Max level shown:
12026-01-27T01:13:43.739ZDEBGtest_vpcs (init_with_steps): Running step start_crdb
22026-01-27T01:13:43.740ZDEBGtest_vpcs: Starting CRDB
32026-01-27T01:13:43.789ZINFOtest_vpcs: cockroach temporary directory: /var/tmp/omicron_tmp/.tmp7Gji4q
42026-01-27T01:13:43.789ZINFOtest_vpcs: cockroach: copying from seed tarball (/var/tmp/omicron_tmp/crdb-base-build/2568847d748e1bae965de0b3126e3133c4bd29b2d2831f880273cca7dc24bf97.tar) to storage directory (/var/tmp/omicron_tmp/.tmp7Gji4q/data)
52026-01-27T01:13:43.818ZINFOtest_vpcs: cockroach command line: cockroach start-single-node --insecure --http-addr=:0 --store=path=/var/tmp/omicron_tmp/.tmp7Gji4q/data,ballast-size=0 --listen-addr [::1]:0 --listening-url-file /var/tmp/omicron_tmp/.tmp7Gji4q/listen-url
62026-01-27T01:13:43.819ZINFOtest_vpcs: cockroach environment: BUILDOMAT_JOB_ID=01KFY6DEWKSJ6KBWEPJMNGAW6V BUILDOMAT_TASK_ID=4 CARGO=/home/build/.rustup/toolchains/1.91.1-x86_64-unknown-illumos/bin/cargo CARGO_HOME=/home/build/.cargo CARGO_INCREMENTAL=0 CARGO_MANIFEST_DIR=/work/oxidecomputer/omicron/nexus CARGO_PKG_AUTHORS= CARGO_PKG_DESCRIPTION= CARGO_PKG_HOMEPAGE= CARGO_PKG_LICENSE=MPL-2.0 CARGO_PKG_LICENSE_FILE= CARGO_PKG_NAME=omicron-nexus CARGO_PKG_REPOSITORY= CARGO_PKG_RUST_VERSION= CARGO_PKG_VERSION=0.1.0 CARGO_PKG_VERSION_MAJOR=0 CARGO_PKG_VERSION_MINOR=1 CARGO_PKG_VERSION_PATCH=0 CARGO_PKG_VERSION_PRE= CARGO_TERM_COLOR=always CI=true CRDB_SEED_TAR=/var/tmp/omicron_tmp/crdb-base-build/2568847d748e1bae965de0b3126e3133c4bd29b2d2831f880273cca7dc24bf97.tar GITHUB_BRANCH=propolis-doorbell-buffernt GITHUB_REF=refs/heads/propolis-doorbell-buffernt GITHUB_REPOSITORY=oxidecomputer/omicron GITHUB_SHA=5db41474f9cbdbb902460f66375144650fa634e2 GOTRACEBACK=crash HOME=/home/build LANG=en_US.UTF-8 LC_ALL=en_US.UTF-8 LD_LIBRARY_PATH=/work/oxidecomputer/omicron/target/debug/build/aws-lc-sys-2365d10e992c2e9e/out/build/artifacts:/work/oxidecomputer/omicron/target/debug/build/blake3-3a6f042b78b00084/out:/work/oxidecomputer/omicron/target/debug/build/bzip2-sys-a5022a14d5411a51/out/lib:/work/oxidecomputer/omicron/target/debug/build/libgit2-sys-3c3387d8a4ad6ac9/out/build:/work/oxidecomputer/omicron/target/debug/build/ring-aaa5d3556d6e760b/out:/work/oxidecomputer/omicron/target/debug/build/tofino-ea950bd608a63962/out:/work/oxidecomputer/omicron/target/debug/build/zstd-sys-163c6620fa51a768/out:/work/oxidecomputer/omicron/target/debug/deps:/work/oxidecomputer/omicron/target/debug:/home/build/.rustup/toolchains/1.91.1-x86_64-unknown-illumos/lib/rustlib/x86_64-unknown-illumos/lib:/home/build/.rustup/toolchains/1.91.1-x86_64-unknown-illumos/lib LOGNAME=build NEXTEST=1 NEXTEST_ATTEMPT=1 NEXTEST_ATTEMPT_ID=0069c974-2637-48b9-9dc2-1efafeb7535a:omicron-nexus::test_all$integration_tests::vpcs::test_vpcs NEXTEST_BINARY_ID=omicron-nexus::test_all NEXTEST_BIN_EXE_nexus=/work/oxidecomputer/omicron/target/debug/nexus NEXTEST_BIN_EXE_schema-updater=/work/oxidecomputer/omicron/target/debug/schema-updater NEXTEST_BIN_EXE_schema_updater=/work/oxidecomputer/omicron/target/debug/schema-updater NEXTEST_EXECUTION_MODE=process-per-test NEXTEST_LD_LIBRARY_PATH=/work/oxidecomputer/omicron/target/debug/build/aws-lc-sys-2365d10e992c2e9e/out/build/artifacts:/work/oxidecomputer/omicron/target/debug/build/blake3-3a6f042b78b00084/out:/work/oxidecomputer/omicron/target/debug/build/bzip2-sys-a5022a14d5411a51/out/lib:/work/oxidecomputer/omicron/target/debug/build/libgit2-sys-3c3387d8a4ad6ac9/out/build:/work/oxidecomputer/omicron/target/debug/build/ring-aaa5d3556d6e760b/out:/work/oxidecomputer/omicron/target/debug/build/tofino-ea950bd608a63962/out:/work/oxidecomputer/omicron/target/debug/build/zstd-sys-163c6620fa51a768/out:/work/oxidecomputer/omicron/target/debug/deps:/work/oxidecomputer/omicron/target/debug:/home/build/.rustup/toolchains/1.91.1-x86_64-unknown-illumos/lib/rustlib/x86_64-unknown-illumos/lib:/home/build/.rustup/toolchains/1.91.1-x86_64-unknown-illumos/lib NEXTEST_PROFILE=ci NEXTEST_RUN_ID=0069c974-2637-48b9-9dc2-1efafeb7535a NEXTEST_RUN_MODE=test NEXTEST_STRESS_CURRENT=none NEXTEST_STRESS_TOTAL=none NEXTEST_TEST_GLOBAL_SLOT=3 NEXTEST_TEST_GROUP=@global NEXTEST_TEST_GROUP_SLOT=none NEXTEST_TEST_NAME=integration_tests::vpcs::test_vpcs NEXTEST_TEST_PHASE=run NEXTEST_TOTAL_ATTEMPTS=1 OUT_DIR=/work/oxidecomputer/omicron/target/debug/build/omicron-nexus-6c541d174146822e/out PATH=/work/oxidecomputer/omicron/out/mgd/root/opt/oxide/mgd/bin:/work/oxidecomputer/omicron/out/dendrite-stub/bin:/work/oxidecomputer/omicron/out/clickhouse:/work/oxidecomputer/omicron/out/cockroachdb/bin:/home/build/.cargo/bin:/usr/bin:/bin:/usr/sbin:/sbin:/opt/ooce/bin:/opt/ooce/sbin PWD=/work/oxidecomputer/omicron RUSTC_BOOTSTRAP=1 RUSTDOCFLAGS=--document-private-items -D warnings RUSTFLAGS=--cfg tokio_unstable -D warnings -C link-arg=-R/usr/platform/oxide/lib/amd64 RUSTUP_HOME=/home/build/.rustup RUSTUP_TOOLCHAIN=1.91.1-x86_64-unknown-illumos RUST_BACKTRACE=1 RUST_RECURSION_COUNT=1 SHLVL=1 SSL_CERT_DIR=/usr/ssl/certs SSL_CERT_FILE=/etc/ssl/cacert.pem TMPDIR=/var/tmp/omicron_tmp TZ=UTC USER=build _=/usr/bin/ptime
72026-01-27T01:13:45.370ZINFOtest_vpcs: cockroach pid: 7908
82026-01-27T01:13:45.370ZINFOtest_vpcs: cockroach listen URL: postgresql://root@[::1]:42398/omicron?sslmode=disable
92026-01-27T01:13:45.430ZDEBGtest_vpcs (init_with_steps): Running step start_clickhouse
102026-01-27T01:13:45.430ZDEBGtest_vpcs: Starting Clickhouse
112026-01-27T01:13:45.972ZDEBGtest_vpcs (init_with_steps): Running step start_internal_dns
122026-01-27T01:13:45.972ZINFOtest_vpcs (store): opening sled database path = /var/tmp/omicron_tmp/.tmpivKHJM
132026-01-27T01:13:46.105ZINFOtest_vpcs (store): pruning trees for generations newer than 0
142026-01-27T01:13:46.106ZINFOtest_vpcs (store): pruning trees for generations older than 0 keep = 3
152026-01-27T01:13:46.107ZINFOtest_vpcs (dns): DNS server bound to address kind = dns local_address = [::1]:46325
162026-01-27T01:13:46.108ZDEBGtest_vpcs (http): registered endpoint kind = dns local_addr = [::1]:65457 method = GET path = /config versions = all starting from 2.0.0
172026-01-27T01:13:46.108ZDEBGtest_vpcs (http): registered endpoint kind = dns local_addr = [::1]:65457 method = GET path = /config versions = from 1.0.0 to 2.0.0
182026-01-27T01:13:46.108ZDEBGtest_vpcs (http): registered endpoint kind = dns local_addr = [::1]:65457 method = PUT path = /config versions = all starting from 2.0.0
192026-01-27T01:13:46.108ZDEBGtest_vpcs (http): registered endpoint kind = dns local_addr = [::1]:65457 method = PUT path = /config versions = from 1.0.0 to 2.0.0
202026-01-27T01:13:46.108ZINFOtest_vpcs (http): listening kind = dns local_addr = [::1]:65457
212026-01-27T01:13:46.111ZDEBGtest_vpcs (http): successfully registered DTrace USDT probes kind = dns local_addr = [::1]:65457
222026-01-27T01:13:46.111ZDEBGtest_vpcs (init_with_steps): Running step start_external_dns
232026-01-27T01:13:46.111ZINFOtest_vpcs (store): opening sled database path = /var/tmp/omicron_tmp/.tmpWwEbC2
242026-01-27T01:13:46.128ZINFOtest_vpcs (store): pruning trees for generations newer than 0
252026-01-27T01:13:46.129ZINFOtest_vpcs (store): pruning trees for generations older than 0 keep = 3
262026-01-27T01:13:46.129ZINFOtest_vpcs (dns): DNS server bound to address kind = dns local_address = [::1]:55507
272026-01-27T01:13:46.129ZDEBGtest_vpcs (http): registered endpoint kind = dns local_addr = [::1]:53796 method = GET path = /config versions = all starting from 2.0.0
282026-01-27T01:13:46.129ZDEBGtest_vpcs (http): registered endpoint kind = dns local_addr = [::1]:53796 method = GET path = /config versions = from 1.0.0 to 2.0.0
292026-01-27T01:13:46.129ZDEBGtest_vpcs (http): registered endpoint kind = dns local_addr = [::1]:53796 method = PUT path = /config versions = all starting from 2.0.0
302026-01-27T01:13:46.129ZDEBGtest_vpcs (http): registered endpoint kind = dns local_addr = [::1]:53796 method = PUT path = /config versions = from 1.0.0 to 2.0.0
312026-01-27T01:13:46.129ZINFOtest_vpcs (http): listening kind = dns local_addr = [::1]:53796
322026-01-27T01:13:46.131ZDEBGtest_vpcs (http): successfully registered DTrace USDT probes kind = dns local_addr = [::1]:53796
332026-01-27T01:13:46.131ZDEBGtest_vpcs (init_with_steps): Running step start_nexus_internal
342026-01-27T01:13:46.131ZDEBGtest_vpcs: Starting Nexus (internal API)
352026-01-27T01:13:46.132ZINFOtest_vpcs: setting up nexus server
362026-01-27T01:13:46.138ZINFOtest_vpcs (ServerContext): registering Oso class class = Action
372026-01-27T01:13:46.138ZINFOtest_vpcs (ServerContext): registering Oso class class = AuditLog
382026-01-27T01:13:46.138ZINFOtest_vpcs (ServerContext): registering Oso class class = AnyActor
392026-01-27T01:13:46.138ZINFOtest_vpcs (ServerContext): registering Oso class class = AuthenticatedActor
402026-01-27T01:13:46.138ZINFOtest_vpcs (ServerContext): registering Oso class class = BlueprintConfig
412026-01-27T01:13:46.138ZINFOtest_vpcs (ServerContext): registering Oso class class = Database
422026-01-27T01:13:46.138ZINFOtest_vpcs (ServerContext): registering Oso class class = DnsConfig
432026-01-27T01:13:46.138ZINFOtest_vpcs (ServerContext): registering Oso class class = Fleet
442026-01-27T01:13:46.138ZINFOtest_vpcs (ServerContext): registering Oso class class = Inventory
452026-01-27T01:13:46.138ZINFOtest_vpcs (ServerContext): registering Oso class class = IpPoolList
462026-01-27T01:13:46.138ZINFOtest_vpcs (ServerContext): registering Oso class class = VpcList
472026-01-27T01:13:46.138ZINFOtest_vpcs (ServerContext): registering Oso class class = ConsoleSessionList
482026-01-27T01:13:46.138ZINFOtest_vpcs (ServerContext): registering Oso class class = DeviceAuthRequestList
492026-01-27T01:13:46.139ZINFOtest_vpcs (ServerContext): registering Oso class class = QuiesceState
502026-01-27T01:13:46.139ZINFOtest_vpcs (ServerContext): registering Oso class class = SiloCertificateList
512026-01-27T01:13:46.139ZINFOtest_vpcs (ServerContext): registering Oso class class = SiloGroupList
522026-01-27T01:13:46.139ZINFOtest_vpcs (ServerContext): registering Oso class class = SiloIdentityProviderList
532026-01-27T01:13:46.139ZINFOtest_vpcs (ServerContext): registering Oso class class = SiloUserList
542026-01-27T01:13:46.139ZINFOtest_vpcs (ServerContext): registering Oso class class = SiloUserSessionList
552026-01-27T01:13:46.139ZINFOtest_vpcs (ServerContext): registering Oso class class = SiloUserTokenList
562026-01-27T01:13:46.139ZINFOtest_vpcs (ServerContext): registering Oso class class = SubnetPoolList
572026-01-27T01:13:46.139ZINFOtest_vpcs (ServerContext): registering Oso class class = UpdateTrustRootList
582026-01-27T01:13:46.139ZINFOtest_vpcs (ServerContext): registering Oso class class = TargetReleaseConfig
592026-01-27T01:13:46.139ZINFOtest_vpcs (ServerContext): registering Oso class class = AlertClassList
602026-01-27T01:13:46.139ZINFOtest_vpcs (ServerContext): registering Oso class class = ScimClientBearerTokenList
612026-01-27T01:13:46.139ZINFOtest_vpcs (ServerContext): registering Oso class class = MulticastGroupList
622026-01-27T01:13:46.139ZINFOtest_vpcs (ServerContext): registering Oso class class = Project
632026-01-27T01:13:46.139ZINFOtest_vpcs (ServerContext): registering Oso class class = Disk
642026-01-27T01:13:46.140ZINFOtest_vpcs (ServerContext): registering Oso class class = Snapshot
652026-01-27T01:13:46.140ZINFOtest_vpcs (ServerContext): registering Oso class class = ProjectImage
662026-01-27T01:13:46.140ZINFOtest_vpcs (ServerContext): registering Oso class class = AffinityGroup
672026-01-27T01:13:46.140ZINFOtest_vpcs (ServerContext): registering Oso class class = AntiAffinityGroup
682026-01-27T01:13:46.140ZINFOtest_vpcs (ServerContext): registering Oso class class = Instance
692026-01-27T01:13:46.140ZINFOtest_vpcs (ServerContext): registering Oso class class = IpPool
702026-01-27T01:13:46.140ZINFOtest_vpcs (ServerContext): registering Oso class class = InstanceNetworkInterface
712026-01-27T01:13:46.140ZINFOtest_vpcs (ServerContext): registering Oso class class = Vpc
722026-01-27T01:13:46.140ZINFOtest_vpcs (ServerContext): registering Oso class class = VpcRouter
732026-01-27T01:13:46.140ZINFOtest_vpcs (ServerContext): registering Oso class class = InternetGateway
742026-01-27T01:13:46.140ZINFOtest_vpcs (ServerContext): registering Oso class class = InternetGatewayIpPool
752026-01-27T01:13:46.140ZINFOtest_vpcs (ServerContext): registering Oso class class = InternetGatewayIpAddress
762026-01-27T01:13:46.140ZINFOtest_vpcs (ServerContext): registering Oso class class = RouterRoute
772026-01-27T01:13:46.140ZINFOtest_vpcs (ServerContext): registering Oso class class = VpcSubnet
782026-01-27T01:13:46.140ZINFOtest_vpcs (ServerContext): registering Oso class class = FloatingIp
792026-01-27T01:13:46.140ZINFOtest_vpcs (ServerContext): registering Oso class class = ExternalSubnet
802026-01-27T01:13:46.140ZINFOtest_vpcs (ServerContext): registering Oso class class = Image
812026-01-27T01:13:46.140ZINFOtest_vpcs (ServerContext): registering Oso class class = SiloImage
822026-01-27T01:13:46.140ZINFOtest_vpcs (ServerContext): registering Oso class class = AddressLot
832026-01-27T01:13:46.140ZINFOtest_vpcs (ServerContext): registering Oso class class = Blueprint
842026-01-27T01:13:46.140ZINFOtest_vpcs (ServerContext): registering Oso class class = LoopbackAddress
852026-01-27T01:13:46.140ZINFOtest_vpcs (ServerContext): registering Oso class class = Certificate
862026-01-27T01:13:46.140ZINFOtest_vpcs (ServerContext): registering Oso class class = ConsoleSession
872026-01-27T01:13:46.140ZINFOtest_vpcs (ServerContext): registering Oso class class = DeviceAuthRequest
882026-01-27T01:13:46.140ZINFOtest_vpcs (ServerContext): registering Oso class class = DeviceAccessToken
892026-01-27T01:13:46.141ZINFOtest_vpcs (ServerContext): registering Oso class class = PhysicalDisk
902026-01-27T01:13:46.141ZINFOtest_vpcs (ServerContext): registering Oso class class = Rack
912026-01-27T01:13:46.141ZINFOtest_vpcs (ServerContext): registering Oso class class = SshKey
922026-01-27T01:13:46.141ZINFOtest_vpcs (ServerContext): registering Oso class class = Silo
932026-01-27T01:13:46.141ZINFOtest_vpcs (ServerContext): registering Oso class class = SiloUser
942026-01-27T01:13:46.141ZINFOtest_vpcs (ServerContext): registering Oso class class = SiloGroup
952026-01-27T01:13:46.141ZINFOtest_vpcs (ServerContext): registering Oso class class = SupportBundle
962026-01-27T01:13:46.141ZINFOtest_vpcs (ServerContext): registering Oso class class = IdentityProvider
972026-01-27T01:13:46.141ZINFOtest_vpcs (ServerContext): registering Oso class class = SamlIdentityProvider
982026-01-27T01:13:46.141ZINFOtest_vpcs (ServerContext): registering Oso class class = Sled
992026-01-27T01:13:46.141ZINFOtest_vpcs (ServerContext): registering Oso class class = SubnetPool
1002026-01-27T01:13:46.141ZINFOtest_vpcs (ServerContext): registering Oso class class = TufRepo
1012026-01-27T01:13:46.141ZINFOtest_vpcs (ServerContext): registering Oso class class = TufArtifact
1022026-01-27T01:13:46.141ZINFOtest_vpcs (ServerContext): registering Oso class class = TufTrustRoot
1032026-01-27T01:13:46.141ZINFOtest_vpcs (ServerContext): registering Oso class class = Alert
1042026-01-27T01:13:46.141ZINFOtest_vpcs (ServerContext): registering Oso class class = AlertReceiver
1052026-01-27T01:13:46.141ZINFOtest_vpcs (ServerContext): registering Oso class class = WebhookSecret
1062026-01-27T01:13:46.141ZINFOtest_vpcs (ServerContext): registering Oso class class = Zpool
1072026-01-27T01:13:46.141ZINFOtest_vpcs (ServerContext): registering Oso class class = Service
1082026-01-27T01:13:46.141ZINFOtest_vpcs (ServerContext): registering Oso class class = UserBuiltin
1092026-01-27T01:13:46.141ZINFOtest_vpcs (ServerContext): registering Oso class class = ScimClientBearerToken
1102026-01-27T01:13:46.141ZINFOtest_vpcs (ServerContext): registering Oso class class = MulticastGroup
