot = gimlet 1
|
| 3173 | 2026-01-14T21:22:53.642Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor
details = Measurement(Measurement { name: "V3P3_U2A_A0", kind: Current, value: Ok(0.025614602) })
index = 1
slot = gimlet 1
|
| 3174 | 2026-01-14T21:22:53.642Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor
details = Measurement(Measurement { name: "V12_U2A_A0", kind: Voltage, value: Ok(12.02914) })
index = 2
slot = gimlet 1
|
| 3175 | 2026-01-14T21:22:53.642Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor
details = Measurement(Measurement { name: "V3P3_U2A_A0", kind: Voltage, value: Ok(3.2618) })
index = 3
slot = gimlet 1
|
| 3176 | 2026-01-14T21:22:53.642Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 230 }
interface = fake-sled0
response = ComponentDetails(TlvPage { offset: 0, total: 1 })
|
| 3177 | 2026-01-14T21:22:53.642Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 230 }
interface = fake-sled1
response = ComponentDetails(TlvPage { offset: 0, total: 4 })
|
| 3178 | 2026-01-14T21:22:53.647Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 231 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-53" }, offset: 0 }) }
|
| 3179 | 2026-01-14T21:22:53.647Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 231 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-39" }, offset: 0 }) }
|
| 3180 | 2026-01-14T21:22:53.648Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for number of component details
num_details = 6
slot = gimlet 0
|
| 3181 | 2026-01-14T21:22:53.648Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Southeast", kind: Speed, value: Ok(2607.0) })
index = 0
slot = gimlet 0
|
| 3182 | 2026-01-14T21:22:53.648Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Northeast", kind: Speed, value: Ok(2476.0) })
index = 1
slot = gimlet 0
|
| 3183 | 2026-01-14T21:22:53.648Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor
details = Measurement(Measurement { name: "South", kind: Speed, value: Ok(2553.0) })
index = 2
slot = gimlet 0
|
| 3184 | 2026-01-14T21:22:53.648Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor
details = Measurement(Measurement { name: "North", kind: Speed, value: Ok(2265.0) })
index = 3
slot = gimlet 0
|
| 3185 | 2026-01-14T21:22:53.648Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Southwest", kind: Speed, value: Ok(2649.0) })
index = 4
slot = gimlet 0
|
| 3186 | 2026-01-14T21:22:53.648Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Northwest", kind: Speed, value: Ok(2275.0) })
index = 5
slot = gimlet 0
|
| 3187 | 2026-01-14T21:22:53.648Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-39" }): asked for number of component details
num_details = 1
slot = gimlet 1
|
| 3188 | 2026-01-14T21:22:53.648Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-39" }): asked for component details for a sensor
details = Measurement(Measurement { name: "t6", kind: Temperature, value: Ok(70.625) })
index = 0
slot = gimlet 1
|
| 3189 | 2026-01-14T21:22:53.648Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 231 }
interface = fake-sled0
response = ComponentDetails(TlvPage { offset: 0, total: 6 })
|
| 3190 | 2026-01-14T21:22:53.648Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 231 }
interface = fake-sled1
response = ComponentDetails(TlvPage { offset: 0, total: 1 })
|
| 3191 | 2026-01-14T21:22:53.653Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 232 }, kind: MgsRequest(SpState) }
|
| 3192 | 2026-01-14T21:22:53.653Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 232 }, kind: MgsRequest(SpState) }
|
| 3193 | 2026-01-14T21:22:53.653Z | DEBG | test_vpc_firewall: received state request
reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) }
slot = gimlet 0
|
| 3194 | 2026-01-14T21:22:53.653Z | DEBG | test_vpc_firewall: received state request
reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) }
slot = gimlet 1
|
| 3195 | 2026-01-14T21:22:53.654Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 232 }
interface = fake-sled0
response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
|
| 3196 | 2026-01-14T21:22:53.654Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 232 }
interface = fake-sled1
response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
|
| 3197 | 2026-01-14T21:22:53.654Z | TRAC | test_vpc_firewall (sensor-poller): polled SP successfully
chassis_type = Sled
num_samples = 17
sp_slot = 0
|
| 3198 | 2026-01-14T21:22:53.654Z | TRAC | test_vpc_firewall (sensor-poller): polled SP successfully
chassis_type = Sled
num_samples = 16
sp_slot = 1
|
| 3199 | 2026-01-14T21:22:54.596Z | TRAC | test_vpc_firewall (sensor-poller): interval elapsed, polling SP...
chassis_type = Switch
sp_slot = 1
|
| 3200 | 2026-01-14T21:22:54.596Z | TRAC | test_vpc_firewall (sensor-poller): interval elapsed, polling SP...
chassis_type = Switch
sp_slot = 0
|
| 3201 | 2026-01-14T21:22:54.596Z | TRAC | test_vpc_firewall (sensor-poller): interval elapsed, polling SP...
chassis_type = Sled
sp_slot = 0
|
| 3202 | 2026-01-14T21:22:54.596Z | TRAC | test_vpc_firewall (sensor-poller): interval elapsed, polling SP...