1112026-01-27T01:13:46.141ZINFOtest_vpcs (ServerContext): full Oso configuration config = #\n# Oso configuration for Omicron\n# This file is augmented by generated snippets.\n#\n\n#\n# ACTOR TYPES AND BASIC RULES\n#\n\n# `AnyActor` includes both authenticated and unauthenticated users.\nactor AnyActor {}\n\n# An `AuthenticatedActor` has an identity in the system. All of our operations\n# today require that an actor be authenticated.\nactor AuthenticatedActor {}\n\n# For any resource, `actor` can perform action `action` on it if they're\n# authenticated and their role(s) give them the corresponding permission on that\n# resource.\nallow(actor: AnyActor, action: Action, resource) if\n actor.authenticated and\n has_permission(actor.authn_actor.unwrap(), action.to_perm(), resource);\n\n# Define role relationships\nhas_role(actor: AuthenticatedActor, role: String, resource: Resource)\n\tif resource.has_role(actor, role);\n\n#\n# ROLES AND PERMISSIONS IN THE FLEET/SILO/PROJECT HIERARCHY\n#\n# We define the following permissions for most resources in the system:\n#\n# - "create_child": required to create child resources (of any type)\n#\n# - "list_children": required to list child resources (of all types) of a\n# resource\n#\n# - "modify": required to modify or delete a resource\n#\n# - "read": required to read a resource\n#\n# We define the following predefined roles for only a few high-level resources:\n# the Fleet (see below), Silo, Organization, and Project. The specific roles\n# are oriented around intended use-cases:\n#\n# - "admin": has all permissions on the resource\n#\n# - "collaborator": has "read", "list_children", and "create_child", plus\n# the "admin" role for child resources. The idea is that if you're an\n# Organization Collaborator, you have full control over the Projects within\n# the Organization, but you cannot modify or delete the Organization itself.\n#\n# - "viewer": has "read" and "list_children" on a resource\n#\n# Below the Project level, permissions are granted via roles at the Project\n# level. For example, for someone to be able to create, modify, or delete any\n# Instances, they must be granted project.collaborator, which means they can\n# create, modify, or delete _all_ resources in the Project.\n#\n# The complete set of predefined roles:\n#\n# - fleet.admin (superuser for the whole system)\n# - fleet.collaborator (can manage Silos)\n# - fleet.viewer (can read most non-siloed resources in the system)\n# - silo.admin (superuser for the silo)\n# - silo.collaborator (can create and own Organizations; grants project.admin on all projects)\n# - silo.limited-collaborator (grants project.limited-collaborator on all projects)\n# - silo.viewer (can read most resources within the Silo; grants project.viewer)\n# - organization.admin (complete control over an organization)\n# - organization.collaborator (can manage Projects)\n# - organization.viewer (can read most resources within the Organization)\n# - project.admin (complete control over a Project)\n# - project.collaborator (can manage all resources within the Project, including networking)\n# - project.limited-collaborator (can manage compute resources, but not networking resources)\n# - project.viewer (can read most resources within the Project)\n#\n# Outside the Silo/Organization/Project hierarchy, we (currently) treat most\n# resources as nested under Fleet or else a synthetic resource (see below). We\n# do not yet support role assignments on anything other than Fleet, Silo,\n# Organization, or Project.\n#\n\n# "Fleet" is a global singleton representing the whole system. The name comes\n# from the idea described in RFD 24, but it's not quite right. This probably\n# should be more like "Region" or "AvailabilityZone". The precise boundaries\n# have not yet been figured out.\nresource Fleet {\n\tpermissions = [\n\t "list_children",\n\t "modify",\n\t "read",\n\t "create_child",\n\t];\n\n\troles = [\n\t # Roles that can be attached by users\n\t "admin",\n\t "collaborator",\n\t "viewer",\n\n\t # Internal-only roles\n\t "external-authenticator"\n\t];\n\n\t# Roles implied by other roles on this resource\n\t"viewer" if "collaborator";\n\t"collaborator" if "admin";\n\n\t# Permissions granted directly by roles on this resource\n\t"list_children" if "viewer";\n\t"read" if "viewer";\n\t"create_child" if "collaborator";\n\t"modify" if "admin";\n}\n\n# For fleets specifically, roles can be conferred by roles on the user's Silo.\n# Note that certain Actors may not ever have any roles assigned to them, like\n# SCIM Actors.\nhas_role(actor: AuthenticatedActor, role: String, _: Fleet) if\n\tsilo_role in actor.confers_fleet_role(role) and\n\thas_role(actor, silo_role, actor.silo.unwrap());\n\nresource Silo {\n\tpermissions = [\n\t "list_children",\n\t "modify",\n\t "read",\n\t "create_child",\n\t];\n\troles = [ "admin", "collaborator", "limited-collaborator", "viewer" ];\n\n\t# Roles implied by other roles on this resource\n\t"viewer" if "limited-collaborator";\n\t"limited-collaborator" if "collaborator";\n\t"collaborator" if "admin";\n\n\t# Permissions granted directly by roles on this resource\n\t"list_children" if "viewer";\n\t"read" if "viewer";\n\n\t"create_child" if "collaborator";\n\t"modify" if "admin";\n\n\t# Permissions implied by roles on this resource's parent (Fleet). Fleet\n\t# privileges allow a user to see and potentially administer the Silo,\n\t# but they do not give anyone permission to look at anything inside the\n\t# Silo. To achieve this, we use permission rules here. (If we granted\n\t# Fleet administrators _roles_ on the Silo, then those would cascade\n\t# into the Silo as well.)\n\trelations = { parent_fleet: Fleet };\n\t"read" if "viewer" on "parent_fleet";\n\t"modify" if "collaborator" on "parent_fleet";\n\n\t# external authenticator has to create silo users\n\t"list_children" if "external-authenticator" on "parent_fleet";\n\t"create_child" if "external-authenticator" on "parent_fleet";\n}\n\nhas_relation(fleet: Fleet, "parent_fleet", silo: Silo)\n\tif silo.fleet = fleet;\n\n# As a special case, all authenticated users can read their own Silo. That's\n# not quite the same as having the "viewer" role. For example, they cannot list\n# Organizations in the Silo.\n#\n# One reason this is necessary is because if an unprivileged user tries to\n# create an Organization using "POST /organizations", they should get back a 403\n# (which implies they're able to see /organizations, which is essentially seeing\n# the Silo itself) rather than a 404. This behavior isn't a hard constraint\n# (i.e., you could reasonably get a 404 for an API you're not allowed to call).\n# Nor is the implementation (i.e., we could special-case this endpoint somehow).\n# But granting this permission is the simplest way to keep this endpoint's\n# behavior consistent with the rest of the API.\n#\n# This rule is also used to determine if a user can list the identity providers\n# in the Silo (which they should be able to), since that's predicated on being\n# able to read the Silo.\n#\n# It's unclear what else would break if users couldn't see their own Silo.\nhas_permission(actor: AuthenticatedActor, "read", silo: Silo)\n\tif actor.is_user and silo in actor.silo;\n\nresource Project {\n\tpermissions = [\n\t "list_children",\n\t "modify",\n\t "read",\n\t "create_child",\n\t];\n\troles = [ "admin", "collaborator", "limited-collaborator", "viewer" ];\n\n\t# Roles implied by other roles on this resource\n\t# Role hierarchy: admin > collaborator > limited-collaborator > viewer\n\t#\n\t# The "limited-collaborator" role can create/modify non-networking\n\t# resources (instances, disks, etc.) but cannot create/modify networking\n\t# infrastructure (VPCs, subnets, routers, internet gateways).\n\t# See nexus/authz-macros for InProjectLimited vs InProjectFull.\n\t"viewer" if "limited-collaborator";\n\t"limited-collaborator" if "collaborator";\n\t"collaborator" if "admin";\n\n\t# Permissions granted directly by roles on this resource\n\t"list_children" if "viewer";\n\t"read" if "viewer";\n\t"create_child" if "limited-collaborator";\n\t"modify" if "admin";\n\n\t# Roles implied by roles on this resource's parent (Silo)\n\trelations = { parent_silo: Silo };\n\t"admin" if "collaborator" on "parent_silo";\n\t"limited-collaborator" if "limited-collaborator" on "parent_silo";\n\t"viewer" if "viewer" on "parent_silo";\n}\nhas_relation(silo: Silo, "parent_silo", project: Project)\n\tif project.silo = silo;\n\n#\n# GENERAL RESOURCES OUTSIDE THE SILO/PROJECT HIERARCHY\n#\n# Many resources use snippets of Polar generated by the `authz_resource!` Rust\n# macro. Some resources require custom Polar code. Those appear here.\n#\n\nresource Certificate {\n\tpermissions = [ "read", "modify" ];\n\trelations = { parent_silo: Silo, parent_fleet: Fleet };\n\n\t# Fleet-level and silo-level roles both grant privileges on certificates.\n\t"read" if "admin" on "parent_silo";\n\t"modify" if "admin" on "parent_silo";\n\t"read" if "admin" on "parent_fleet";\n\t"modify" if "admin" on "parent_fleet";\n}\nhas_relation(silo: Silo, "parent_silo", certificate: Certificate)\n\tif certificate.silo = silo;\nhas_relation(fleet: Fleet, "parent_fleet", certificate: Certificate)\n\tif certificate.silo.fleet = fleet;\n\nresource SiloUser {\n\tpermissions = [\n\t "list_children",\n\t "modify",\n\t "read",\n\t "create_child",\n\t];\n\n\t# Fleet and Silo administrators can manage a Silo's users. This is one\n\t# of the only areas of Silo configuration that Fleet Administrators have\n\t# permissions on.\n\trelations = { parent_silo: Silo, parent_fleet: Fleet };\n\t"list_children" if "read" on "parent_silo";\n\t"read" if "read" on "parent_silo";\n\t"modify" if "admin" on "parent_silo";\n\t"create_child" if "admin" on "parent_silo";\n\t"list_children" if "read" on "parent_fleet";\n\t"read" if "read" on "parent_fleet";\n\t"modify" if "admin" on "parent_fleet";\n\t"create_child" if "admin" on "parent_fleet";\n}\nhas_relation(silo: Silo, "parent_silo", user: SiloUser)\n\tif user.silo = silo;\nhas_relation(fleet: Fleet, "parent_fleet", user: SiloUser)\n\tif user.silo.fleet = fleet;\n\n# authenticated actors have all permissions on themselves\nhas_permission(actor: AuthenticatedActor, _perm: String, silo_user: SiloUser)\n if actor.equals_silo_user(silo_user);\n\nhas_permission(actor: AuthenticatedActor, "read", silo_user: SiloUser)\n if actor.is_user and silo_user.silo in actor.silo;\n\nresource SiloGroup {\n\tpermissions = [\n\t "list_children",\n\t "modify",\n\t "read",\n\t "create_child",\n\t];\n\n\trelations = { parent_silo: Silo };\n\t"list_children" if "read" on "parent_silo";\n\t"read" if "read" on "parent_silo";\n\t"modify" if "admin" on "parent_silo";\n\t"create_child" if "admin" on "parent_silo";\n}\nhas_relation(silo: Silo, "parent_silo", group: SiloGroup)\n\tif group.silo = silo;\n\nresource SshKey {\n\tpermissions = [ "read", "modify" ];\n\trelations = { silo_user: SiloUser };\n\n\t"read" if "read" on "silo_user";\n}\n# We want to allow the user to modify the ssh key but disallow a SCIM IdP token\n# from doing the same.\nhas_permission(actor: AuthenticatedActor, "modify", ssh_key: SshKey)\n\tif actor.is_user and has_permission(actor, "modify", ssh_key.silo_user);\nhas_relation(user: SiloUser, "silo_user", ssh_key: SshKey)\n\tif ssh_key.silo_user = user;\n\nresource IdentityProvider {\n\tpermissions = [\n\t "read",\n\t "modify",\n\t "create_child",\n\t "list_children",\n\t];\n\trelations = { parent_silo: Silo, parent_fleet: Fleet };\n\n\t# Silo-level roles grant privileges on identity providers.\n\t"read" if "viewer" on "parent_silo";\n\t"list_children" if "viewer" on "parent_silo";\n\t"modify" if "admin" on "parent_silo";\n\t"create_child" if "admin" on "parent_silo";\n\n\t# Fleet-level roles also grant privileges on identity providers.\n\t"read" if "viewer" on "parent_fleet";\n\t"list_children" if "viewer" on "parent_fleet";\n\t"modify" if "admin" on "parent_fleet";\n\t"create_child" if "admin" on "parent_fleet";\n}\nhas_relation(silo: Silo, "parent_silo", identity_provider: IdentityProvider)\n\tif identity_provider.silo = silo;\nhas_relation(fleet: Fleet, "parent_fleet", collection: IdentityProvider)\n\tif collection.silo.fleet = fleet;\n\nresource SamlIdentityProvider {\n\tpermissions = [\n\t "read",\n\t "modify",\n\t "create_child",\n\t "list_children",\n\t];\n\trelations = { parent_silo: Silo, parent_fleet: Fleet };\n\n\t# Silo-level roles grant privileges on identity providers.\n\t"read" if "viewer" on "parent_silo";\n\t"list_children" if "viewer" on "parent_silo";\n\t"modify" if "admin" on "parent_silo";\n\t"create_child" if "admin" on "parent_silo";\n\n\t# Fleet-level roles also grant privileges on identity providers.\n\t"read" if "viewer" on "parent_fleet";\n\t"list_children" if "viewer" on "parent_fleet";\n\t"modify" if "admin" on "parent_fleet";\n\t"create_child" if "admin" on "parent_fleet";\n}\nhas_relation(silo: Silo, "parent_silo", saml_identity_provider: SamlIdentityProvider)\n\tif saml_identity_provider.silo = silo;\nhas_relation(fleet: Fleet, "parent_fleet", collection: SamlIdentityProvider)\n\tif collection.silo.fleet = fleet;\n\nresource ScimClientBearerToken {\n\tpermissions = [ "read", "modify" ];\n\trelations = { parent_silo: Silo, parent_fleet: Fleet };\n\n # necessary to authenticate SCIM actors\n\t"read" if "external-authenticator" on "parent_fleet";\n\n\t# Silo-level roles grant privileges for SCIM client tokens.\n\t"read" if "admin" on "parent_silo";\n\t"modify" if "admin" on "parent_silo";\n\n\t# Fleet-level roles also grant privileges for SCIM client tokens.\n\t"read" if "admin" on "parent_fleet";\n\t"modify" if "admin" on "parent_fleet";\n}\nhas_relation(silo: Silo, "parent_silo", scim_client_bearer_token: ScimClientBearerToken)\n\tif scim_client_bearer_token.silo = silo;\nhas_relation(fleet: Fleet, "parent_fleet", collection: ScimClientBearerToken)\n\tif collection.silo.fleet = fleet;\n\n\n#\n# SYNTHETIC RESOURCES OUTSIDE THE SILO HIERARCHY\n#\n# The resources here do not correspond to anything that appears explicitly in\n# the API or is stored in the database. These are used either at the top level\n# of the API path (e.g., "/v1/system/ip-pools") or as an implementation detail of the system\n# (in the case of console sessions and "Database"). The policies are\n# either statically-defined in this file or driven by role assignments on the\n# Fleet. None of these resources defines their own roles.\n#\n\n# Describes the quiesce state of a particular Nexus instance.\n#\n# These authz checks must not require the database. We grant this directly to\n# callers of the internal API.\nresource QuiesceState {\n\tpermissions = [ "read", "modify" ];\n}\nhas_permission(USER_INTERNAL_API: AuthenticatedActor, "read", _q: QuiesceState);\nhas_permission(\n USER_INTERNAL_API: AuthenticatedActor,\n "modify",\n _q: QuiesceState\n);\n\n# Describes the policy for reading and modifying DNS configuration\n# (both internal and external)\nresource DnsConfig {\n\tpermissions = [ "read", "modify" ];\n\trelations = { parent_fleet: Fleet };\n\t# "external-authenticator" requires these permissions because that's the\n\t# context that Nexus uses when creating and deleting Silos. These\n\t# operations necessarily need to read and modify DNS configuration.\n\t"read" if "external-authenticator" on "parent_fleet";\n\t"modify" if "external-authenticator" on "parent_fleet";\n\t# "admin" on the parent fleet also gets these permissions, primarily for\n\t# the test suite.\n\t"read" if "admin" on "parent_fleet";\n\t"modify" if "admin" on "parent_fleet";\n}\nhas_relation(fleet: Fleet, "parent_fleet", dns_config: DnsConfig)\n\tif dns_config.fleet = fleet;\n\n# Describes the policy for accessing blueprints\nresource BlueprintConfig {\n\tpermissions = [\n\t "list_children", # list blueprints\n\t "create_child", # create blueprint\n\t "read", # read the current target\n\t "modify", # change the current target\n\t];\n\n\trelations = { parent_fleet: Fleet };\n\t"create_child" if "admin" on "parent_fleet";\n\t"modify" if "admin" on "parent_fleet";\n\t"list_children" if "viewer" on "parent_fleet";\n\t"read" if "viewer" on "parent_fleet";\n}\nhas_relation(fleet: Fleet, "parent_fleet", list: BlueprintConfig)\n\tif list.fleet = fleet;\n\n# Describes the policy for accessing "/v1/system/update/trust-roots" in the API\nresource UpdateTrustRootList {\n\tpermissions = [ "list_children", "create_child" ];\n\trelations = { parent_fleet: Fleet };\n\t"list_children" if "viewer" on "parent_fleet";\n\t"create_child" if "admin" on "parent_fleet";\n}\nhas_relation(fleet: Fleet, "parent_fleet", collection: UpdateTrustRootList)\n\tif collection.fleet = fleet;\n\n# Describes the policy for accessing blueprints\nresource TargetReleaseConfig {\n\tpermissions = [\n\t "read", # read the current target release\n\t "modify", # change the current target release\n\t];\n\n\trelations = { parent_fleet: Fleet };\n\t"read" if "viewer" on "parent_fleet";\n\t"modify" if "admin" on "parent_fleet";\n}\nhas_relation(fleet: Fleet, "parent_fleet", resource: TargetReleaseConfig)\n\tif resource.fleet = fleet;\n\n# Describes the policy for reading and modifying low-level inventory\nresource Inventory {\n\tpermissions = [ "read", "modify" ];\n\trelations = { parent_fleet: Fleet };\n\t"read" if "viewer" on "parent_fleet";\n\t"modify" if "admin" on "parent_fleet";\n}\nhas_relation(fleet: Fleet, "parent_fleet", inventory: Inventory)\n\tif inventory.fleet = fleet;\n\n# Describes the policy for accessing "/v1/system/ip-pools" in the API\nresource IpPoolList {\n\tpermissions = [\n\t "list_children",\n\t "modify",\n\t "create_child",\n\t];\n\n\t# Fleet Administrators can create or modify the IP Pools list.\n\trelations = { parent_fleet: Fleet };\n\t"modify" if "admin" on "parent_fleet";\n\t"create_child" if "admin" on "parent_fleet";\n\n\t# Fleet Viewers can list IP Pools\n\t"list_children" if "viewer" on "parent_fleet";\n}\nhas_relation(fleet: Fleet, "parent_fleet", ip_pool_list: IpPoolList)\n\tif ip_pool_list.fleet = fleet;\n\n# Any authenticated user can create a child of a provided IP Pool.\n# This is necessary to use the pools when provisioning instances.\nhas_permission(actor: AuthenticatedActor, "create_child", ip_pool: IpPool)\n\tif actor.is_user and silo in actor.silo and silo.fleet = ip_pool.fleet;\n\n# Describes the policy for accessing "/v1/multicast-groups" in the API\n# Groups are created when the first instance joins and deleted when the last leaves.\nresource MulticastGroupList {\n\tpermissions = [ "list_children" ];\n\n\trelations = { parent_fleet: Fleet };\n\n\t# Fleet Viewers can list multicast groups\n\t"list_children" if "viewer" on "parent_fleet";\n}\nhas_relation(fleet: Fleet, "parent_fleet", multicast_group_list: MulticastGroupList)\n\tif multicast_group_list.fleet = fleet;\n\n# Any authenticated user can list multicast groups in their fleet.\n# This enables silo users to discover groups for attaching instances,\n# without requiring the Fleet::Viewer role.\nhas_permission(actor: AuthenticatedActor, "list_children", multicast_group_list: MulticastGroupList)\n\tif actor.is_user and silo in actor.silo and silo.fleet = multicast_group_list.fleet;\n\n# MulticastGroup is a fleet-level discovery resource.\n# Join/leave authorization is gated by Instance::Modify, not the group itself.\nresource MulticastGroup {\n\tpermissions = [ "read", "list_children" ];\n\trelations = { parent_fleet: Fleet };\n}\nhas_relation(fleet: Fleet, "parent_fleet", multicast_group: MulticastGroup)\n\tif multicast_group.fleet = fleet;\n\n# Any authenticated user can read multicast groups in their fleet\nhas_permission(actor: AuthenticatedActor, "read", multicast_group: MulticastGroup)\n\tif actor.is_user and silo in actor.silo and silo.fleet = multicast_group.fleet;\n\n# Any authenticated user can list members of multicast groups in their fleet\nhas_permission(actor: AuthenticatedActor, "list_children", multicast_group: MulticastGroup)\n\tif actor.is_user and silo in actor.silo and silo.fleet = multicast_group.fleet;\n\n# Describes the policy for reading and writing the audit log\nresource AuditLog {\n\tpermissions = [\n\t "list_children", # retrieve audit log\n\t "create_child", # create audit log entry\n\t];\n\n\trelations = { parent_fleet: Fleet };\n\n\t# Fleet viewers can read the audit log\n\t"list_children" if "viewer" on "parent_fleet";\n}\n\n# Any actor should be able to write to the audit log because we need to be able\n# to write to the log from any request, authenticated or not. Audit log writes\n# are always a byproduct of other operations: there are no endpoints that allow\n# the user to write to the log deliberately. Note we use AuthenticatedActor\n# because we don't really mean unauthenticated -- in the case of login\n# operations, we use the external authenticator actor that creates the session\n# to authorize the audit log write.\nhas_permission(_actor: AuthenticatedActor, "create_child", _audit_log: AuditLog);\n\nhas_relation(fleet: Fleet, "parent_fleet", audit_log: AuditLog)\n\tif audit_log.fleet = fleet;\n\n# Describes the policy for creating and managing web console sessions.\nresource ConsoleSessionList {\n\tpermissions = [ "create_child" ];\n\trelations = { parent_fleet: Fleet };\n\t"create_child" if "external-authenticator" on "parent_fleet";\n}\nhas_relation(fleet: Fleet, "parent_fleet", collection: ConsoleSessionList)\n\tif collection.fleet = fleet;\n\n# Allow silo admins to delete and list user sessions\nresource SiloUserSessionList {\n permissions = [ "modify", "list_children" ];\n relations = { parent_silo: Silo };\n\n # A silo admin can modify (e.g., delete) a user's sessions.\n "modify" if "admin" on "parent_silo";\n\n # A silo admin can list a user's sessions.\n "list_children" if "admin" on "parent_silo";\n}\nhas_relation(silo: Silo, "parent_silo", authn_list: SiloUserSessionList)\n if authn_list.silo_user.silo = silo;\n\n# give users 'modify' and 'list_children' on their own sessions\nhas_permission(actor: AuthenticatedActor, "modify", authn_list: SiloUserSessionList)\n if actor.equals_silo_user(authn_list.silo_user);\nhas_permission(actor: AuthenticatedActor, "list_children", authn_list: SiloUserSessionList)\n if actor.equals_silo_user(authn_list.silo_user);\n\n# Allow silo admins to delete and list user access tokens\nresource SiloUserTokenList {\n permissions = [ "modify", "list_children" ];\n relations = { parent_silo: Silo };\n\n # A silo admin can modify (e.g., delete) a user's tokens.\n "modify" if "admin" on "parent_silo";\n\n # A silo admin can list a user's tokens.\n "list_children" if "admin" on "parent_silo";\n}\nhas_relation(silo: Silo, "parent_silo", authn_list: SiloUserTokenList)\n if authn_list.silo_user.silo = silo;\n\n# give users 'modify' and 'list_children' on their own tokens\nhas_permission(actor: AuthenticatedActor, "modify", authn_list: SiloUserTokenList)\n if actor.equals_silo_user(authn_list.silo_user);\nhas_permission(actor: AuthenticatedActor, "list_children", authn_list: SiloUserTokenList)\n if actor.equals_silo_user(authn_list.silo_user);\n\n# Describes the policy for creating and managing device authorization requests.\nresource DeviceAuthRequestList {\n\tpermissions = [ "create_child" ];\n\trelations = { parent_fleet: Fleet };\n\t"create_child" if "external-authenticator" on "parent_fleet";\n}\nhas_relation(fleet: Fleet, "parent_fleet", collection: DeviceAuthRequestList)\n\tif collection.fleet = fleet;\n\n# Describes the policy for creating and managing Silo certificates\nresource SiloCertificateList {\n\tpermissions = [ "list_children", "create_child" ];\n\n\trelations = { parent_silo: Silo, parent_fleet: Fleet };\n\n\t# Both Fleet and Silo administrators can see and modify the Silo's\n\t# certificates.\n\t"list_children" if "admin" on "parent_silo";\n\t"list_children" if "admin" on "parent_fleet";\n\t"create_child" if "admin" on "parent_silo";\n\t"create_child" if "admin" on "parent_fleet";\n}\nhas_relation(silo: Silo, "parent_silo", collection: SiloCertificateList)\n\tif collection.silo = silo;\nhas_relation(fleet: Fleet, "parent_fleet", collection: SiloCertificateList)\n\tif collection.silo.fleet = fleet;\n\n# Describes the policy for creating and managing Silo identity providers\nresource SiloIdentityProviderList {\n\tpermissions = [ "list_children", "create_child" ];\n\n\trelations = { parent_silo: Silo, parent_fleet: Fleet };\n\n\t# Everyone who can read the Silo (which includes all the users in the\n\t# Silo) can see the identity providers in it.\n\t"list_children" if "read" on "parent_silo";\n\n\t# Fleet and Silo administrators can manage the Silo's identity provider\n\t# configuration. This is one of the only areas of Silo configuration\n\t# that Fleet Administrators have permissions on. This is also one of\n\t# the only cases where we need to look two levels up the hierarchy to\n\t# see if somebody has the right permission. For most other things,\n\t# permissions cascade down the hierarchy so we only need to look at the\n\t# parent.\n\t"create_child" if "admin" on "parent_silo";\n\t"create_child" if "admin" on "parent_fleet";\n}\nhas_relation(silo: Silo, "parent_silo", collection: SiloIdentityProviderList)\n\tif collection.silo = silo;\nhas_relation(fleet: Fleet, "parent_fleet", collection: SiloIdentityProviderList)\n\tif collection.silo.fleet = fleet;\n\n# Describes the policy for creating and managing Silo users (mostly intended for\n# API-managed users)\nresource SiloUserList {\n\tpermissions = [ "list_children", "create_child" ];\n\n\trelations = { parent_silo: Silo, parent_fleet: Fleet };\n\n\t# Everyone who can read the Silo (which includes all the users in the\n\t# Silo) can see the users in it.\n\t"list_children" if "read" on "parent_silo";\n\n\t# Fleet and Silo administrators can manage the Silo's users. This is\n\t# one of the only areas of Silo configuration that Fleet Administrators\n\t# have permissions on. This is also one of the few cases (so far) where\n\t# we need to look two levels up the hierarchy to see if somebody has the\n\t# right permission. For most other things, permissions cascade down the\n\t# hierarchy so we only need to look at the parent.\n\t"create_child" if "admin" on "parent_silo";\n\t"list_children" if "admin" on "parent_fleet";\n\t"create_child" if "admin" on "parent_fleet";\n}\nhas_relation(silo: Silo, "parent_silo", collection: SiloUserList)\n\tif collection.silo = silo;\nhas_relation(fleet: Fleet, "parent_fleet", collection: SiloUserList)\n\tif collection.silo.fleet = fleet;\n\n# Grant SCIM IdP actors the permissions they need on users.\nhas_permission(actor: AuthenticatedActor, "read", silo_user: SiloUser)\n if actor.is_scim_idp and silo_user.silo in actor.silo;\nhas_permission(actor: AuthenticatedActor, "create_child", silo_user_list: SiloUserList)\n\tif actor.is_scim_idp and silo_user_list.silo in actor.silo;\nhas_permission(actor: AuthenticatedActor, "modify", silo_user: SiloUser)\n\tif actor.is_scim_idp and silo_user.silo in actor.silo;\nhas_permission(actor: AuthenticatedActor, "list_children", silo_user_list: SiloUserList)\n if actor.is_scim_idp and silo_user_list.silo in actor.silo;\n\n# Describes the policy for creating and managing Silo groups (mostly intended\n# for API-managed groups)\nresource SiloGroupList {\n\tpermissions = [ "list_children", "create_child" ];\n\n\trelations = { parent_silo: Silo, parent_fleet: Fleet };\n\n\t# Everyone who can read the Silo (which includes all the groups in the\n\t# Silo) can see the groups in it.\n\t"list_children" if "read" on "parent_silo";\n\n\t# Fleet and Silo administrators can manage the Silo's groups. This is\n\t# one of the only areas of Silo configuration that Fleet Administrators\n\t# have permissions on. This is also one of the few cases (so far) where\n\t# we need to look two levels up the hierarchy to see if somebody has the\n\t# right permission. For most other things, permissions cascade down the\n\t# hierarchy so we only need to look at the parent.\n\t"create_child" if "admin" on "parent_silo";\n\t"list_children" if "admin" on "parent_fleet";\n\t"create_child" if "admin" on "parent_fleet";\n}\nhas_relation(silo: Silo, "parent_silo", collection: SiloGroupList)\n\tif collection.silo = silo;\nhas_relation(fleet: Fleet, "parent_fleet", collection: SiloGroupList)\n\tif collection.silo.fleet = fleet;\n\n# Grant SCIM IdP actors the permissions they need on groups.\nhas_permission(actor: AuthenticatedActor, "read", silo_group: SiloGroup)\n if actor.is_scim_idp and silo_group.silo in actor.silo;\nhas_permission(actor: AuthenticatedActor, "create_child", silo_group_list: SiloGroupList)\n\tif actor.is_scim_idp and silo_group_list.silo in actor.silo;\nhas_permission(actor: AuthenticatedActor, "modify", silo_group: SiloGroup)\n\tif actor.is_scim_idp and silo_group.silo in actor.silo;\nhas_permission(actor: AuthenticatedActor, "list_children", silo_group_list: SiloGroupList)\n if actor.is_scim_idp and silo_group_list.silo in actor.silo;\n\n# These rules grants the external authenticator role the permissions it needs to\n# read silo users and modify their sessions. This is necessary for login to\n# work.\nhas_permission(actor: AuthenticatedActor, "read", silo: Silo)\n\tif has_role(actor, "external-authenticator", silo.fleet);\nhas_permission(actor: AuthenticatedActor, "read", user: SiloUser)\n\tif has_role(actor, "external-authenticator", user.silo.fleet);\nhas_permission(actor: AuthenticatedActor, "modify", user: SiloUser)\n\tif has_role(actor, "external-authenticator", user.silo.fleet);\nhas_permission(actor: AuthenticatedActor, "read", group: SiloGroup)\n\tif has_role(actor, "external-authenticator", group.silo.fleet);\nhas_permission(actor: AuthenticatedActor, "modify", group: SiloGroup)\n\tif has_role(actor, "external-authenticator", group.silo.fleet);\n\nhas_permission(actor: AuthenticatedActor, "read", session: ConsoleSession)\n\tif has_role(actor, "external-authenticator", session.fleet);\nhas_permission(actor: AuthenticatedActor, "modify", session: ConsoleSession)\n\tif has_role(actor, "external-authenticator", session.fleet);\n\n# All authenticated users can read and delete device authn requests because\n# by necessity these operations happen before we've figured out what user (or\n# even Silo) the device auth is associated with. Any user can claim a device\n# auth request with the right user code (that's how it works) -- it's the user\n# code and associated logic that prevents unauthorized access here.\nhas_permission(actor: AuthenticatedActor, "read", _device_auth: DeviceAuthRequest)\n if actor.is_user;\nhas_permission(actor: AuthenticatedActor, "modify", _device_auth: DeviceAuthRequest)\n if actor.is_user;\n\nhas_permission(actor: AuthenticatedActor, "read", device_token: DeviceAccessToken)\n\tif has_role(actor, "external-authenticator", device_token.fleet);\n\nhas_permission(actor: AuthenticatedActor, "read", identity_provider: IdentityProvider)\n\tif has_role(actor, "external-authenticator", identity_provider.silo.fleet);\n\nhas_permission(actor: AuthenticatedActor, "read", saml_identity_provider: SamlIdentityProvider)\n\tif has_role(actor, "external-authenticator", saml_identity_provider.silo.fleet);\n\n# Describes the policy for who can access the internal database.\nresource Database {\n\tpermissions = [\n\t # "query" is required to perform any query against the database,\n\t # whether a read or write query. This is checked when an operation\n\t # checks out a database connection from the connection pool.\n\t #\n\t # Any authenticated user gets this permission. There's generally\n\t # some other authz check involved in the database query. For\n\t # example, if you're querying the database to "read" a "Project", we\n\t # should also be checking that. So why do we do this at all? It's\n\t # a belt-and-suspenders measure so that if we somehow introduced an\n\t # unauthenticated code path that hits the database, it cannot be\n\t # used to DoS the database because we won't allow the operation to\n\t # make the query. (As long as the code path _is_ authenticated, we\n\t # can use throttling mechanisms to prevent DoS.)\n\t "query",\n\n\t # "modify" is required to populate database data that's delivered\n\t # with the system. It should also be required for schema changes,\n\t # when we support those. This is separate from "query" so that we\n\t # cannot accidentally invoke these code paths from API calls and\n\t # other general functions.\n\t "modify"\n\t];\n}\n\n# All authenticated users have the "query" permission on the database.\nhas_permission(_actor: AuthenticatedActor, "query", _resource: Database);\n\n# The "db-init" user is the only one with the "modify" permission.\nhas_permission(USER_DB_INIT: AuthenticatedActor, "modify", _resource: Database);\nhas_permission(USER_DB_INIT: AuthenticatedActor, "create_child", _resource: IpPoolList);\n# It also has "admin" on the internal silo to populate it with built-in resources.\n# TODO-completeness: actually limit to just internal silo and not all silos\nhas_role(USER_DB_INIT: AuthenticatedActor, "admin", _silo: Silo);\n\n# Allow the internal API admin permissions on all silos.\nhas_role(USER_INTERNAL_API: AuthenticatedActor, "admin", _silo: Silo);\n\nresource WebhookSecret {\n\tpermissions = [ "read", "modify" ];\n\trelations = { parent_alert_receiver: AlertReceiver };\n\n\t"read" if "read" on "parent_alert_receiver";\n\t"modify" if "modify" on "parent_alert_receiver";\n}\n\nhas_relation(rx: AlertReceiver, "parent_alert_receiver", secret: WebhookSecret)\n\tif secret.alert_receiver = rx;\n\nresource AlertClassList {\n\tpermissions = [ "list_children" ];\n\trelations = { parent_fleet: Fleet };\n\n\t"list_children" if "viewer" on "parent_fleet";\n}\n\nhas_relation(fleet: Fleet, "parent_fleet", collection: AlertClassList)\n\tif collection.fleet = fleet;\n\nresource ScimClientBearerTokenList {\n\tpermissions = [ "create_child", "list_children" ];\n\trelations = { parent_silo: Silo, parent_fleet: Fleet };\n\n\t# Silo-level roles grant privileges for SCIM client tokens.\n # These are all admin because being able to create these tokens would allow\n # a user to grant themselves admin by modifying group membership through SCIM calls\n\t"create_child" if "admin" on "parent_silo";\n\t"list_children" if "admin" on "parent_silo";\n\n # Fleet-level roles also grant privileges for SCIM client tokens, for\n # configuration before silo admins are present.\n\t"create_child" if "admin" on "parent_fleet";\n\t"list_children" if "admin" on "parent_fleet";\n}\nhas_relation(silo: Silo, "parent_silo", scim_client_bearer_token_list: ScimClientBearerTokenList)\n\tif scim_client_bearer_token_list.silo = silo;\nhas_relation(fleet: Fleet, "parent_fleet", collection: ScimClientBearerTokenList)\n\tif collection.silo.fleet = fleet;\n\n# VpcList is a synthetic resource for controlling VPC creation.