chassis_type = Sled
sp_slot = 1
|
| 3203 | 2026-01-14T21:22:54.596Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch1
request = Message { header: Header { version: 22, message_id: 117 }, kind: MgsRequest(SpState) }
|
| 3204 | 2026-01-14T21:22:54.596Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch0
request = Message { header: Header { version: 22, message_id: 151 }, kind: MgsRequest(SpState) }
|
| 3205 | 2026-01-14T21:22:54.596Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 233 }, kind: MgsRequest(SpState) }
|
| 3206 | 2026-01-14T21:22:54.596Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 233 }, kind: MgsRequest(SpState) }
|
| 3207 | 2026-01-14T21:22:54.596Z | DEBG | test_vpc_firewall: received state request
reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) }
slot = sidecar 0
|
| 3208 | 2026-01-14T21:22:54.596Z | DEBG | test_vpc_firewall: received state request
reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) }
slot = sidecar 1
|
| 3209 | 2026-01-14T21:22:54.597Z | DEBG | test_vpc_firewall: received state request
reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) }
slot = gimlet 0
|
| 3210 | 2026-01-14T21:22:54.597Z | DEBG | test_vpc_firewall: received state request
reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) }
slot = gimlet 1
|
| 3211 | 2026-01-14T21:22:54.597Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 151 }
interface = fake-switch0
response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
|
| 3212 | 2026-01-14T21:22:54.597Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 117 }
interface = fake-switch1
response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
|
| 3213 | 2026-01-14T21:22:54.597Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 233 }
interface = fake-sled0
response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
|
| 3214 | 2026-01-14T21:22:54.597Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 233 }
interface = fake-sled1
response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
|
| 3215 | 2026-01-14T21:22:54.597Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch0
request = Message { header: Header { version: 22, message_id: 152 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-0" }, offset: 0 }) }
|
| 3216 | 2026-01-14T21:22:54.597Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch1
request = Message { header: Header { version: 22, message_id: 118 }, kind: MgsRequest(SpState) }
|
| 3217 | 2026-01-14T21:22:54.597Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 234 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-1" }, offset: 0 }) }
|
| 3218 | 2026-01-14T21:22:54.597Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 234 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-8" }, offset: 0 }) }
|
| 3219 | 2026-01-14T21:22:54.597Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-0" }): asked for number of component details
num_details = 1
slot = sidecar 0
|
| 3220 | 2026-01-14T21:22:54.597Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-0" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Southwest", kind: Temperature, value: Ok(41.789063) })
index = 0
slot = sidecar 0
|
| 3221 | 2026-01-14T21:22:54.597Z | DEBG | test_vpc_firewall: received state request
reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) }
slot = sidecar 1
|
| 3222 | 2026-01-14T21:22:54.597Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-1" }): asked for number of component details
num_details = 1
slot = gimlet 0
|
| 3223 | 2026-01-14T21:22:54.597Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-1" }): asked for component details for a sensor
details = Measurement(Measurement { name: "South", kind: Temperature, value: Ok(42.5625) })
index = 0
slot = gimlet 0
|
| 3224 | 2026-01-14T21:22:54.598Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-8" }): asked for number of component details
num_details = 1
slot = gimlet 1
|
| 3225 | 2026-01-14T21:22:54.598Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-8" }): asked for component details for a sensor
details = Measurement(Measurement { name: "U2_N0", kind: Temperature, value: Ok(56.0) })
index = 0
slot = gimlet 1
|
| 3226 | 2026-01-14T21:22:54.610Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 152 }
interface = fake-switch0
response = ComponentDetails(TlvPage { offset: 0, total: 1 })
|
| 3227 | 2026-01-14T21:22:54.611Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 118 }
interface = fake-switch1
response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
|
| 3228 | 2026-01-14T21:22:54.611Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 234 }
interface = fake-sled0
response = ComponentDetails(TlvPage { offset: 0, total: 1 })
|
| 3229 | 2026-01-14T21:22:54.611Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 234 }
interface = fake-sled1
response = ComponentDetails(TlvPage { offset: 0, total: 1 })
|
| 3230 | 2026-01-14T21:22:54.612Z | TRAC | test_vpc_firewall (sensor-poller): polled SP, no samples returned
chassis_type = Switch
num_samples = 0
sp_slot = 1
|
| 3231 | 2026-01-14T21:22:54.614Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch0
request = Message { header: Header { version: 22, message_id: 153 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-1" }, offset: 0 }) }
|
| 3232 | 2026-01-14T21:22:54.615Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 235 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-2" }, offset: 0 }) }
|
| 3233 | 2026-01-14T21:22:54.615Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 235 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-46" }, offset: 0 }) }
|
| 3234 | 2026-01-14T21:22:54.615Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-1" }): asked for number of component details
num_details = 1
slot = sidecar 0
|
| 3235 | 2026-01-14T21:22:54.615Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-1" }): asked for component details for a sensor
details = Measurement(Measurement { name: "South", kind: Temperature, value: Err(DeviceError) })
index = 0
slot = sidecar 0
|
| 3236 | 2026-01-14T21:22:54.615Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-2" }): asked for number of component details