\n# Unlike other project resources, VPC creation requires the full "collaborator"\n# role rather than "limited-collaborator", enforcing the networking restriction.\n# This allows organizations to restrict who can reconfigure the network topology\n# while still allowing users with limited-collaborator to work with compute\n# resources (instances, disks, etc.) within the existing network.\nresource VpcList {\n\tpermissions = [ "list_children", "create_child" ];\n\n\trelations = { containing_project: Project };\n\n\t"list_children" if "read" on "containing_project";\n\t"create_child" if "collaborator" on "containing_project";\n}\nhas_relation(project: Project, "containing_project", collection: VpcList)\n\tif collection.project = project;\n\n# Describes the policy for accessing "/v1/system/subnet-pools" in the API\nresource SubnetPoolList {\n\tpermissions = [\n\t "list_children",\n\t "modify",\n\t "create_child",\n\t];\n\n\t# Fleet Administrators can create or modify the Subnet Pools list.\n\trelations = { parent_fleet: Fleet };\n\t"modify" if "admin" on "parent_fleet";\n\t"create_child" if "admin" on "parent_fleet";\n\n\t# Fleet Viewers can list External Subnet Pools\n\t"list_children" if "viewer" on "parent_fleet";\n}\nhas_relation(fleet: Fleet, "parent_fleet", subnet_pool_list: SubnetPoolList)\n\tif subnet_pool_list.fleet = fleet;\n\n\n\n resource Disk {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = { containing_project: Project };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "limited-collaborator" on "containing_project";\n "create_child" if "limited-collaborator" on "containing_project";\n }\n\n has_relation(parent: Project, "containing_project", child: Disk)\n if child.project = parent;\n \n\n resource Snapshot {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = { containing_project: Project };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "limited-collaborator" on "containing_project";\n "create_child" if "limited-collaborator" on "containing_project";\n }\n\n has_relation(parent: Project, "containing_project", child: Snapshot)\n if child.project = parent;\n \n\n resource ProjectImage {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = { containing_project: Project };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "limited-collaborator" on "containing_project";\n "create_child" if "limited-collaborator" on "containing_project";\n }\n\n has_relation(parent: Project, "containing_project", child: ProjectImage)\n if child.project = parent;\n \n\n resource AffinityGroup {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = { containing_project: Project };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "limited-collaborator" on "containing_project";\n "create_child" if "limited-collaborator" on "containing_project";\n }\n\n has_relation(parent: Project, "containing_project", child: AffinityGroup)\n if child.project = parent;\n \n\n resource AntiAffinityGroup {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = { containing_project: Project };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "limited-collaborator" on "containing_project";\n "create_child" if "limited-collaborator" on "containing_project";\n }\n\n has_relation(parent: Project, "containing_project", child: AntiAffinityGroup)\n if child.project = parent;\n \n\n resource Instance {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = { containing_project: Project };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "limited-collaborator" on "containing_project";\n "create_child" if "limited-collaborator" on "containing_project";\n }\n\n has_relation(parent: Project, "containing_project", child: Instance)\n if child.project = parent;\n \n\n resource IpPool {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: IpPool)\n if child.fleet = fleet;\n \n\n resource InstanceNetworkInterface {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = {\n containing_project: Project,\n parent: Instance\n };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "limited-collaborator" on "containing_project";\n "create_child" if "limited-collaborator" on "containing_project";\n }\n\n has_relation(project: Project, "containing_project", child: InstanceNetworkInterface)\n if has_relation(project, "containing_project", child.instance);\n\n has_relation(parent: Instance, "parent", child: InstanceNetworkInterface)\n if child.instance = parent;\n \n\n resource Vpc {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = { containing_project: Project };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(parent: Project, "containing_project", child: Vpc)\n if child.project = parent;\n \n\n resource VpcRouter {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = {\n containing_project: Project,\n parent: Vpc\n };\n\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(project: Project, "containing_project", child: VpcRouter)\n if has_relation(project, "containing_project", child.vpc);\n\n has_relation(parent: Vpc, "parent", child: VpcRouter)\n if child.vpc = parent;\n \n\n resource InternetGateway {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = {\n containing_project: Project,\n parent: Vpc\n };\n\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(project: Project, "containing_project", child: InternetGateway)\n if has_relation(project, "containing_project", child.vpc);\n\n has_relation(parent: Vpc, "parent", child: InternetGateway)\n if child.vpc = parent;\n \n\n resource InternetGatewayIpPool {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = {\n containing_project: Project,\n parent: InternetGateway\n };\n\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(project: Project, "containing_project", child: InternetGatewayIpPool)\n if has_relation(project, "containing_project", child.internet_gateway);\n\n has_relation(parent: InternetGateway, "parent", child: InternetGatewayIpPool)\n if child.internet_gateway = parent;\n \n\n resource InternetGatewayIpAddress {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = {\n containing_project: Project,\n parent: InternetGateway\n };\n\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(project: Project, "containing_project", child: InternetGatewayIpAddress)\n if has_relation(project, "containing_project", child.internet_gateway);\n\n has_relation(parent: InternetGateway, "parent", child: InternetGatewayIpAddress)\n if child.internet_gateway = parent;\n \n\n resource RouterRoute {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = {\n containing_project: Project,\n parent: VpcRouter\n };\n\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(project: Project, "containing_project", child: RouterRoute)\n if has_relation(project, "containing_project", child.vpc_router);\n\n has_relation(parent: VpcRouter, "parent", child: RouterRoute)\n if child.vpc_router = parent;\n \n\n resource VpcSubnet {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = {\n containing_project: Project,\n parent: Vpc\n };\n\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(project: Project, "containing_project", child: VpcSubnet)\n if has_relation(project, "containing_project", child.vpc);\n\n has_relation(parent: Vpc, "parent", child: VpcSubnet)\n if child.vpc = parent;\n \n\n resource FloatingIp {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = { containing_project: Project };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "limited-collaborator" on "containing_project";\n "create_child" if "limited-collaborator" on "containing_project";\n }\n\n has_relation(parent: Project, "containing_project", child: FloatingIp)\n if child.project = parent;\n \n\n resource ExternalSubnet {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = { containing_project: Project };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(parent: Project, "containing_project", child: ExternalSubnet)\n if child.project = parent;\n \n\n resource Image {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = { containing_silo: Silo };\n "list_children" if "viewer" on "containing_silo";\n "read" if "viewer" on "containing_silo";\n "modify" if "collaborator" on "containing_silo";\n "create_child" if "collaborator" on "containing_silo";\n }\n\n has_relation(parent: Silo, "containing_silo", child: Image)\n if child.silo = parent;\n \n\n resource SiloImage {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = { containing_silo: Silo };\n "list_children" if "viewer" on "containing_silo";\n "read" if "viewer" on "containing_silo";\n "modify" if "collaborator" on "containing_silo";\n "create_child" if "collaborator" on "containing_silo";\n }\n\n has_relation(parent: Silo, "containing_silo", child: SiloImage)\n if child.silo = parent;\n \n\n resource AddressLot {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: AddressLot)\n if child.fleet = fleet;\n \n\n resource Blueprint {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: Blueprint)\n if child.fleet = fleet;\n \n\n resource LoopbackAddress {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: LoopbackAddress)\n if child.fleet = fleet;\n \n\n\n resource ConsoleSession {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: ConsoleSession)\n if child.fleet = fleet;\n \n\n resource DeviceAuthRequest {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: DeviceAuthRequest)\n if child.fleet = fleet;\n \n\n resource DeviceAccessToken {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: DeviceAccessToken)\n if child.fleet = fleet;\n \n\n resource PhysicalDisk {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: PhysicalDisk)\n if child.fleet = fleet;\n \n\n resource Rack {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: Rack)\n if child.fleet = fleet;\n \n\n\n\n\n\n resource SupportBundle {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: SupportBundle)\n if child.fleet = fleet;\n \n\n\n\n resource Sled {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: Sled)\n if child.fleet = fleet;\n \n\n resource SubnetPool {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: SubnetPool)\n if child.fleet = fleet;\n \n\n resource TufRepo {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: TufRepo)\n if child.fleet = fleet;\n \n\n resource TufArtifact {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: TufArtifact)\n if child.fleet = fleet;\n \n\n resource TufTrustRoot {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: TufTrustRoot)\n if child.fleet = fleet;\n \n\n resource Alert {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: Alert)\n if child.fleet = fleet;\n \n\n resource AlertReceiver {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: AlertReceiver)\n if child.fleet = fleet;\n \n\n\n resource Zpool {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: Zpool)\n if child.fleet = fleet;\n \n\n resource Service {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: Service)\n if child.fleet = fleet;\n \n\n resource UserBuiltin {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: UserBuiltin)\n if child.fleet = fleet;\n \n\n
1122026-01-27T01:13:46.186ZINFOtest_vpcs (ServerContext): Setting up resolver using DNS address: [::1]:46325
1132026-01-27T01:13:46.188ZINFOtest_vpcs (DnsResolver): new DNS resolver addresses = [[::1]:46325]
1142026-01-27T01:13:46.189ZINFOtest_vpcs (ServerContext): Setting up qorb database pool from a single host url = PostgresConfigWithUrl {\n url_raw: "postgresql://root@[::1]:42398/omicron?sslmode=disable",\n config: Config {\n user: Some(\n "root",\n ),\n password: None,\n dbname: Some(\n "omicron",\n ),\n options: None,\n application_name: None,\n ssl_mode: Disable,\n host: [\n Tcp(\n "::1",\n ),\n ],\n hostaddr: [],\n port: [\n 42398,\n ],\n connect_timeout: None,\n tcp_user_timeout: None,\n keepalives: true,\n keepalives_idle: 7200s,\n keepalives_interval: None,\n keepalives_retries: None,\n target_session_attrs: Any,\n channel_binding: Prefer,\n load_balance_hosts: Disable,\n },\n}
1152026-01-27T01:13:46.193ZDEBGtest_vpcs (ServerContext): registered USDT probes
1162026-01-27T01:13:48.170ZINFOtest_vpcs (datastore): Database schema version is up to date desired_version = 225.0.0 found_version = 225.0.0
1172026-01-27T01:13:48.193ZWARNtest_vpcs (datastore): No db_metadata_nexus records exist - skipping access check explanation = This is expected during initial deployment or before migration nexus_id = 913233fe-92a8-4635-9572-183f495429c4 (omicron_zone)
1182026-01-27T01:13:48.193ZINFOtest_vpcs (nexus): Datastore is ready for usage
1192026-01-27T01:13:48.415ZDEBGtest_vpcs (clickhouse-client): registered USDT probes id = df38f964-5286-427e-8663-f46b162c438f
1202026-01-27T01:13:48.578ZDEBGtest_vpcs (dropshot_internal): registered endpoint local_addr = 127.0.0.1:46983 method = POST path = /crucible/0/upstairs/{upstairs_id}/downstairs/{downstairs_id}/stop-request versions = all
1212026-01-27T01:13:48.579ZDEBGtest_vpcs (dropshot_internal): registered endpoint local_addr = 127.0.0.1:46983 method = POST path = /crucible/0/upstairs/{upstairs_id}/downstairs/{downstairs_id}/stopped versions = all
1222026-01-27T01:13:48.579ZDEBGtest_vpcs (dropshot_internal): registered endpoint local_addr = 127.0.0.1:46983 method = POST path = /crucible/0/upstairs/{upstairs_id}/repair/{repair_id}/progress versions = all
1232026-01-27T01:13:48.579ZDEBGtest_vpcs (dropshot_internal): registered endpoint local_addr = 127.0.0.1:46983 method = POST path = /crucible/0/upstairs/{upstairs_id}/repair-finish versions = all
1242026-01-27T01:13:48.579ZDEBGtest_vpcs (dropshot_internal): registered endpoint local_addr = 127.0.0.1:46983 method = POST path = /crucible/0/upstairs/{upstairs_id}/repair-start versions = all
1252026-01-27T01:13:48.579ZDEBGtest_vpcs (dropshot_internal): registered endpoint local_addr = 127.0.0.1:46983 method = POST path = /disk/{disk_id}/remove-read-only-parent versions = all
1262026-01-27T01:13:48.579ZDEBGtest_vpcs (dropshot_internal): registered endpoint local_addr = 127.0.0.1:46983 method = PUT path = /disks/{disk_id} versions = all
1272026-01-27T01:13:48.579ZDEBGtest_vpcs (dropshot_internal): registered endpoint local_addr = 127.0.0.1:46983 method = POST path = /metrics/collectors versions = all
1282026-01-27T01:13:48.579ZDEBGtest_vpcs (dropshot_internal): registered endpoint local_addr = 127.0.0.1:46983 method = GET path = /metrics/collectors/{collector_id}/producers versions = all
1292026-01-27T01:13:48.579ZDEBGtest_vpcs (dropshot_internal): registered endpoint local_addr = 127.0.0.1:46983 method = POST path = /metrics/producers versions = all
1302026-01-27T01:13:48.579ZDEBGtest_vpcs (dropshot_internal): registered endpoint local_addr = 127.0.0.1:46983 method = GET path = /nat/ipv4/changeset/{from_gen} versions = all
1312026-01-27T01:13:48.579ZDEBGtest_vpcs (dropshot_internal): registered endpoint local_addr = 127.0.0.1:46983 method = GET path = /probes/{sled} versions = all
1322026-01-27T01:13:48.579ZDEBGtest_vpcs (dropshot_internal): registered endpoint local_addr = 127.0.0.1:46983 method = POST path = /refresh-vpc-routes versions = all
1332026-01-27T01:13:48.579ZDEBGtest_vpcs (dropshot_internal): registered endpoint local_addr = 127.0.0.1:46983 method = GET path = /sled-agents/{sled_id} versions = all
1342026-01-27T01:13:48.579ZDEBGtest_vpcs (dropshot_internal): registered endpoint local_addr = 127.0.0.1:46983 method = POST path = /sled-agents/{sled_id} versions = all
1352026-01-27T01:13:48.579ZDEBGtest_vpcs (dropshot_internal): registered endpoint local_addr = 127.0.0.1:46983 method = PUT path = /switch/{switch_id} versions = all
1362026-01-27T01:13:48.579ZDEBGtest_vpcs (dropshot_internal): registered endpoint local_addr = 127.0.0.1:46983 method = GET path = /v1/ping versions = all
1372026-01-27T01:13:48.579ZDEBGtest_vpcs (dropshot_internal): registered endpoint local_addr = 127.0.0.1:46983 method = PUT path = /vmms/{propolis_id} versions = all
1382026-01-27T01:13:48.579ZDEBGtest_vpcs (dropshot_internal): registered endpoint local_addr = 127.0.0.1:46983 method = POST path = /volume/{volume_id}/remove-read-only-parent versions = all
1392026-01-27T01:13:48.579ZINFOtest_vpcs (dropshot_internal): listening local_addr = 127.0.0.1:46983
1402026-01-27T01:13:48.580ZDEBGtest_vpcs (dropshot_internal): successfully registered DTrace USDT probes local_addr = 127.0.0.1:46983
1412026-01-27T01:13:48.584ZDEBGtest_vpcs (dropshot_lockstep): registered endpoint local_addr = 127.0.0.1:47722 method = GET path = /bgtasks versions = all
1422026-01-27T01:13:48.584ZDEBGtest_vpcs (dropshot_lockstep): registered endpoint local_addr = 127.0.0.1:47722 method = POST path = /bgtasks/activate versions = all
1432026-01-27T01:13:48.584ZDEBGtest_vpcs (dropshot_lockstep): registered endpoint local_addr = 127.0.0.1:47722 method = GET path = /bgtasks/view/{bgtask_name} versions = all
1442026-01-27T01:13:48.584ZDEBGtest_vpcs (dropshot_lockstep): registered endpoint local_addr = 127.0.0.1:47722 method = GET path = /clickhouse/policy versions = all