num_details = 1
slot = gimlet 0
|
| 3237 | 2026-01-14T21:22:54.615Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-2" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Southeast", kind: Temperature, value: Ok(41.570313) })
index = 0
slot = gimlet 0
|
| 3238 | 2026-01-14T21:22:54.615Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-46" }): asked for number of component details
num_details = 1
slot = gimlet 1
|
| 3239 | 2026-01-14T21:22:54.616Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-46" }): asked for component details for a sensor
details = Measurement(Measurement { name: "CPU", kind: Temperature, value: Ok(62.6) })
index = 0
slot = gimlet 1
|
| 3240 | 2026-01-14T21:22:54.619Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 153 }
interface = fake-switch0
response = ComponentDetails(TlvPage { offset: 0, total: 1 })
|
| 3241 | 2026-01-14T21:22:54.619Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 235 }
interface = fake-sled0
response = ComponentDetails(TlvPage { offset: 0, total: 1 })
|
| 3242 | 2026-01-14T21:22:54.619Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 235 }
interface = fake-sled1
response = ComponentDetails(TlvPage { offset: 0, total: 1 })
|
| 3243 | 2026-01-14T21:22:54.622Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch0
request = Message { header: Header { version: 22, message_id: 154 }, kind: MgsRequest(SpState) }
|
| 3244 | 2026-01-14T21:22:54.622Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 236 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-0" }, offset: 0 }) }
|
| 3245 | 2026-01-14T21:22:54.622Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 236 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-53" }, offset: 0 }) }
|
| 3246 | 2026-01-14T21:22:54.624Z | DEBG | test_vpc_firewall: received state request
reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) }
slot = sidecar 0
|
| 3247 | 2026-01-14T21:22:54.625Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-0" }): asked for number of component details
num_details = 1
slot = gimlet 0
|
| 3248 | 2026-01-14T21:22:54.625Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-0" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Southwest", kind: Temperature, value: Err(DeviceError) })
index = 0
slot = gimlet 0
|
| 3249 | 2026-01-14T21:22:54.625Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for number of component details
num_details = 6
slot = gimlet 1
|
| 3250 | 2026-01-14T21:22:54.625Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Southeast", kind: Speed, value: Ok(2510.0) })
index = 0
slot = gimlet 1
|
| 3251 | 2026-01-14T21:22:54.625Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Northeast", kind: Speed, value: Ok(2390.0) })
index = 1
slot = gimlet 1
|
| 3252 | 2026-01-14T21:22:54.625Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor
details = Measurement(Measurement { name: "South", kind: Speed, value: Ok(2467.0) })
index = 2
slot = gimlet 1
|
| 3253 | 2026-01-14T21:22:54.625Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor
details = Measurement(Measurement { name: "North", kind: Speed, value: Ok(2195.0) })
index = 3
slot = gimlet 1
|
| 3254 | 2026-01-14T21:22:54.625Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Southwest", kind: Speed, value: Ok(2680.0) })
index = 4
slot = gimlet 1
|
| 3255 | 2026-01-14T21:22:54.625Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Northwest", kind: Speed, value: Ok(2212.0) })
index = 5
slot = gimlet 1
|
| 3256 | 2026-01-14T21:22:54.627Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 154 }
interface = fake-switch0
response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
|
| 3257 | 2026-01-14T21:22:54.628Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 236 }
interface = fake-sled0
response = ComponentDetails(TlvPage { offset: 0, total: 1 })
|
| 3258 | 2026-01-14T21:22:54.628Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 236 }
interface = fake-sled1
response = ComponentDetails(TlvPage { offset: 0, total: 6 })
|
| 3259 | 2026-01-14T21:22:54.628Z | TRAC | test_vpc_firewall (sensor-poller): polled SP successfully
chassis_type = Switch
num_samples = 3
sp_slot = 0
|
| 3260 | 2026-01-14T21:22:54.633Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 237 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-7" }, offset: 0 }) }
|
| 3261 | 2026-01-14T21:22:54.633Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 237 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-0" }, offset: 0 }) }
|
| 3262 | 2026-01-14T21:22:54.633Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-7" }): asked for number of component details
num_details = 4
slot = gimlet 0
|
| 3263 | 2026-01-14T21:22:54.634Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor
details = Measurement(Measurement { name: "V12_U2A_A0", kind: Current, value: Ok(0.45898438) })
index = 0
slot = gimlet 0
|
| 3264 | 2026-01-14T21:22:54.634Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor
details = Measurement(Measurement { name: "V3P3_U2A_A0", kind: Current, value: Ok(0.024414063) })
index = 1
slot = gimlet 0
|
| 3265 | 2026-01-14T21:22:54.634Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor
details = Measurement(Measurement { name: "V12_U2A_A0", kind: Voltage, value: Ok(12.03125) })
index = 2
slot = gimlet 0
|
| 3266 | 2026-01-14T21:22:54.634Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor
details = Measurement(Measurement { name: "V3P3_U2A_A0", kind: Voltage, value: Ok(3.328125) })
index = 3
slot = gimlet 0
|
| 3267 | 2026-01-14T21:22:54.634Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-0" }): asked for number of component details
num_details = 1
slot = gimlet 1
|
| 3268 | 2026-01-14T21:22:54.634Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-0" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Southwest", kind: Temperature, value: Ok(41.3629) })
index = 0
slot = gimlet 1
|
| 3269 | 2026-01-14T21:22:54.638Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 237 }
interface = fake-sled0
response = ComponentDetails(TlvPage { offset: 0, total: 4 })
|