1452026-01-27T01:13:48.584ZDEBGtest_vpcs (dropshot_lockstep): registered endpoint local_addr = 127.0.0.1:47722 method = POST path = /clickhouse/policy versions = all
1462026-01-27T01:13:48.584ZDEBGtest_vpcs (dropshot_lockstep): registered endpoint local_addr = 127.0.0.1:47722 method = GET path = /debug/fetch-omdb-binary versions = all
1472026-01-27T01:13:48.584ZDEBGtest_vpcs (dropshot_lockstep): registered endpoint local_addr = 127.0.0.1:47722 method = POST path = /demo-saga versions = all
1482026-01-27T01:13:48.584ZDEBGtest_vpcs (dropshot_lockstep): registered endpoint local_addr = 127.0.0.1:47722 method = POST path = /demo-saga/{demo_saga_id}/complete versions = all
1492026-01-27T01:13:48.584ZDEBGtest_vpcs (dropshot_lockstep): registered endpoint local_addr = 127.0.0.1:47722 method = GET path = /deployment/blueprints/all versions = all
1502026-01-27T01:13:48.584ZDEBGtest_vpcs (dropshot_lockstep): registered endpoint local_addr = 127.0.0.1:47722 method = DELETE path = /deployment/blueprints/all/{blueprint_id} versions = all
1512026-01-27T01:13:48.584ZDEBGtest_vpcs (dropshot_lockstep): registered endpoint local_addr = 127.0.0.1:47722 method = GET path = /deployment/blueprints/all/{blueprint_id} versions = all
1522026-01-27T01:13:48.584ZDEBGtest_vpcs (dropshot_lockstep): registered endpoint local_addr = 127.0.0.1:47722 method = POST path = /deployment/blueprints/import versions = all
1532026-01-27T01:13:48.584ZDEBGtest_vpcs (dropshot_lockstep): registered endpoint local_addr = 127.0.0.1:47722 method = POST path = /deployment/blueprints/regenerate versions = all
1542026-01-27T01:13:48.584ZDEBGtest_vpcs (dropshot_lockstep): registered endpoint local_addr = 127.0.0.1:47722 method = GET path = /deployment/blueprints/target versions = all
1552026-01-27T01:13:48.584ZDEBGtest_vpcs (dropshot_lockstep): registered endpoint local_addr = 127.0.0.1:47722 method = POST path = /deployment/blueprints/target versions = all
1562026-01-27T01:13:48.585ZDEBGtest_vpcs (dropshot_lockstep): registered endpoint local_addr = 127.0.0.1:47722 method = PUT path = /deployment/blueprints/target/enabled versions = all
1572026-01-27T01:13:48.585ZDEBGtest_vpcs (dropshot_lockstep): registered endpoint local_addr = 127.0.0.1:47722 method = GET path = /deployment/reconfigurator-config versions = all
1582026-01-27T01:13:48.585ZDEBGtest_vpcs (dropshot_lockstep): registered endpoint local_addr = 127.0.0.1:47722 method = POST path = /deployment/reconfigurator-config versions = all
1592026-01-27T01:13:48.585ZDEBGtest_vpcs (dropshot_lockstep): registered endpoint local_addr = 127.0.0.1:47722 method = GET path = /deployment/reconfigurator-config/{version} versions = all
1602026-01-27T01:13:48.585ZDEBGtest_vpcs (dropshot_lockstep): registered endpoint local_addr = 127.0.0.1:47722 method = GET path = /deployment/update-status versions = all
1612026-01-27T01:13:48.585ZDEBGtest_vpcs (dropshot_lockstep): registered endpoint local_addr = 127.0.0.1:47722 method = GET path = /experimental/v1/system/support-bundles versions = all
1622026-01-27T01:13:48.585ZDEBGtest_vpcs (dropshot_lockstep): registered endpoint local_addr = 127.0.0.1:47722 method = POST path = /experimental/v1/system/support-bundles versions = all
1632026-01-27T01:13:48.585ZDEBGtest_vpcs (dropshot_lockstep): registered endpoint local_addr = 127.0.0.1:47722 method = DELETE path = /experimental/v1/system/support-bundles/{bundle_id} versions = all
1642026-01-27T01:13:48.585ZDEBGtest_vpcs (dropshot_lockstep): registered endpoint local_addr = 127.0.0.1:47722 method = GET path = /experimental/v1/system/support-bundles/{bundle_id} versions = all
1652026-01-27T01:13:48.585ZDEBGtest_vpcs (dropshot_lockstep): registered endpoint local_addr = 127.0.0.1:47722 method = PUT path = /experimental/v1/system/support-bundles/{bundle_id} versions = all
1662026-01-27T01:13:48.585ZDEBGtest_vpcs (dropshot_lockstep): registered endpoint local_addr = 127.0.0.1:47722 method = GET path = /experimental/v1/system/support-bundles/{bundle_id}/download versions = all
1672026-01-27T01:13:48.585ZDEBGtest_vpcs (dropshot_lockstep): registered endpoint local_addr = 127.0.0.1:47722 method = HEAD path = /experimental/v1/system/support-bundles/{bundle_id}/download versions = all
1682026-01-27T01:13:48.585ZDEBGtest_vpcs (dropshot_lockstep): registered endpoint local_addr = 127.0.0.1:47722 method = GET path = /experimental/v1/system/support-bundles/{bundle_id}/download/{file} versions = all
1692026-01-27T01:13:48.585ZDEBGtest_vpcs (dropshot_lockstep): registered endpoint local_addr = 127.0.0.1:47722 method = HEAD path = /experimental/v1/system/support-bundles/{bundle_id}/download/{file} versions = all
1702026-01-27T01:13:48.585ZDEBGtest_vpcs (dropshot_lockstep): registered endpoint local_addr = 127.0.0.1:47722 method = GET path = /experimental/v1/system/support-bundles/{bundle_id}/index versions = all
1712026-01-27T01:13:48.585ZDEBGtest_vpcs (dropshot_lockstep): registered endpoint local_addr = 127.0.0.1:47722 method = POST path = /instances/{instance_id}/migrate versions = all
1722026-01-27T01:13:48.585ZDEBGtest_vpcs (dropshot_lockstep): registered endpoint local_addr = 127.0.0.1:47722 method = GET path = /mgs-updates versions = all
1732026-01-27T01:13:48.585ZDEBGtest_vpcs (dropshot_lockstep): registered endpoint local_addr = 127.0.0.1:47722 method = GET path = /oximeter/read-policy versions = all
1742026-01-27T01:13:48.585ZDEBGtest_vpcs (dropshot_lockstep): registered endpoint local_addr = 127.0.0.1:47722 method = POST path = /oximeter/read-policy versions = all
1752026-01-27T01:13:48.585ZDEBGtest_vpcs (dropshot_lockstep): registered endpoint local_addr = 127.0.0.1:47722 method = POST path = /physical-disk/expunge versions = all
1762026-01-27T01:13:48.586ZDEBGtest_vpcs (dropshot_lockstep): registered endpoint local_addr = 127.0.0.1:47722 method = GET path = /quiesce versions = all
1772026-01-27T01:13:48.586ZDEBGtest_vpcs (dropshot_lockstep): registered endpoint local_addr = 127.0.0.1:47722 method = POST path = /quiesce versions = all
1782026-01-27T01:13:48.586ZDEBGtest_vpcs (dropshot_lockstep): registered endpoint local_addr = 127.0.0.1:47722 method = PUT path = /racks/{rack_id}/initialization-complete versions = all
1792026-01-27T01:13:48.586ZDEBGtest_vpcs (dropshot_lockstep): registered endpoint local_addr = 127.0.0.1:47722 method = GET path = /sagas versions = all
1802026-01-27T01:13:48.586ZDEBGtest_vpcs (dropshot_lockstep): registered endpoint local_addr = 127.0.0.1:47722 method = GET path = /sagas/{saga_id} versions = all
1812026-01-27T01:13:48.586ZDEBGtest_vpcs (dropshot_lockstep): registered endpoint local_addr = 127.0.0.1:47722 method = POST path = /sleds/add versions = all
1822026-01-27T01:13:48.586ZDEBGtest_vpcs (dropshot_lockstep): registered endpoint local_addr = 127.0.0.1:47722 method = POST path = /sleds/expunge versions = all
1832026-01-27T01:13:48.586ZDEBGtest_vpcs (dropshot_lockstep): registered endpoint local_addr = 127.0.0.1:47722 method = GET path = /sleds/uninitialized versions = all
1842026-01-27T01:13:48.586ZDEBGtest_vpcs (dropshot_lockstep): registered endpoint local_addr = 127.0.0.1:47722 method = GET path = /trust-quorum/{rack_id}/config/latest versions = all
1852026-01-27T01:13:48.586ZDEBGtest_vpcs (dropshot_lockstep): registered endpoint local_addr = 127.0.0.1:47722 method = GET path = /v1/ping versions = all
1862026-01-27T01:13:48.586ZINFOtest_vpcs (dropshot_lockstep): listening local_addr = 127.0.0.1:47722
1872026-01-27T01:13:48.586ZDEBGtest_vpcs (dropshot_lockstep): successfully registered DTrace USDT probes local_addr = 127.0.0.1:47722
1882026-01-27T01:13:48.586ZINFOtest_vpcs (SEC): SEC running sec_id = 913233fe-92a8-4635-9572-183f495429c4
1892026-01-27T01:13:48.588ZTRACtest_vpcs (DataLoader): authorize begin action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database
1902026-01-27T01:13:48.588ZDEBGtest_vpcs (DataLoader): roles roles = RoleSet { roles: {} }
1912026-01-27T01:13:48.595ZDEBGtest_vpcs (DataLoader): authorize result action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
1922026-01-27T01:13:48.595ZDEBGtest_vpcs (DataLoader): attempting to create built-in users
1932026-01-27T01:13:48.597ZTRACtest_vpcs (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database
1942026-01-27T01:13:48.597ZDEBGtest_vpcs (DataLoader): roles roles = RoleSet { roles: {} }
1952026-01-27T01:13:48.598ZDEBGtest_vpcs (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
1962026-01-27T01:13:48.841ZINFOtest_vpcs (MgsUpdateDriver): starting MgsUpdateDriver
1972026-01-27T01:13:48.865ZTRACtest_vpcs (dns): buffer buffer = Length: 67 (0x43) bytes\n0000: 4f 5a 01 00 00 01 00 00 00 00 00 01 04 5f 6d 67 OZ..........._mg\n0010: 73 04 5f 74 63 70 0d 63 6f 6e 74 72 6f 6c 2d 70 s._tcp.control-p\n0020: 6c 61 6e 65 05 6f 78 69 64 65 08 69 6e 74 65 72 lane.oxide.inter\n0030: 6e 61 6c 00 00 21 00 01 00 00 29 04 d0 00 00 00 nal..!....).....\n0040: 00 00 00 ... kind = dns peer_addr = [::1]:63132 req_id = 5abc9421-cf02-4630-a75b-292ea8ffba91
1982026-01-27T01:13:48.865ZDEBGtest_vpcs (dns): message_request kind = dns mr = MessageRequest {\n header: Header {\n id: 20314,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n queries: Queries {\n queries: [\n LowerQuery {\n name: LowerName(\n Name("_mgs._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_mgs._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n ],\n original: [\n 4,\n 95,\n 109,\n 103,\n 115,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n flags: EdnsFlags {\n dnssec_ok: false,\n z: 0,\n },\n max_payload: 1232,\n options: OPT {\n options: [],\n },\n },\n ),\n} peer_addr = [::1]:63132 req_id = 5abc9421-cf02-4630-a75b-292ea8ffba91
1992026-01-27T01:13:48.867ZERROtest_vpcs (dns): failed to handle incoming DNS message: MessageRequest { header: Header { id: 20314, message_type: Query, op_code: Query, authoritative: false, truncation: false, recursion_desired: true, recursion_available: false, authentic_data: false, checking_disabled: false, response_code: NoError, query_count: 1, answer_count: 0, name_server_count: 0, additional_count: 1, }, queries: Queries { queries: [ LowerQuery { name: LowerName( Name("_mgs._tcp.control-plane.oxide.internal."), ), original: Query { name: Name("_mgs._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN, }, }, ], original: [ 4, 95, 109, 103, 115, 4, 95, 116, 99, 112, 13, 99, 111, 110, 116, 114, 111, 108, 45, 112, 108, 97, 110, 101, 5, 111, 120, 105, 100, 101, 8, 105, 110, 116, 101, 114, 110, 97, 108, 0, 0, 33, 0, 1, ], }, answers: [], name_servers: [], additionals: [], sig0: [], edns: Some( Edns { rcode_high: 0, version: 0, flags: EdnsFlags { dnssec_ok: false, z: 0, }, max_payload: 1232, options: OPT { options: [], }, }, ), } SERVFAIL: server is not authoritative for name: "_mgs._tcp.control-plane.oxide.internal." kind = dns peer_addr = [::1]:63132 req_id = 5abc9421-cf02-4630-a75b-292ea8ffba91
2002026-01-27T01:13:48.867ZTRACtest_vpcs (dns): buffer buffer = Length: 74 (0x4a) bytes\n0000: 31 96 01 00 00 01 00 00 00 00 00 01 0b 5f 72 65 1............_re\n0010: 70 6f 2d 64 65 70 6f 74 04 5f 74 63 70 0d 63 6f po-depot._tcp.co\n0020: 6e 74 72 6f 6c 2d 70 6c 61 6e 65 05 6f 78 69 64 ntrol-plane.oxid\n0030: 65 08 69 6e 74 65 72 6e 61 6c 00 00 21 00 01 00 e.internal..!...\n0040: 00 29 04 d0 00 00 00 00 00 00 .)........ kind = dns peer_addr = [::1]:64854 req_id = cd39c0bc-864f-4ba9-b154-dd584a52ab6c
2012026-01-27T01:13:48.867ZDEBGtest_vpcs (dns): message_request kind = dns mr = MessageRequest {\n header: Header {\n id: 12694,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n queries: Queries {\n queries: [\n LowerQuery {\n name: LowerName(\n Name("_repo-depot._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_repo-depot._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n ],\n original: [\n 11,\n 95,\n 114,\n 101,\n 112,\n 111,\n 45,\n 100,\n 101,\n 112,\n 111,\n 116,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n flags: EdnsFlags {\n dnssec_ok: false,\n z: 0,\n },\n max_payload: 1232,\n options: OPT {\n options: [],\n },\n },\n ),\n} peer_addr = [::1]:64854 req_id = cd39c0bc-864f-4ba9-b154-dd584a52ab6c
2022026-01-27T01:13:48.868ZERROtest_vpcs (dns): failed to handle incoming DNS message: MessageRequest { header: Header { id: 12694, message_type: Query, op_code: Query, authoritative: false, truncation: false, recursion_desired: true, recursion_available: false, authentic_data: false, checking_disabled: false, response_code: NoError, query_count: 1, answer_count: 0, name_server_count: 0, additional_count: 1, }, queries: Queries { queries: [ LowerQuery { name: LowerName( Name("_repo-depot._tcp.control-plane.oxide.internal."), ), original: Query { name: Name("_repo-depot._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN, }, }, ], original: [ 11, 95, 114, 101, 112, 111, 45, 100, 101, 112, 111, 116, 4, 95, 116, 99, 112, 13, 99, 111, 110, 116, 114, 111, 108, 45, 112, 108, 97, 110, 101, 5, 111, 120, 105, 100, 101, 8, 105, 110, 116, 101, 114, 110, 97, 108, 0, 0, 33, 0, 1, ], }, answers: [], name_servers: [], additionals: [], sig0: [], edns: Some( Edns { rcode_high: 0, version: 0, flags: EdnsFlags { dnssec_ok: false, z: 0, }, max_payload: 1232, options: OPT { options: [], }, }, ), } SERVFAIL: server is not authoritative for name: "_repo-depot._tcp.control-plane.oxide.internal." kind = dns peer_addr = [::1]:64854 req_id = cd39c0bc-864f-4ba9-b154-dd584a52ab6c
2032026-01-27T01:13:48.868ZTRACtest_vpcs (dns): buffer buffer = Length: 79 (0x4f) bytes\n0000: 80 b2 01 00 00 01 00 00 00 00 00 01 10 5f 63 72 ............._cr\n0010: 75 63 69 62 6c 65 2d 70 61 6e 74 72 79 04 5f 74 ucible-pantry._t\n0020: 63 70 0d 63 6f 6e 74 72 6f 6c 2d 70 6c 61 6e 65 cp.control-plane\n0030: 05 6f 78 69 64 65 08 69 6e 74 65 72 6e 61 6c 00 .oxide.internal.\n0040: 00 21 00 01 00 00 29 04 d0 00 00 00 00 00 00 .!....)........ kind = dns peer_addr = [::1]:57919 req_id = 712875b1-704d-462e-a96d-fadb733ced31
2042026-01-27T01:13:48.868ZDEBGtest_vpcs (dns): message_request kind = dns mr = MessageRequest {\n header: Header {\n id: 32946,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n queries: Queries {\n queries: [\n LowerQuery {\n name: LowerName(\n Name("_crucible-pantry._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_crucible-pantry._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n ],\n original: [\n 16,\n 95,\n 99,\n 114,\n 117,\n 99,\n 105,\n 98,\n 108,\n 101,\n 45,\n 112,\n 97,\n 110,\n 116,\n 114,\n 121,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n flags: EdnsFlags {\n dnssec_ok: false,\n z: 0,\n },\n max_payload: 1232,\n options: OPT {\n options: [],\n },\n },\n ),\n} peer_addr = [::1]:57919 req_id = 712875b1-704d-462e-a96d-fadb733ced31
2052026-01-27T01:13:48.868ZERROtest_vpcs (dns): failed to handle incoming DNS message: MessageRequest { header: Header { id: 32946, message_type: Query, op_code: Query, authoritative: false, truncation: false, recursion_desired: true, recursion_available: false, authentic_data: false, checking_disabled: false, response_code: NoError, query_count: 1, answer_count: 0, name_server_count: 0, additional_count: 1, }, queries: Queries { queries: [ LowerQuery { name: LowerName( Name("_crucible-pantry._tcp.control-plane.oxide.internal."), ), original: Query { name: Name("_crucible-pantry._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN, }, }, ], original: [ 16, 95, 99, 114, 117, 99, 105, 98, 108, 101, 45, 112, 97, 110, 116, 114, 121, 4, 95, 116, 99, 112, 13, 99, 111, 110, 116, 114, 111, 108, 45, 112, 108, 97, 110, 101, 5, 111, 120, 105, 100, 101, 8, 105, 110, 116, 101, 114, 110, 97, 108, 0, 0, 33, 0, 1, ], }, answers: [], name_servers: [], additionals: [], sig0: [], edns: Some( Edns { rcode_high: 0, version: 0, flags: EdnsFlags { dnssec_ok: false, z: 0, }, max_payload: 1232, options: OPT { options: [], }, }, ), } SERVFAIL: server is not authoritative for name: "_crucible-pantry._tcp.control-plane.oxide.internal." kind = dns peer_addr = [::1]:57919 req_id = 712875b1-704d-462e-a96d-fadb733ced31
2062026-01-27T01:13:48.885ZINFOtest_vpcs (DataLoader): created 5 built-in users
2072026-01-27T01:13:48.886ZTRACtest_vpcs (DataLoader): authorize begin action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database
2082026-01-27T01:13:48.886ZDEBGtest_vpcs (DataLoader): roles roles = RoleSet { roles: {} }
2092026-01-27T01:13:48.889ZDEBGtest_vpcs (DataLoader): authorize result action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
2102026-01-27T01:13:48.893ZDEBGtest_vpcs (DataLoader): attempting to create built-in role assignments
2112026-01-27T01:13:48.893ZTRACtest_vpcs (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database
2122026-01-27T01:13:48.893ZDEBGtest_vpcs (DataLoader): roles roles = RoleSet { roles: {} }
2132026-01-27T01:13:48.894ZDEBGtest_vpcs (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
2142026-01-27T01:13:49.270ZINFOtest_vpcs (DataLoader): created 4 built-in role assignments
2152026-01-27T01:13:49.270ZTRACtest_vpcs (DataLoader): authorize begin action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database
2162026-01-27T01:13:49.270ZDEBGtest_vpcs (DataLoader): roles roles = RoleSet { roles: {} }
2172026-01-27T01:13:49.273ZDEBGtest_vpcs (DataLoader): authorize result action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
2182026-01-27T01:13:49.274ZDEBGtest_vpcs (DataLoader): attempting to create built-in silos
2192026-01-27T01:13:49.274ZTRACtest_vpcs (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database
2202026-01-27T01:13:49.274ZDEBGtest_vpcs (DataLoader): roles roles = RoleSet { roles: {} }
2212026-01-27T01:13:49.274ZDEBGtest_vpcs (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
2222026-01-27T01:13:49.420ZINFOtest_vpcs (DataLoader): created 2 built-in silos
2232026-01-27T01:13:49.420ZTRACtest_vpcs (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database
2242026-01-27T01:13:49.420ZDEBGtest_vpcs (DataLoader): roles roles = RoleSet { roles: {} }
2252026-01-27T01:13:49.420ZDEBGtest_vpcs (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
2262026-01-27T01:13:49.454ZTRACtest_vpcs (DataLoader): authorize begin action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database
2272026-01-27T01:13:49.454ZDEBGtest_vpcs (DataLoader): roles roles = RoleSet { roles: {} }
2282026-01-27T01:13:49.456ZDEBGtest_vpcs (DataLoader): authorize result action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
2292026-01-27T01:13:49.457ZDEBGtest_vpcs (DataLoader): attempting to create built-in projects
2302026-01-27T01:13:49.457ZTRACtest_vpcs (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database
2312026-01-27T01:13:49.457ZDEBGtest_vpcs (DataLoader): roles roles = RoleSet { roles: {} }
2322026-01-27T01:13:49.457ZDEBGtest_vpcs (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
2332026-01-27T01:13:49.470ZTRACtest_vpcs (DataLoader): authorize begin action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }
2342026-01-27T01:13:49.470ZTRACtest_vpcs (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. } resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
2352026-01-27T01:13:49.470ZTRACtest_vpcs (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database
2362026-01-27T01:13:49.471ZDEBGtest_vpcs (DataLoader): roles roles = RoleSet { roles: {} }
2372026-01-27T01:13:49.471ZDEBGtest_vpcs (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
2382026-01-27T01:13:49.544ZTRACtest_vpcs (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
2392026-01-27T01:13:49.544ZTRACtest_vpcs (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database
2402026-01-27T01:13:49.544ZDEBGtest_vpcs (DataLoader): roles roles = RoleSet { roles: {} }
2412026-01-27T01:13:49.545ZDEBGtest_vpcs (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
2422026-01-27T01:13:49.552ZDEBGtest_vpcs (DataLoader): roles roles = RoleSet { roles: {} }
2432026-01-27T01:13:49.557ZDEBGtest_vpcs (DataLoader): authorize result action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) } result = Ok(())
2442026-01-27T01:13:49.557ZTRACtest_vpcs (DataLoader): authorize begin action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }
2452026-01-27T01:13:49.557ZTRACtest_vpcs (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. } resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
2462026-01-27T01:13:49.557ZTRACtest_vpcs (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database
2472026-01-27T01:13:49.558ZDEBGtest_vpcs (DataLoader): roles roles = RoleSet { roles: {} }
2482026-01-27T01:13:49.558ZDEBGtest_vpcs (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
2492026-01-27T01:13:49.569ZTRACtest_vpcs (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
2502026-01-27T01:13:49.569ZTRACtest_vpcs (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database
2512026-01-27T01:13:49.569ZDEBGtest_vpcs (DataLoader): roles roles = RoleSet { roles: {} }
2522026-01-27T01:13:49.569ZDEBGtest_vpcs (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
2532026-01-27T01:13:49.573ZDEBGtest_vpcs (DataLoader): roles roles = RoleSet { roles: {} }
2542026-01-27T01:13:49.578ZDEBGtest_vpcs (DataLoader): authorize result action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) } result = Ok(())
2552026-01-27T01:13:49.578ZTRACtest_vpcs (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database
2562026-01-27T01:13:49.578ZDEBGtest_vpcs (DataLoader): roles roles = RoleSet { roles: {} }
2572026-01-27T01:13:49.579ZDEBGtest_vpcs (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
2582026-01-27T01:13:49.614ZINFOtest_vpcs (DataLoader): created built-in services project
2592026-01-27T01:13:49.614ZTRACtest_vpcs (DataLoader): authorize begin action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database
2602026-01-27T01:13:49.614ZDEBGtest_vpcs (DataLoader): roles roles = RoleSet { roles: {} }
2612026-01-27T01:13:49.616ZDEBGtest_vpcs (DataLoader): authorize result action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
2622026-01-27T01:13:49.616ZDEBGtest_vpcs (DataLoader): attempting to create built-in VPCs
2632026-01-27T01:13:49.616ZTRACtest_vpcs (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database
2642026-01-27T01:13:49.616ZDEBGtest_vpcs (DataLoader): roles roles = RoleSet { roles: {} }
2652026-01-27T01:13:49.617ZDEBGtest_vpcs (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
2662026-01-27T01:13:49.624ZTRACtest_vpcs (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database
2672026-01-27T01:13:49.624ZDEBGtest_vpcs (DataLoader): roles roles = RoleSet { roles: {} }
2682026-01-27T01:13:49.625ZDEBGtest_vpcs (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
2692026-01-27T01:13:49.640ZTRACtest_vpcs (DataLoader): authorize begin action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }
2702026-01-27T01:13:49.640ZTRACtest_vpcs (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. } resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
2712026-01-27T01:13:49.641ZTRACtest_vpcs (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database
2722026-01-27T01:13:49.641ZDEBGtest_vpcs (DataLoader): roles roles = RoleSet { roles: {} }
2732026-01-27T01:13:49.641ZDEBGtest_vpcs (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
2742026-01-27T01:13:49.653ZTRACtest_vpcs (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. } resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
2752026-01-27T01:13:49.653ZTRACtest_vpcs (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database
2762026-01-27T01:13:49.653ZDEBGtest_vpcs (DataLoader): roles roles = RoleSet { roles: {} }
2772026-01-27T01:13:49.654ZDEBGtest_vpcs (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
2782026-01-27T01:13:49.666ZTRACtest_vpcs (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
2792026-01-27T01:13:49.666ZTRACtest_vpcs (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database
2802026-01-27T01:13:49.666ZDEBGtest_vpcs (DataLoader): roles roles = RoleSet { roles: {} }
2812026-01-27T01:13:49.666ZDEBGtest_vpcs (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
2822026-01-27T01:13:49.689ZDEBGtest_vpcs (DataLoader): roles roles = RoleSet { roles: {} }
2832026-01-27T01:13:49.697ZDEBGtest_vpcs (DataLoader): authorize result action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) } result = Ok(())
2842026-01-27T01:13:49.697ZTRACtest_vpcs (DataLoader): successful lookup of siloed resource "Project" using built-in user
2852026-01-27T01:13:49.698ZTRACtest_vpcs (DataLoader): authorize begin action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }
2862026-01-27T01:13:49.698ZTRACtest_vpcs (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. } resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
2872026-01-27T01:13:49.698ZTRACtest_vpcs (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database
2882026-01-27T01:13:49.698ZDEBGtest_vpcs (DataLoader): roles roles = RoleSet { roles: {} }
2892026-01-27T01:13:49.698ZDEBGtest_vpcs (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
2902026-01-27T01:13:49.715ZTRACtest_vpcs (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. } resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
2912026-01-27T01:13:49.715ZTRACtest_vpcs (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database
2922026-01-27T01:13:49.715ZDEBGtest_vpcs (DataLoader): roles roles = RoleSet { roles: {} }
2932026-01-27T01:13:49.716ZDEBGtest_vpcs (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
2942026-01-27T01:13:49.805ZTRACtest_vpcs (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
2952026-01-27T01:13:49.806ZTRACtest_vpcs (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database
2962026-01-27T01:13:49.806ZDEBGtest_vpcs (DataLoader): roles roles = RoleSet { roles: {} }
2972026-01-27T01:13:49.806ZDEBGtest_vpcs (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
2982026-01-27T01:13:49.818ZDEBGtest_vpcs (DataLoader): roles roles = RoleSet { roles: {} }
2992026-01-27T01:13:49.827ZDEBGtest_vpcs (DataLoader): authorize result action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) } result = Ok(())
3002026-01-27T01:13:49.827ZTRACtest_vpcs (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database
3012026-01-27T01:13:49.827ZDEBGtest_vpcs (DataLoader): roles roles = RoleSet { roles: {} }
3022026-01-27T01:13:49.827ZDEBGtest_vpcs (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
3032026-01-27T01:13:49.849ZTRACtest_vpcs (DataLoader): authorize begin action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }
3042026-01-27T01:13:49.849ZTRACtest_vpcs (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. } resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
3052026-01-27T01:13:49.849ZTRACtest_vpcs (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database
3062026-01-27T01:13:49.849ZDEBGtest_vpcs (DataLoader): roles roles = RoleSet { roles: {} }
3072026-01-27T01:13:49.850ZDEBGtest_vpcs (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
3082026-01-27T01:13:49.857ZTRACtest_vpcs (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. } resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
3092026-01-27T01:13:49.858ZTRACtest_vpcs (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database
3102026-01-27T01:13:49.858ZDEBGtest_vpcs (DataLoader): roles roles = RoleSet { roles: {} }
3112026-01-27T01:13:49.858ZDEBGtest_vpcs (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
3122026-01-27T01:13:49.867ZTRACtest_vpcs (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
3132026-01-27T01:13:49.867ZTRACtest_vpcs (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database
3142026-01-27T01:13:49.867ZDEBGtest_vpcs (DataLoader): roles roles = RoleSet { roles: {} }
3152026-01-27T01:13:49.876ZDEBGtest_vpcs (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
3162026-01-27T01:13:49.881ZDEBGtest_vpcs (DataLoader): roles roles = RoleSet { roles: {} }
3172026-01-27T01:13:49.890ZDEBGtest_vpcs (DataLoader): authorize result action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") } result = Ok(())
3182026-01-27T01:13:49.890ZTRACtest_vpcs (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database
3192026-01-27T01:13:49.890ZDEBGtest_vpcs (DataLoader): roles roles = RoleSet { roles: {} }
3202026-01-27T01:13:49.891ZDEBGtest_vpcs (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
3212026-01-27T01:13:49.918ZTRACtest_vpcs (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database
3222026-01-27T01:13:49.919ZDEBGtest_vpcs (DataLoader): roles roles = RoleSet { roles: {} }
3232026-01-27T01:13:49.920ZDEBGtest_vpcs (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
3242026-01-27T01:13:49.931ZTRACtest_vpcs (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database
3252026-01-27T01:13:49.931ZDEBGtest_vpcs (DataLoader): roles roles = RoleSet { roles: {} }
3262026-01-27T01:13:49.932ZDEBGtest_vpcs (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
3272026-01-27T01:13:49.938ZTRACtest_vpcs (DataLoader): authorize begin action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }
3282026-01-27T01:13:49.938ZTRACtest_vpcs (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. } resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
3292026-01-27T01:13:49.938ZTRACtest_vpcs (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database
3302026-01-27T01:13:49.939ZDEBGtest_vpcs (DataLoader): roles roles = RoleSet { roles: {} }
3312026-01-27T01:13:49.939ZDEBGtest_vpcs (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
3322026-01-27T01:13:49.952ZTRACtest_vpcs (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. } resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
3332026-01-27T01:13:49.952ZTRACtest_vpcs (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database
3342026-01-27T01:13:49.952ZDEBGtest_vpcs (DataLoader): roles roles = RoleSet { roles: {} }
3352026-01-27T01:13:49.953ZDEBGtest_vpcs (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
3362026-01-27T01:13:49.956ZTRACtest_vpcs (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
3372026-01-27T01:13:49.956ZTRACtest_vpcs (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database
3382026-01-27T01:13:49.956ZDEBGtest_vpcs (DataLoader): roles roles = RoleSet { roles: {} }
3392026-01-27T01:13:49.958ZDEBGtest_vpcs (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
3402026-01-27T01:13:49.970ZDEBGtest_vpcs (DataLoader): roles roles = RoleSet { roles: {} }
3412026-01-27T01:13:49.980ZDEBGtest_vpcs (DataLoader): authorize result action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") } result = Ok(())
3422026-01-27T01:13:49.980ZTRACtest_vpcs (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database
3432026-01-27T01:13:49.980ZDEBGtest_vpcs (DataLoader): roles roles = RoleSet { roles: {} }
3442026-01-27T01:13:49.981ZDEBGtest_vpcs (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
3452026-01-27T01:13:50.065ZTRACtest_vpcs (DataLoader): authorize begin action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-074c-4000-8000-000000000001, lookup_type: ById(001de000-074c-4000-8000-000000000001) }
3462026-01-27T01:13:50.065ZTRACtest_vpcs (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. } resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
3472026-01-27T01:13:50.065ZTRACtest_vpcs (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database
3482026-01-27T01:13:50.065ZDEBGtest_vpcs (DataLoader): roles roles = RoleSet { roles: {} }
3492026-01-27T01:13:50.066ZDEBGtest_vpcs (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
3502026-01-27T01:13:50.150ZTRACtest_vpcs (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. } resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
3512026-01-27T01:13:50.150ZTRACtest_vpcs (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database
3522026-01-27T01:13:50.150ZDEBGtest_vpcs (DataLoader): roles roles = RoleSet { roles: {} }
3532026-01-27T01:13:50.152ZDEBGtest_vpcs (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
3542026-01-27T01:13:50.165ZTRACtest_vpcs (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
3552026-01-27T01:13:50.165ZTRACtest_vpcs (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database
3562026-01-27T01:13:50.165ZDEBGtest_vpcs (DataLoader): roles roles = RoleSet { roles: {} }
3572026-01-27T01:13:50.166ZDEBGtest_vpcs (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
3582026-01-27T01:13:50.171ZDEBGtest_vpcs (DataLoader): roles roles = RoleSet { roles: {} }
3592026-01-27T01:13:50.195ZDEBGtest_vpcs (DataLoader): authorize result action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-074c-4000-8000-000000000001, lookup_type: ById(001de000-074c-4000-8000-000000000001) } result = Ok(())
3602026-01-27T01:13:50.195ZTRACtest_vpcs (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database
3612026-01-27T01:13:50.196ZDEBGtest_vpcs (DataLoader): roles roles = RoleSet { roles: {} }
3622026-01-27T01:13:50.196ZDEBGtest_vpcs (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
3632026-01-27T01:13:50.309ZTRACtest_vpcs (DataLoader): authorize begin action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-074c-4000-8000-000000000001, lookup_type: ById(001de000-074c-4000-8000-000000000001) }
3642026-01-27T01:13:50.309ZTRACtest_vpcs (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. } resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
3652026-01-27T01:13:50.309ZTRACtest_vpcs (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database
3662026-01-27T01:13:50.309ZDEBGtest_vpcs (DataLoader): roles roles = RoleSet { roles: {} }
3672026-01-27T01:13:50.309ZDEBGtest_vpcs (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
3682026-01-27T01:13:50.315ZTRACtest_vpcs (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. } resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
3692026-01-27T01:13:50.315ZTRACtest_vpcs (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database
3702026-01-27T01:13:50.315ZDEBGtest_vpcs (DataLoader): roles roles = RoleSet { roles: {} }
3712026-01-27T01:13:50.316ZDEBGtest_vpcs (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