| 3270 | 2026-01-14T21:22:54.638Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 237 }
interface = fake-sled1
response = ComponentDetails(TlvPage { offset: 0, total: 1 })
|
| 3271 | 2026-01-14T21:22:54.644Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 238 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-39" }, offset: 0 }) }
|
| 3272 | 2026-01-14T21:22:54.644Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 238 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-2" }, offset: 0 }) }
|
| 3273 | 2026-01-14T21:22:54.644Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-39" }): asked for number of component details
num_details = 1
slot = gimlet 0
|
| 3274 | 2026-01-14T21:22:54.644Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-39" }): asked for component details for a sensor
details = Measurement(Measurement { name: "t6", kind: Temperature, value: Ok(70.625) })
index = 0
slot = gimlet 0
|
| 3275 | 2026-01-14T21:22:54.644Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-2" }): asked for number of component details
num_details = 1
slot = gimlet 1
|
| 3276 | 2026-01-14T21:22:54.644Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-2" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Southeast", kind: Temperature, value: Ok(41.570313) })
index = 0
slot = gimlet 1
|
| 3277 | 2026-01-14T21:22:54.647Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 238 }
interface = fake-sled0
response = ComponentDetails(TlvPage { offset: 0, total: 1 })
|
| 3278 | 2026-01-14T21:22:54.647Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 238 }
interface = fake-sled1
response = ComponentDetails(TlvPage { offset: 0, total: 1 })
|
| 3279 | 2026-01-14T21:22:54.652Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 239 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-46" }, offset: 0 }) }
|
| 3280 | 2026-01-14T21:22:54.652Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 239 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-1" }, offset: 0 }) }
|
| 3281 | 2026-01-14T21:22:54.652Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-46" }): asked for number of component details
num_details = 1
slot = gimlet 0
|
| 3282 | 2026-01-14T21:22:54.652Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-46" }): asked for component details for a sensor
details = Measurement(Measurement { name: "CPU", kind: Temperature, value: Ok(64.5) })
index = 0
slot = gimlet 0
|
| 3283 | 2026-01-14T21:22:54.652Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-1" }): asked for number of component details
num_details = 1
slot = gimlet 1
|
| 3284 | 2026-01-14T21:22:54.652Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-1" }): asked for component details for a sensor
details = Measurement(Measurement { name: "South", kind: Temperature, value: Ok(42.5625) })
index = 0
slot = gimlet 1
|
| 3285 | 2026-01-14T21:22:54.653Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 239 }
interface = fake-sled0
response = ComponentDetails(TlvPage { offset: 0, total: 1 })
|
| 3286 | 2026-01-14T21:22:54.653Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 239 }
interface = fake-sled1
response = ComponentDetails(TlvPage { offset: 0, total: 1 })
|
| 3287 | 2026-01-14T21:22:54.656Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 240 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-8" }, offset: 0 }) }
|
| 3288 | 2026-01-14T21:22:54.656Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 240 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-7" }, offset: 0 }) }
|
| 3289 | 2026-01-14T21:22:54.656Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-8" }): asked for number of component details
num_details = 1
slot = gimlet 0
|
| 3290 | 2026-01-14T21:22:54.656Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-8" }): asked for component details for a sensor
details = Measurement(Measurement { name: "U2_N0", kind: Temperature, value: Ok(56.0) })
index = 0
slot = gimlet 0
|
| 3291 | 2026-01-14T21:22:54.656Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-7" }): asked for number of component details
num_details = 4
slot = gimlet 1
|
| 3292 | 2026-01-14T21:22:54.656Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor
details = Measurement(Measurement { name: "V12_U2A_A0", kind: Current, value: Ok(0.41893438) })
index = 0
slot = gimlet 1
|
| 3293 | 2026-01-14T21:22:54.656Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor
details = Measurement(Measurement { name: "V3P3_U2A_A0", kind: Current, value: Ok(0.025614602) })
index = 1
slot = gimlet 1
|
| 3294 | 2026-01-14T21:22:54.656Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor
details = Measurement(Measurement { name: "V12_U2A_A0", kind: Voltage, value: Ok(12.02914) })
index = 2
slot = gimlet 1
|
| 3295 | 2026-01-14T21:22:54.656Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor
details = Measurement(Measurement { name: "V3P3_U2A_A0", kind: Voltage, value: Ok(3.2618) })
index = 3
slot = gimlet 1
|
| 3296 | 2026-01-14T21:22:54.657Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 240 }
interface = fake-sled0
response = ComponentDetails(TlvPage { offset: 0, total: 1 })
|
| 3297 | 2026-01-14T21:22:54.657Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 240 }
interface = fake-sled1
response = ComponentDetails(TlvPage { offset: 0, total: 4 })
|
| 3298 | 2026-01-14T21:22:54.661Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 241 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-53" }, offset: 0 }) }
|
| 3299 | 2026-01-14T21:22:54.661Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 241 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-39" }, offset: 0 }) }
|
| 3300 | 2026-01-14T21:22:54.662Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for number of component details
num_details = 6
slot = gimlet 0
|
| 3301 | 2026-01-14T21:22:54.662Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Southeast", kind: Speed, value: Ok(2607.0) })
index = 0
slot = gimlet 0
|
| 3302 | 2026-01-14T21:22:54.662Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Northeast", kind: Speed, value: Ok(2476.0) })
index = 1
slot = gimlet 0
|
| 3303 | 2026-01-14T21:22:54.662Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor
details = Measurement(Measurement { name: "South", kind: Speed, value: Ok(2553.0) })
index = 2
slot = gimlet 0
|
| 3304 | 2026-01-14T21:22:54.662Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor
details = Measurement(Measurement { name: "North", kind: Speed, value: Ok(2265.0) })
index = 3
slot = gimlet 0
|
| 3305 | 2026-01-14T21:22:54.662Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Southwest", kind: Speed, value: Ok(2649.0) })
index = 4
slot = gimlet 0
|
| 3306 | 2026-01-14T21:22:54.662Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Northwest", kind: Speed, value: Ok(2275.0) })
index = 5
slot = gimlet 0
|
| 3307 | 2026-01-14T21:22:54.662Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-39" }): asked for number of component details
num_details = 1
slot = gimlet 1
|
| 3308 | 2026-01-14T21:22:54.662Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-39" }): asked for component details for a sensor
details = Measurement(Measurement { name: "t6", kind: Temperature, value: Ok(70.625) })
index = 0
slot = gimlet 1
|
| 3309 | 2026-01-14T21:22:54.662Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 241 }
interface = fake-sled0
response = ComponentDetails(TlvPage { offset: 0, total: 6 })
|
| 3310 | 2026-01-14T21:22:54.662Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 241 }
interface = fake-sled1
response = ComponentDetails(TlvPage { offset: 0, total: 1 })
|
| 3311 | 2026-01-14T21:22:54.668Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 242 }, kind: MgsRequest(SpState) }
|
| 3312 | 2026-01-14T21:22:54.668Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 242 }, kind: MgsRequest(SpState) }
|
| 3313 | 2026-01-14T21:22:54.668Z | DEBG | test_vpc_firewall: received state request
reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) }
slot = gimlet 0
|
| 3314 | 2026-01-14T21:22:54.668Z | DEBG | test_vpc_firewall: received state request
reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) }
slot = gimlet 1
|
| 3315 | 2026-01-14T21:22:54.670Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 242 }
interface = fake-sled0
response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
|
| 3316 | 2026-01-14T21:22:54.670Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 242 }
interface = fake-sled1
response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
|
| 3317 | 2026-01-14T21:22:54.670Z | TRAC | test_vpc_firewall (sensor-poller): polled SP successfully
chassis_type = Sled
num_samples = 17
sp_slot = 0
|
| 3318 | 2026-01-14T21:22:54.670Z | TRAC | test_vpc_firewall (sensor-poller): polled SP successfully
chassis_type = Sled
num_samples = 16
sp_slot = 1
|
| 3319 | 2026-01-14T21:22:55.608Z | TRAC | test_vpc_firewall (sensor-poller): interval elapsed, polling SP...
chassis_type = Switch
sp_slot = 1
|
| 3320 | 2026-01-14T21:22:55.608Z | TRAC | test_vpc_firewall (sensor-poller): interval elapsed, polling SP...
chassis_type = Switch
sp_slot = 0
|
| 3321 | 2026-01-14T21:22:55.608Z | TRAC | test_vpc_firewall (sensor-poller): interval elapsed, polling SP...
chassis_type = Sled
sp_slot = 0
|
| 3322 | 2026-01-14T21:22:55.609Z | TRAC | test_vpc_firewall (sensor-poller): interval elapsed, polling SP...
chassis_type = Sled
sp_slot = 1
|
| 3323 | 2026-01-14T21:22:55.609Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch1
request = Message { header: Header { version: 22, message_id: 119 }, kind: MgsRequest(SpState) }
|
| 3324 | 2026-01-14T21:22:55.609Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch0
request = Message { header: Header { version: 22, message_id: 155 }, kind: MgsRequest(SpState) }
|
| 3325 | 2026-01-14T21:22:55.609Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 243 }, kind: MgsRequest(SpState) }
|
| 3326 | 2026-01-14T21:22:55.609Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 243 }, kind: MgsRequest(SpState) }
|
| 3327 | 2026-01-14T21:22:55.610Z | DEBG | test_vpc_firewall: received state request
reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) }
slot = sidecar 0
|
| 3328 | 2026-01-14T21:22:55.610Z | DEBG | test_vpc_firewall: received state request
reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) }
slot = sidecar 1
|
| 3329 | 2026-01-14T21:22:55.610Z | DEBG | test_vpc_firewall: received state request
reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) }
slot = gimlet 0
|
| 3330 | 2026-01-14T21:22:55.610Z | DEBG | test_vpc_firewall: received state request
reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) }
slot = gimlet 1
|
| 3331 | 2026-01-14T21:22:55.611Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 155 }
interface = fake-switch0
response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
|
| 3332 | 2026-01-14T21:22:55.611Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 119 }
interface = fake-switch1
response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
|
| 3333 | 2026-01-14T21:22:55.611Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 243 }
interface = fake-sled0
response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
|
| 3334 | 2026-01-14T21:22:55.611Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 243 }
interface = fake-sled1
response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
|
| 3335 | 2026-01-14T21:22:55.611Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch0
request = Message { header: Header { version: 22, message_id: 156 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-0" }, offset: 0 }) }
|
| 3336 | 2026-01-14T21:22:55.611Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch1
request = Message { header: Header { version: 22, message_id: 120 }, kind: MgsRequest(SpState) }
|
| 3337 | 2026-01-14T21:22:55.611Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 244 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-1" }, offset: 0 }) }
|
| 3338 | 2026-01-14T21:22:55.611Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 244 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-8" }, offset: 0 }) }
|
| 3339 | 2026-01-14T21:22:55.611Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-0" }): asked for number of component details
num_details = 1
slot = sidecar 0
|
| 3340 | 2026-01-14T21:22:55.611Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-0" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Southwest", kind: Temperature, value: Ok(41.789063) })
index = 0
slot = sidecar 0
|
| 3341 | 2026-01-14T21:22:55.612Z | DEBG | test_vpc_firewall: received state request
reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) }
slot = sidecar 1
|
| 3342 | 2026-01-14T21:22:55.612Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-1" }): asked for number of component details
num_details = 1
slot = gimlet 0
|
| 3343 | 2026-01-14T21:22:55.612Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-1" }): asked for component details for a sensor
details = Measurement(Measurement { name: "South", kind: Temperature, value: Ok(42.5625) })
index = 0
slot = gimlet 0
|
| 3344 | 2026-01-14T21:22:55.612Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-8" }): asked for number of component details
num_details = 1
slot = gimlet 1
|
| 3345 | 2026-01-14T21:22:55.612Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-8" }): asked for component details for a sensor
details = Measurement(Measurement { name: "U2_N0", kind: Temperature, value: Ok(56.0) })
index = 0
slot = gimlet 1
|
| 3346 | 2026-01-14T21:22:55.612Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 156 }
interface = fake-switch0
response = ComponentDetails(TlvPage { offset: 0, total: 1 })
|
| 3347 | 2026-01-14T21:22:55.612Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 120 }
interface = fake-switch1
response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
|
| 3348 | 2026-01-14T21:22:55.612Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 244 }
interface = fake-sled0
response = ComponentDetails(TlvPage { offset: 0, total: 1 })
|
| 3349 | 2026-01-14T21:22:55.612Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 244 }
interface = fake-sled1
response = ComponentDetails(TlvPage { offset: 0, total: 1 })
|
| 3350 | 2026-01-14T21:22:55.613Z | TRAC | test_vpc_firewall (sensor-poller): polled SP, no samples returned
chassis_type = Switch
num_samples = 0
sp_slot = 1
|
| 3351 | 2026-01-14T21:22:55.617Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch0
request = Message { header: Header { version: 22, message_id: 157 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-1" }, offset: 0 }) }
|
| 3352 | 2026-01-14T21:22:55.617Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 245 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-2" }, offset: 0 }) }
|
| 3353 | 2026-01-14T21:22:55.617Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 245 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-46" }, offset: 0 }) }
|
| 3354 | 2026-01-14T21:22:55.619Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-1" }): asked for number of component details
num_details = 1
slot = sidecar 0
|
| 3355 | 2026-01-14T21:22:55.619Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-1" }): asked for component details for a sensor
details = Measurement(Measurement { name: "South", kind: Temperature, value: Err(DeviceError) })
index = 0
slot = sidecar 0
|
| 3356 | 2026-01-14T21:22:55.619Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-2" }): asked for number of component details
num_details = 1
slot = gimlet 0
|
| 3357 | 2026-01-14T21:22:55.619Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-2" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Southeast", kind: Temperature, value: Ok(41.570313) })
index = 0
slot = gimlet 0
|
| 3358 | 2026-01-14T21:22:55.619Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-46" }): asked for number of component details
num_details = 1
slot = gimlet 1
|
| 3359 | 2026-01-14T21:22:55.619Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-46" }): asked for component details for a sensor
details = Measurement(Measurement { name: "CPU", kind: Temperature, value: Ok(62.6) })
index = 0
slot = gimlet 1
|
| 3360 | 2026-01-14T21:22:55.621Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 157 }
interface = fake-switch0
response = ComponentDetails(TlvPage { offset: 0, total: 1 })
|
| 3361 | 2026-01-14T21:22:55.621Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 245 }
interface = fake-sled0
response = ComponentDetails(TlvPage { offset: 0, total: 1 })
|
| 3362 | 2026-01-14T21:22:55.621Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 245 }
interface = fake-sled1
response = ComponentDetails(TlvPage { offset: 0, total: 1 })
|
| 3363 | 2026-01-14T21:22:55.624Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-switch0
request = Message { header: Header { version: 22, message_id: 158 }, kind: MgsRequest(SpState) }
|
| 3364 | 2026-01-14T21:22:55.624Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 246 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-0" }, offset: 0 }) }
|
| 3365 | 2026-01-14T21:22:55.624Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 246 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-53" }, offset: 0 }) }
|
| 3366 | 2026-01-14T21:22:55.626Z | DEBG | test_vpc_firewall: received state request
reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) }
slot = sidecar 0
|
| 3367 | 2026-01-14T21:22:55.626Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-0" }): asked for number of component details
num_details = 1
slot = gimlet 0
|
| 3368 | 2026-01-14T21:22:55.627Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-0" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Southwest", kind: Temperature, value: Err(DeviceError) })
index = 0
slot = gimlet 0
|
| 3369 | 2026-01-14T21:22:55.627Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for number of component details
num_details = 6
slot = gimlet 1
|
| 3370 | 2026-01-14T21:22:55.627Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Southeast", kind: Speed, value: Ok(2510.0) })
index = 0
slot = gimlet 1
|
| 3371 | 2026-01-14T21:22:55.627Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Northeast", kind: Speed, value: Ok(2390.0) })
index = 1
slot = gimlet 1
|
| 3372 | 2026-01-14T21:22:55.627Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor
details = Measurement(Measurement { name: "South", kind: Speed, value: Ok(2467.0) })