3722026-01-27T01:13:50.320ZTRACtest_vpcs (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
3732026-01-27T01:13:50.321ZTRACtest_vpcs (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database
3742026-01-27T01:13:50.321ZDEBGtest_vpcs (DataLoader): roles roles = RoleSet { roles: {} }
3752026-01-27T01:13:50.322ZDEBGtest_vpcs (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
3762026-01-27T01:13:50.326ZDEBGtest_vpcs (DataLoader): roles roles = RoleSet { roles: {} }
3772026-01-27T01:13:50.341ZDEBGtest_vpcs (DataLoader): authorize result action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-074c-4000-8000-000000000001, lookup_type: ById(001de000-074c-4000-8000-000000000001) } result = Ok(())
3782026-01-27T01:13:50.341ZTRACtest_vpcs (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database
3792026-01-27T01:13:50.341ZDEBGtest_vpcs (DataLoader): roles roles = RoleSet { roles: {} }
3802026-01-27T01:13:50.342ZDEBGtest_vpcs (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
3812026-01-27T01:13:50.354ZDEBGtest_vpcs (DataLoader): attempting to create built-in VPC firewall rules
3822026-01-27T01:13:50.355ZTRACtest_vpcs (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database
3832026-01-27T01:13:50.355ZDEBGtest_vpcs (DataLoader): roles roles = RoleSet { roles: {} }
3842026-01-27T01:13:50.356ZDEBGtest_vpcs (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
3852026-01-27T01:13:50.363ZTRACtest_vpcs (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database
3862026-01-27T01:13:50.363ZDEBGtest_vpcs (DataLoader): roles roles = RoleSet { roles: {} }
3872026-01-27T01:13:50.364ZDEBGtest_vpcs (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
3882026-01-27T01:13:50.368ZTRACtest_vpcs (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database
3892026-01-27T01:13:50.368ZDEBGtest_vpcs (DataLoader): roles roles = RoleSet { roles: {} }
3902026-01-27T01:13:50.369ZDEBGtest_vpcs (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
3912026-01-27T01:13:50.375ZTRACtest_vpcs (DataLoader): authorize begin action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
3922026-01-27T01:13:50.375ZTRACtest_vpcs (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. } resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
3932026-01-27T01:13:50.375ZTRACtest_vpcs (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database
3942026-01-27T01:13:50.376ZDEBGtest_vpcs (DataLoader): roles roles = RoleSet { roles: {} }
3952026-01-27T01:13:50.386ZDEBGtest_vpcs (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
3962026-01-27T01:13:50.391ZTRACtest_vpcs (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. } resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
3972026-01-27T01:13:50.391ZTRACtest_vpcs (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database
3982026-01-27T01:13:50.391ZDEBGtest_vpcs (DataLoader): roles roles = RoleSet { roles: {} }
3992026-01-27T01:13:50.392ZDEBGtest_vpcs (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
4002026-01-27T01:13:50.399ZTRACtest_vpcs (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
4012026-01-27T01:13:50.399ZTRACtest_vpcs (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database
4022026-01-27T01:13:50.399ZDEBGtest_vpcs (DataLoader): roles roles = RoleSet { roles: {} }
4032026-01-27T01:13:50.400ZDEBGtest_vpcs (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
4042026-01-27T01:13:50.415ZDEBGtest_vpcs (DataLoader): roles roles = RoleSet { roles: {} }
4052026-01-27T01:13:50.425ZDEBGtest_vpcs (DataLoader): authorize result action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) } result = Ok(())
4062026-01-27T01:13:50.425ZTRACtest_vpcs (DataLoader): successful lookup of siloed resource "Vpc" using built-in user
4072026-01-27T01:13:50.425ZTRACtest_vpcs (DataLoader): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
4082026-01-27T01:13:50.426ZTRACtest_vpcs (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. } resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
4092026-01-27T01:13:50.426ZTRACtest_vpcs (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database
4102026-01-27T01:13:50.426ZDEBGtest_vpcs (DataLoader): roles roles = RoleSet { roles: {} }
4112026-01-27T01:13:50.427ZDEBGtest_vpcs (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
4122026-01-27T01:13:50.432ZTRACtest_vpcs (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. } resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
4132026-01-27T01:13:50.432ZTRACtest_vpcs (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database
4142026-01-27T01:13:50.432ZDEBGtest_vpcs (DataLoader): roles roles = RoleSet { roles: {} }
4152026-01-27T01:13:50.433ZDEBGtest_vpcs (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
4162026-01-27T01:13:50.436ZTRACtest_vpcs (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
4172026-01-27T01:13:50.436ZTRACtest_vpcs (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database
4182026-01-27T01:13:50.436ZDEBGtest_vpcs (DataLoader): roles roles = RoleSet { roles: {} }
4192026-01-27T01:13:50.437ZDEBGtest_vpcs (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
4202026-01-27T01:13:50.443ZDEBGtest_vpcs (DataLoader): roles roles = RoleSet { roles: {} }
4212026-01-27T01:13:50.456ZDEBGtest_vpcs (DataLoader): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) } result = Ok(())
4222026-01-27T01:13:50.456ZTRACtest_vpcs (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database
4232026-01-27T01:13:50.456ZDEBGtest_vpcs (DataLoader): roles roles = RoleSet { roles: {} }
4242026-01-27T01:13:50.457ZDEBGtest_vpcs (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
4252026-01-27T01:13:50.469ZTRACtest_vpcs (DataLoader): authorize begin action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
4262026-01-27T01:13:50.470ZTRACtest_vpcs (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. } resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
4272026-01-27T01:13:50.470ZTRACtest_vpcs (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database
4282026-01-27T01:13:50.470ZDEBGtest_vpcs (DataLoader): roles roles = RoleSet { roles: {} }
4292026-01-27T01:13:50.471ZDEBGtest_vpcs (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
4302026-01-27T01:13:50.477ZTRACtest_vpcs (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. } resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
4312026-01-27T01:13:50.477ZTRACtest_vpcs (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database
4322026-01-27T01:13:50.477ZDEBGtest_vpcs (DataLoader): roles roles = RoleSet { roles: {} }
4332026-01-27T01:13:50.478ZDEBGtest_vpcs (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
4342026-01-27T01:13:50.482ZTRACtest_vpcs (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
4352026-01-27T01:13:50.482ZTRACtest_vpcs (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database
4362026-01-27T01:13:50.482ZDEBGtest_vpcs (DataLoader): roles roles = RoleSet { roles: {} }
4372026-01-27T01:13:50.483ZDEBGtest_vpcs (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
4382026-01-27T01:13:50.491ZDEBGtest_vpcs (DataLoader): roles roles = RoleSet { roles: {} }
4392026-01-27T01:13:50.499ZDEBGtest_vpcs (DataLoader): authorize result action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) } result = Ok(())
4402026-01-27T01:13:50.500ZTRACtest_vpcs (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database
4412026-01-27T01:13:50.500ZDEBGtest_vpcs (DataLoader): roles roles = RoleSet { roles: {} }
4422026-01-27T01:13:50.501ZDEBGtest_vpcs (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
4432026-01-27T01:13:50.612ZINFOtest_vpcs (DataLoader): created built-in VPC firewall rules
4442026-01-27T01:13:50.612ZDEBGtest_vpcs (DataLoader): attempting to create built-in VPC Subnets
4452026-01-27T01:13:50.612ZTRACtest_vpcs (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database
4462026-01-27T01:13:50.612ZDEBGtest_vpcs (DataLoader): roles roles = RoleSet { roles: {} }
4472026-01-27T01:13:50.613ZDEBGtest_vpcs (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
4482026-01-27T01:13:50.618ZTRACtest_vpcs (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database
4492026-01-27T01:13:50.619ZDEBGtest_vpcs (DataLoader): roles roles = RoleSet { roles: {} }
4502026-01-27T01:13:50.619ZDEBGtest_vpcs (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
4512026-01-27T01:13:50.624ZTRACtest_vpcs (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database
4522026-01-27T01:13:50.624ZDEBGtest_vpcs (DataLoader): roles roles = RoleSet { roles: {} }
4532026-01-27T01:13:50.625ZDEBGtest_vpcs (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
4542026-01-27T01:13:50.629ZTRACtest_vpcs (DataLoader): authorize begin action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
4552026-01-27T01:13:50.629ZTRACtest_vpcs (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. } resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
4562026-01-27T01:13:50.629ZTRACtest_vpcs (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database
4572026-01-27T01:13:50.630ZDEBGtest_vpcs (DataLoader): roles roles = RoleSet { roles: {} }
4582026-01-27T01:13:50.630ZDEBGtest_vpcs (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
4592026-01-27T01:13:50.634ZTRACtest_vpcs (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. } resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
4602026-01-27T01:13:50.634ZTRACtest_vpcs (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database
4612026-01-27T01:13:50.634ZDEBGtest_vpcs (DataLoader): roles roles = RoleSet { roles: {} }
4622026-01-27T01:13:50.635ZDEBGtest_vpcs (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
4632026-01-27T01:13:50.639ZTRACtest_vpcs (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
4642026-01-27T01:13:50.639ZTRACtest_vpcs (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database
4652026-01-27T01:13:50.639ZDEBGtest_vpcs (DataLoader): roles roles = RoleSet { roles: {} }
4662026-01-27T01:13:50.640ZDEBGtest_vpcs (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
4672026-01-27T01:13:50.644ZDEBGtest_vpcs (DataLoader): roles roles = RoleSet { roles: {} }
4682026-01-27T01:13:50.654ZDEBGtest_vpcs (DataLoader): authorize result action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) } result = Ok(())
4692026-01-27T01:13:50.655ZTRACtest_vpcs (DataLoader): successful lookup of siloed resource "Vpc" using built-in user
4702026-01-27T01:13:50.655ZTRACtest_vpcs (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database
4712026-01-27T01:13:50.655ZDEBGtest_vpcs (DataLoader): roles roles = RoleSet { roles: {} }
4722026-01-27T01:13:50.655ZDEBGtest_vpcs (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
4732026-01-27T01:13:50.668ZTRACtest_vpcs (DataLoader): authorize begin action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
4742026-01-27T01:13:50.668ZTRACtest_vpcs (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. } resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
4752026-01-27T01:13:50.668ZTRACtest_vpcs (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database
4762026-01-27T01:13:50.668ZDEBGtest_vpcs (DataLoader): roles roles = RoleSet { roles: {} }
4772026-01-27T01:13:50.669ZDEBGtest_vpcs (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
4782026-01-27T01:13:50.674ZTRACtest_vpcs (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. } resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
4792026-01-27T01:13:50.674ZTRACtest_vpcs (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database
4802026-01-27T01:13:50.674ZDEBGtest_vpcs (DataLoader): roles roles = RoleSet { roles: {} }
4812026-01-27T01:13:50.677ZDEBGtest_vpcs (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
4822026-01-27T01:13:50.682ZTRACtest_vpcs (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
4832026-01-27T01:13:50.682ZTRACtest_vpcs (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database
4842026-01-27T01:13:50.682ZDEBGtest_vpcs (DataLoader): roles roles = RoleSet { roles: {} }
4852026-01-27T01:13:50.683ZDEBGtest_vpcs (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
4862026-01-27T01:13:50.686ZDEBGtest_vpcs (DataLoader): roles roles = RoleSet { roles: {} }
4872026-01-27T01:13:50.696ZDEBGtest_vpcs (DataLoader): authorize result action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) } result = Ok(())
4882026-01-27T01:13:50.706ZTRACtest_vpcs (DataLoader): authorize begin action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-074c-4000-8000-000000000001, lookup_type: ById(001de000-074c-4000-8000-000000000001) }
4892026-01-27T01:13:50.706ZTRACtest_vpcs (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. } resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
4902026-01-27T01:13:50.706ZTRACtest_vpcs (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database
4912026-01-27T01:13:50.706ZDEBGtest_vpcs (DataLoader): roles roles = RoleSet { roles: {} }
4922026-01-27T01:13:50.707ZDEBGtest_vpcs (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
4932026-01-27T01:13:50.713ZTRACtest_vpcs (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. } resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
4942026-01-27T01:13:50.713ZTRACtest_vpcs (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database
4952026-01-27T01:13:50.713ZDEBGtest_vpcs (DataLoader): roles roles = RoleSet { roles: {} }
4962026-01-27T01:13:50.714ZDEBGtest_vpcs (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
4972026-01-27T01:13:50.718ZTRACtest_vpcs (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
4982026-01-27T01:13:50.718ZTRACtest_vpcs (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database
4992026-01-27T01:13:50.719ZDEBGtest_vpcs (DataLoader): roles roles = RoleSet { roles: {} }
5002026-01-27T01:13:50.719ZDEBGtest_vpcs (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
5012026-01-27T01:13:50.723ZDEBGtest_vpcs (DataLoader): roles roles = RoleSet { roles: {} }
5022026-01-27T01:13:50.734ZDEBGtest_vpcs (DataLoader): authorize result action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-074c-4000-8000-000000000001, lookup_type: ById(001de000-074c-4000-8000-000000000001) } result = Ok(())
5032026-01-27T01:13:50.735ZTRACtest_vpcs (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database
5042026-01-27T01:13:50.735ZDEBGtest_vpcs (DataLoader): roles roles = RoleSet { roles: {} }
5052026-01-27T01:13:50.736ZDEBGtest_vpcs (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
5062026-01-27T01:13:50.826ZTRACtest_vpcs (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database
5072026-01-27T01:13:50.826ZDEBGtest_vpcs (DataLoader): roles roles = RoleSet { roles: {} }
5082026-01-27T01:13:50.827ZDEBGtest_vpcs (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
5092026-01-27T01:13:50.833ZTRACtest_vpcs (DataLoader): authorize begin action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
5102026-01-27T01:13:50.833ZTRACtest_vpcs (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. } resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
5112026-01-27T01:13:50.833ZTRACtest_vpcs (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database
5122026-01-27T01:13:50.833ZDEBGtest_vpcs (DataLoader): roles roles = RoleSet { roles: {} }
5132026-01-27T01:13:50.835ZDEBGtest_vpcs (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
5142026-01-27T01:13:50.839ZTRACtest_vpcs (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. } resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
5152026-01-27T01:13:50.839ZTRACtest_vpcs (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database
5162026-01-27T01:13:50.839ZDEBGtest_vpcs (DataLoader): roles roles = RoleSet { roles: {} }
5172026-01-27T01:13:50.840ZDEBGtest_vpcs (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
5182026-01-27T01:13:50.844ZTRACtest_vpcs (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
5192026-01-27T01:13:50.845ZTRACtest_vpcs (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database
5202026-01-27T01:13:50.845ZDEBGtest_vpcs (DataLoader): roles roles = RoleSet { roles: {} }
5212026-01-27T01:13:50.847ZDEBGtest_vpcs (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
5222026-01-27T01:13:50.857ZDEBGtest_vpcs (DataLoader): roles roles = RoleSet { roles: {} }
5232026-01-27T01:13:50.867ZDEBGtest_vpcs (DataLoader): authorize result action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) } result = Ok(())
5242026-01-27T01:13:50.875ZTRACtest_vpcs (DataLoader): authorize begin action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-074c-4000-8000-000000000001, lookup_type: ById(001de000-074c-4000-8000-000000000001) }
5252026-01-27T01:13:50.875ZTRACtest_vpcs (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. } resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
5262026-01-27T01:13:50.875ZTRACtest_vpcs (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database