index = 2
slot = gimlet 1
|
| 3373 | 2026-01-14T21:22:55.627Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor
details = Measurement(Measurement { name: "North", kind: Speed, value: Ok(2195.0) })
index = 3
slot = gimlet 1
|
| 3374 | 2026-01-14T21:22:55.627Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Southwest", kind: Speed, value: Ok(2680.0) })
index = 4
slot = gimlet 1
|
| 3375 | 2026-01-14T21:22:55.627Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Northwest", kind: Speed, value: Ok(2212.0) })
index = 5
slot = gimlet 1
|
| 3376 | 2026-01-14T21:22:55.630Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 158 }
interface = fake-switch0
response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
|
| 3377 | 2026-01-14T21:22:55.630Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 246 }
interface = fake-sled0
response = ComponentDetails(TlvPage { offset: 0, total: 1 })
|
| 3378 | 2026-01-14T21:22:55.630Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 246 }
interface = fake-sled1
response = ComponentDetails(TlvPage { offset: 0, total: 6 })
|
| 3379 | 2026-01-14T21:22:55.632Z | TRAC | test_vpc_firewall (sensor-poller): polled SP successfully
chassis_type = Switch
num_samples = 3
sp_slot = 0
|
| 3380 | 2026-01-14T21:22:55.638Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 247 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-7" }, offset: 0 }) }
|
| 3381 | 2026-01-14T21:22:55.638Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 247 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-0" }, offset: 0 }) }
|
| 3382 | 2026-01-14T21:22:55.640Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-7" }): asked for number of component details
num_details = 4
slot = gimlet 0
|
| 3383 | 2026-01-14T21:22:55.640Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor
details = Measurement(Measurement { name: "V12_U2A_A0", kind: Current, value: Ok(0.45898438) })
index = 0
slot = gimlet 0
|
| 3384 | 2026-01-14T21:22:55.640Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor
details = Measurement(Measurement { name: "V3P3_U2A_A0", kind: Current, value: Ok(0.024414063) })
index = 1
slot = gimlet 0
|
| 3385 | 2026-01-14T21:22:55.640Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor
details = Measurement(Measurement { name: "V12_U2A_A0", kind: Voltage, value: Ok(12.03125) })
index = 2
slot = gimlet 0
|
| 3386 | 2026-01-14T21:22:55.640Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor
details = Measurement(Measurement { name: "V3P3_U2A_A0", kind: Voltage, value: Ok(3.328125) })
index = 3
slot = gimlet 0
|
| 3387 | 2026-01-14T21:22:55.640Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-0" }): asked for number of component details
num_details = 1
slot = gimlet 1
|
| 3388 | 2026-01-14T21:22:55.640Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-0" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Southwest", kind: Temperature, value: Ok(41.3629) })
index = 0
slot = gimlet 1
|
| 3389 | 2026-01-14T21:22:55.643Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 247 }
interface = fake-sled0
response = ComponentDetails(TlvPage { offset: 0, total: 4 })
|
| 3390 | 2026-01-14T21:22:55.644Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 247 }
interface = fake-sled1
response = ComponentDetails(TlvPage { offset: 0, total: 1 })
|
| 3391 | 2026-01-14T21:22:55.652Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 248 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-39" }, offset: 0 }) }
|
| 3392 | 2026-01-14T21:22:55.652Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 248 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-2" }, offset: 0 }) }
|
| 3393 | 2026-01-14T21:22:55.652Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-39" }): asked for number of component details
num_details = 1
slot = gimlet 0
|
| 3394 | 2026-01-14T21:22:55.652Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-39" }): asked for component details for a sensor
details = Measurement(Measurement { name: "t6", kind: Temperature, value: Ok(70.625) })
index = 0
slot = gimlet 0
|
| 3395 | 2026-01-14T21:22:55.652Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-2" }): asked for number of component details
num_details = 1
slot = gimlet 1
|
| 3396 | 2026-01-14T21:22:55.652Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-2" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Southeast", kind: Temperature, value: Ok(41.570313) })
index = 0
slot = gimlet 1
|
| 3397 | 2026-01-14T21:22:55.652Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 248 }
interface = fake-sled0
response = ComponentDetails(TlvPage { offset: 0, total: 1 })
|
| 3398 | 2026-01-14T21:22:55.652Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 248 }
interface = fake-sled1
response = ComponentDetails(TlvPage { offset: 0, total: 1 })
|
| 3399 | 2026-01-14T21:22:55.653Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 249 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-46" }, offset: 0 }) }
|
| 3400 | 2026-01-14T21:22:55.653Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 249 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-1" }, offset: 0 }) }
|
| 3401 | 2026-01-14T21:22:55.653Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-46" }): asked for number of component details
num_details = 1
slot = gimlet 0
|
| 3402 | 2026-01-14T21:22:55.653Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-46" }): asked for component details for a sensor
details = Measurement(Measurement { name: "CPU", kind: Temperature, value: Ok(64.5) })
index = 0
slot = gimlet 0
|
| 3403 | 2026-01-14T21:22:55.653Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-1" }): asked for number of component details
num_details = 1
slot = gimlet 1
|
| 3404 | 2026-01-14T21:22:55.653Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-1" }): asked for component details for a sensor
details = Measurement(Measurement { name: "South", kind: Temperature, value: Ok(42.5625) })
index = 0
slot = gimlet 1
|
| 3405 | 2026-01-14T21:22:55.653Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 249 }
interface = fake-sled0
response = ComponentDetails(TlvPage { offset: 0, total: 1 })
|
| 3406 | 2026-01-14T21:22:55.653Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 249 }
interface = fake-sled1
response = ComponentDetails(TlvPage { offset: 0, total: 1 })
|
| 3407 | 2026-01-14T21:22:55.655Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 250 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-8" }, offset: 0 }) }
|
| 3408 | 2026-01-14T21:22:55.655Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 250 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-7" }, offset: 0 }) }
|
| 3409 | 2026-01-14T21:22:55.655Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-8" }): asked for number of component details
num_details = 1
slot = gimlet 0
|
| 3410 | 2026-01-14T21:22:55.655Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-8" }): asked for component details for a sensor
details = Measurement(Measurement { name: "U2_N0", kind: Temperature, value: Ok(56.0) })
index = 0
slot = gimlet 0
|
| 3411 | 2026-01-14T21:22:55.655Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-7" }): asked for number of component details
num_details = 4
slot = gimlet 1
|
| 3412 | 2026-01-14T21:22:55.655Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor
details = Measurement(Measurement { name: "V12_U2A_A0", kind: Current, value: Ok(0.41893438) })
index = 0
slot = gimlet 1
|
| 3413 | 2026-01-14T21:22:55.655Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor
details = Measurement(Measurement { name: "V3P3_U2A_A0", kind: Current, value: Ok(0.025614602) })
index = 1
slot = gimlet 1
|
| 3414 | 2026-01-14T21:22:55.655Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor
details = Measurement(Measurement { name: "V12_U2A_A0", kind: Voltage, value: Ok(12.02914) })
index = 2
slot = gimlet 1
|
| 3415 | 2026-01-14T21:22:55.655Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor
details = Measurement(Measurement { name: "V3P3_U2A_A0", kind: Voltage, value: Ok(3.2618) })
index = 3
slot = gimlet 1
|
| 3416 | 2026-01-14T21:22:55.657Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 250 }
interface = fake-sled0
response = ComponentDetails(TlvPage { offset: 0, total: 1 })
|
| 3417 | 2026-01-14T21:22:55.657Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 250 }
interface = fake-sled1
response = ComponentDetails(TlvPage { offset: 0, total: 4 })
|
| 3418 | 2026-01-14T21:22:55.661Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 251 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-53" }, offset: 0 }) }
|
| 3419 | 2026-01-14T21:22:55.661Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 251 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-39" }, offset: 0 }) }
|
| 3420 | 2026-01-14T21:22:55.661Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for number of component details
num_details = 6
slot = gimlet 0
|
| 3421 | 2026-01-14T21:22:55.661Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Southeast", kind: Speed, value: Ok(2607.0) })
index = 0
slot = gimlet 0
|
| 3422 | 2026-01-14T21:22:55.661Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Northeast", kind: Speed, value: Ok(2476.0) })
index = 1
slot = gimlet 0
|
| 3423 | 2026-01-14T21:22:55.661Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor
details = Measurement(Measurement { name: "South", kind: Speed, value: Ok(2553.0) })
index = 2
slot = gimlet 0
|
| 3424 | 2026-01-14T21:22:55.661Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor
details = Measurement(Measurement { name: "North", kind: Speed, value: Ok(2265.0) })
index = 3
slot = gimlet 0
|
| 3425 | 2026-01-14T21:22:55.661Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Southwest", kind: Speed, value: Ok(2649.0) })
index = 4
slot = gimlet 0
|
| 3426 | 2026-01-14T21:22:55.661Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor
details = Measurement(Measurement { name: "Northwest", kind: Speed, value: Ok(2275.0) })
index = 5
slot = gimlet 0
|
| 3427 | 2026-01-14T21:22:55.661Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-39" }): asked for number of component details
num_details = 1
slot = gimlet 1
|
| 3428 | 2026-01-14T21:22:55.661Z | DEBG | test_vpc_firewall (SpComponent { id: "dev-39" }): asked for component details for a sensor
details = Measurement(Measurement { name: "t6", kind: Temperature, value: Ok(70.625) })
index = 0
slot = gimlet 1
|
| 3429 | 2026-01-14T21:22:55.661Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 251 }
interface = fake-sled0
response = ComponentDetails(TlvPage { offset: 0, total: 6 })
|
| 3430 | 2026-01-14T21:22:55.662Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 251 }
interface = fake-sled1
response = ComponentDetails(TlvPage { offset: 0, total: 1 })
|
| 3431 | 2026-01-14T21:22:55.666Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled0
request = Message { header: Header { version: 22, message_id: 252 }, kind: MgsRequest(SpState) }
|
| 3432 | 2026-01-14T21:22:55.666Z | TRAC | test_vpc_firewall (ManagementSwitch): sending request to SP
attempt = 1
interface = fake-sled1
request = Message { header: Header { version: 22, message_id: 252 }, kind: MgsRequest(SpState) }
|
| 3433 | 2026-01-14T21:22:55.668Z | DEBG | test_vpc_firewall: received state request
reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) }
slot = gimlet 0
|
| 3434 | 2026-01-14T21:22:55.668Z | DEBG | test_vpc_firewall: received state request
reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) }
slot = gimlet 1
|
| 3435 | 2026-01-14T21:22:55.668Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 252 }
interface = fake-sled0
response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
|
| 3436 | 2026-01-14T21:22:55.668Z | TRAC | test_vpc_firewall (ManagementSwitch): received response from SP
header = Header { version: 22, message_id: 252 }
interface = fake-sled1
response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
|
| 3437 | 2026-01-14T21:22:55.668Z | TRAC | test_vpc_firewall (sensor-poller): polled SP successfully
chassis_type = Sled
num_samples = 17
sp_slot = 0
|
| 3438 | 2026-01-14T21:22:55.668Z | TRAC | test_vpc_firewall (sensor-poller): polled SP successfully
chassis_type = Sled
num_samples = 16
sp_slot = 1
|