5272026-01-27T01:13:50.875ZDEBGtest_vpcs (DataLoader): roles roles = RoleSet { roles: {} }
5282026-01-27T01:13:50.876ZDEBGtest_vpcs (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
5292026-01-27T01:13:50.881ZTRACtest_vpcs (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. } resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
5302026-01-27T01:13:50.881ZTRACtest_vpcs (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database
5312026-01-27T01:13:50.881ZDEBGtest_vpcs (DataLoader): roles roles = RoleSet { roles: {} }
5322026-01-27T01:13:50.882ZDEBGtest_vpcs (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
5332026-01-27T01:13:50.886ZTRACtest_vpcs (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
5342026-01-27T01:13:50.886ZTRACtest_vpcs (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database
5352026-01-27T01:13:50.886ZDEBGtest_vpcs (DataLoader): roles roles = RoleSet { roles: {} }
5362026-01-27T01:13:50.887ZDEBGtest_vpcs (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
5372026-01-27T01:13:50.892ZDEBGtest_vpcs (DataLoader): roles roles = RoleSet { roles: {} }
5382026-01-27T01:13:50.902ZDEBGtest_vpcs (DataLoader): authorize result action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-074c-4000-8000-000000000001, lookup_type: ById(001de000-074c-4000-8000-000000000001) } result = Ok(())
5392026-01-27T01:13:50.902ZTRACtest_vpcs (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database
5402026-01-27T01:13:50.902ZDEBGtest_vpcs (DataLoader): roles roles = RoleSet { roles: {} }
5412026-01-27T01:13:50.903ZDEBGtest_vpcs (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
5422026-01-27T01:13:50.911ZTRACtest_vpcs (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database
5432026-01-27T01:13:50.911ZDEBGtest_vpcs (DataLoader): roles roles = RoleSet { roles: {} }
5442026-01-27T01:13:50.912ZDEBGtest_vpcs (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
5452026-01-27T01:13:50.917ZTRACtest_vpcs (DataLoader): authorize begin action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
5462026-01-27T01:13:50.918ZTRACtest_vpcs (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. } resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
5472026-01-27T01:13:50.918ZTRACtest_vpcs (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database
5482026-01-27T01:13:50.918ZDEBGtest_vpcs (DataLoader): roles roles = RoleSet { roles: {} }
5492026-01-27T01:13:50.919ZDEBGtest_vpcs (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
5502026-01-27T01:13:50.923ZTRACtest_vpcs (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. } resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
5512026-01-27T01:13:50.923ZTRACtest_vpcs (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database
5522026-01-27T01:13:50.923ZDEBGtest_vpcs (DataLoader): roles roles = RoleSet { roles: {} }
5532026-01-27T01:13:50.924ZDEBGtest_vpcs (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
5542026-01-27T01:13:50.928ZTRACtest_vpcs (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
5552026-01-27T01:13:50.928ZTRACtest_vpcs (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database
5562026-01-27T01:13:50.929ZDEBGtest_vpcs (DataLoader): roles roles = RoleSet { roles: {} }
5572026-01-27T01:13:50.929ZDEBGtest_vpcs (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
5582026-01-27T01:13:50.933ZDEBGtest_vpcs (DataLoader): roles roles = RoleSet { roles: {} }
5592026-01-27T01:13:50.942ZDEBGtest_vpcs (DataLoader): authorize result action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) } result = Ok(())
5602026-01-27T01:13:50.950ZTRACtest_vpcs (DataLoader): authorize begin action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-074c-4000-8000-000000000001, lookup_type: ById(001de000-074c-4000-8000-000000000001) }
5612026-01-27T01:13:50.950ZTRACtest_vpcs (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. } resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
5622026-01-27T01:13:50.950ZTRACtest_vpcs (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database
5632026-01-27T01:13:50.950ZDEBGtest_vpcs (DataLoader): roles roles = RoleSet { roles: {} }
5642026-01-27T01:13:50.951ZDEBGtest_vpcs (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
5652026-01-27T01:13:50.956ZTRACtest_vpcs (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. } resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
5662026-01-27T01:13:50.956ZTRACtest_vpcs (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database
5672026-01-27T01:13:50.956ZDEBGtest_vpcs (DataLoader): roles roles = RoleSet { roles: {} }
5682026-01-27T01:13:50.957ZDEBGtest_vpcs (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
5692026-01-27T01:13:50.961ZTRACtest_vpcs (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
5702026-01-27T01:13:50.961ZTRACtest_vpcs (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database
5712026-01-27T01:13:50.961ZDEBGtest_vpcs (DataLoader): roles roles = RoleSet { roles: {} }
5722026-01-27T01:13:50.962ZDEBGtest_vpcs (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
5732026-01-27T01:13:50.976ZDEBGtest_vpcs (DataLoader): roles roles = RoleSet { roles: {} }
5742026-01-27T01:13:50.985ZDEBGtest_vpcs (DataLoader): authorize result action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-074c-4000-8000-000000000001, lookup_type: ById(001de000-074c-4000-8000-000000000001) } result = Ok(())
5752026-01-27T01:13:50.985ZTRACtest_vpcs (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database
5762026-01-27T01:13:50.985ZDEBGtest_vpcs (DataLoader): roles roles = RoleSet { roles: {} }
5772026-01-27T01:13:50.986ZDEBGtest_vpcs (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
5782026-01-27T01:13:50.995ZTRACtest_vpcs (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database
5792026-01-27T01:13:50.995ZDEBGtest_vpcs (DataLoader): roles roles = RoleSet { roles: {} }
5802026-01-27T01:13:50.996ZDEBGtest_vpcs (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
5812026-01-27T01:13:51.002ZINFOtest_vpcs (DataLoader): created built-in services vpc subnets
5822026-01-27T01:13:51.002ZINFOtest_vpcs (DataLoader): created built-in services vpc
5832026-01-27T01:13:51.002ZTRACtest_vpcs (DataLoader): authorize begin action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database
5842026-01-27T01:13:51.002ZDEBGtest_vpcs (DataLoader): roles roles = RoleSet { roles: {} }
5852026-01-27T01:13:51.004ZDEBGtest_vpcs (DataLoader): authorize result action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
5862026-01-27T01:13:51.005ZDEBGtest_vpcs (DataLoader): attempting to create silo users
5872026-01-27T01:13:51.005ZTRACtest_vpcs (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database
5882026-01-27T01:13:51.005ZDEBGtest_vpcs (DataLoader): roles roles = RoleSet { roles: {} }
5892026-01-27T01:13:51.005ZDEBGtest_vpcs (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
5902026-01-27T01:13:51.022ZINFOtest_vpcs (DataLoader): created 2 silo users
5912026-01-27T01:13:51.022ZDEBGtest_vpcs (DataLoader): attempting to create silo user role assignments
5922026-01-27T01:13:51.022ZTRACtest_vpcs (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database
5932026-01-27T01:13:51.022ZDEBGtest_vpcs (DataLoader): roles roles = RoleSet { roles: {} }
5942026-01-27T01:13:51.023ZDEBGtest_vpcs (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
5952026-01-27T01:13:51.030ZINFOtest_vpcs (DataLoader): created 2 silo user role assignments
5962026-01-27T01:13:51.030ZTRACtest_vpcs (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database
5972026-01-27T01:13:51.030ZDEBGtest_vpcs (DataLoader): roles roles = RoleSet { roles: {} }
5982026-01-27T01:13:51.031ZDEBGtest_vpcs (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
5992026-01-27T01:13:51.039ZTRACtest_vpcs (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database
6002026-01-27T01:13:51.039ZDEBGtest_vpcs (DataLoader): roles roles = RoleSet { roles: {} }
6012026-01-27T01:13:51.040ZDEBGtest_vpcs (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
6022026-01-27T01:13:51.052ZTRACtest_vpcs (DataLoader): authorize begin action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = IpPoolList
6032026-01-27T01:13:51.052ZTRACtest_vpcs (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
6042026-01-27T01:13:51.052ZTRACtest_vpcs (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database
6052026-01-27T01:13:51.052ZDEBGtest_vpcs (DataLoader): roles roles = RoleSet { roles: {} }
6062026-01-27T01:13:51.053ZDEBGtest_vpcs (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
6072026-01-27T01:13:51.057ZDEBGtest_vpcs (DataLoader): roles roles = RoleSet { roles: {} }
6082026-01-27T01:13:51.060ZDEBGtest_vpcs (DataLoader): authorize result action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = IpPoolList result = Ok(())
6092026-01-27T01:13:51.060ZTRACtest_vpcs (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database
6102026-01-27T01:13:51.061ZDEBGtest_vpcs (DataLoader): roles roles = RoleSet { roles: {} }
6112026-01-27T01:13:51.061ZDEBGtest_vpcs (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
6122026-01-27T01:13:51.270ZTRACtest_vpcs (DataLoader): authorize begin action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = IpPoolList
6132026-01-27T01:13:51.270ZTRACtest_vpcs (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
6142026-01-27T01:13:51.270ZTRACtest_vpcs (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database
6152026-01-27T01:13:51.270ZDEBGtest_vpcs (DataLoader): roles roles = RoleSet { roles: {} }
6162026-01-27T01:13:51.271ZDEBGtest_vpcs (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
6172026-01-27T01:13:51.276ZDEBGtest_vpcs (DataLoader): roles roles = RoleSet { roles: {} }
6182026-01-27T01:13:51.279ZDEBGtest_vpcs (DataLoader): authorize result action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = IpPoolList result = Ok(())
6192026-01-27T01:13:51.279ZTRACtest_vpcs (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database
6202026-01-27T01:13:51.279ZDEBGtest_vpcs (DataLoader): roles roles = RoleSet { roles: {} }
6212026-01-27T01:13:51.279ZDEBGtest_vpcs (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
6222026-01-27T01:13:51.285ZINFOtest_vpcs (nexus): populate complete
6232026-01-27T01:13:51.285ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = BlueprintConfig
6242026-01-27T01:13:51.285ZTRACtest_vpcs (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
6252026-01-27T01:13:51.285ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database
6262026-01-27T01:13:51.285ZDEBGtest_vpcs (BackgroundTasks): roles roles = RoleSet { roles: {} }
6272026-01-27T01:13:51.286ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database result = Ok(())
6282026-01-27T01:13:51.294ZDEBGtest_vpcs (init_with_steps): Running step start_gateway_switch0
6292026-01-27T01:13:51.294ZDEBGtest_vpcs: Starting Management Gateway
6302026-01-27T01:13:51.346ZDEBGtest_vpcs (BackgroundTasks): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
6312026-01-27T01:13:51.352ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = BlueprintConfig result = Ok(())
6322026-01-27T01:13:51.352ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database
6332026-01-27T01:13:51.352ZDEBGtest_vpcs (BackgroundTasks): roles roles = RoleSet { roles: {} }
6342026-01-27T01:13:51.353ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database result = Ok(())
6352026-01-27T01:13:51.370ZINFOtest_vpcs (nexus): activating background tasks
6362026-01-27T01:13:51.379ZDEBGtest_vpcs (BackgroundTasks): activating background_task = support_bundle_collector iteration = 1 reason = Timeout
6372026-01-27T01:13:51.379ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = support_bundle_collector resource = Fleet
6382026-01-27T01:13:51.379ZTRACtest_vpcs (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } background_task = support_bundle_collector resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
6392026-01-27T01:13:51.379ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = support_bundle_collector resource = Database
6402026-01-27T01:13:51.379ZDEBGtest_vpcs (BackgroundTasks): roles background_task = support_bundle_collector roles = RoleSet { roles: {} }
6412026-01-27T01:13:51.381ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = support_bundle_collector resource = Database result = Ok(())
6422026-01-27T01:13:51.385ZDEBGtest_vpcs (BackgroundTasks): activating background_task = physical_disk_adoption iteration = 1 reason = Timeout
6432026-01-27T01:13:51.385ZDEBGtest_vpcs (BackgroundTasks): activation complete background_task = physical_disk_adoption elapsed = 215.433\u{b5}s iteration = 1 status = {"error":"task disabled"}
6442026-01-27T01:13:51.385ZDEBGtest_vpcs (BackgroundTasks): activating background_task = blueprint_rendezvous iteration = 1 reason = Timeout
6452026-01-27T01:13:51.385ZWARNtest_vpcs (BackgroundTasks): Blueprint rendezvous: skipped background_task = blueprint_rendezvous reason = no blueprint
6462026-01-27T01:13:51.385ZDEBGtest_vpcs (BackgroundTasks): activation complete background_task = blueprint_rendezvous elapsed = 150.295\u{b5}s iteration = 1 status = {"error":"no blueprint"}
6472026-01-27T01:13:51.386ZDEBGtest_vpcs (BackgroundTasks): activating background_task = dns_config_internal dns_group = internal iteration = 1 reason = Timeout
6482026-01-27T01:13:51.386ZDEBGtest_vpcs (BackgroundTasks): reading DNS version background_task = dns_config_internal dns_group = internal
6492026-01-27T01:13:51.386ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = dns_config_internal dns_group = internal resource = Database
6502026-01-27T01:13:51.386ZDEBGtest_vpcs (BackgroundTasks): roles background_task = dns_config_internal dns_group = internal roles = RoleSet { roles: {} }
6512026-01-27T01:13:51.387ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = dns_config_internal dns_group = internal resource = Database result = Ok(())
6522026-01-27T01:13:51.390ZDEBGtest_vpcs (BackgroundTasks): activating background_task = dns_servers_internal dns_group = internal iteration = 1 reason = Timeout
6532026-01-27T01:13:51.390ZTRACtest_vpcs (DnsResolver): lookup_all_socket_v6 srv dns_name = _nameservice._tcp.control-plane.oxide.internal
6542026-01-27T01:13:51.390ZDEBGtest_vpcs (BackgroundTasks): activating background_task = dns_propagation_internal dns_group = internal iteration = 1 reason = Timeout
6552026-01-27T01:13:51.390ZWARNtest_vpcs (BackgroundTasks): DNS propagation: skipped background_task = dns_propagation_internal dns_group = internal reason = no config nor servers
6562026-01-27T01:13:51.390ZDEBGtest_vpcs (BackgroundTasks): activation complete background_task = dns_propagation_internal dns_group = internal elapsed = 67.102\u{b5}s iteration = 1 status = {"error":"no config nor servers"}
6572026-01-27T01:13:51.390ZDEBGtest_vpcs (BackgroundTasks): activating background_task = dns_config_external dns_group = external iteration = 1 reason = Timeout
6582026-01-27T01:13:51.390ZDEBGtest_vpcs (BackgroundTasks): reading DNS version background_task = dns_config_external dns_group = external
6592026-01-27T01:13:51.390ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = dns_config_external dns_group = external resource = Database
6602026-01-27T01:13:51.390ZDEBGtest_vpcs (BackgroundTasks): roles background_task = dns_config_external dns_group = external roles = RoleSet { roles: {} }
6612026-01-27T01:13:51.393ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = dns_config_external dns_group = external resource = Database result = Ok(())
6622026-01-27T01:13:51.394ZDEBGtest_vpcs (BackgroundTasks): activating background_task = dns_servers_external dns_group = external iteration = 1 reason = Timeout
6632026-01-27T01:13:51.394ZTRACtest_vpcs (DnsResolver): lookup_all_socket_v6 srv dns_name = _external-dns._tcp.control-plane.oxide.internal
6642026-01-27T01:13:51.394ZDEBGtest_vpcs (BackgroundTasks): activating background_task = dns_propagation_external dns_group = external iteration = 1 reason = Timeout
6652026-01-27T01:13:51.394ZWARNtest_vpcs (BackgroundTasks): DNS propagation: skipped background_task = dns_propagation_external dns_group = external reason = no config nor servers
6662026-01-27T01:13:51.394ZDEBGtest_vpcs (BackgroundTasks): activation complete background_task = dns_propagation_external dns_group = external elapsed = 56.531\u{b5}s iteration = 1 status = {"error":"no config nor servers"}
6672026-01-27T01:13:51.394ZDEBGtest_vpcs (BackgroundTasks): activating background_task = metrics_producer_gc iteration = 1 reason = Timeout
6682026-01-27T01:13:51.394ZINFOtest_vpcs (BackgroundTasks): Metric producer GC running background_task = metrics_producer_gc expiration = 2026-01-27 01:03:51.394482868 UTC
6692026-01-27T01:13:51.394ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = metrics_producer_gc resource = Database
6702026-01-27T01:13:51.394ZDEBGtest_vpcs (BackgroundTasks): roles background_task = metrics_producer_gc roles = RoleSet { roles: {} }
6712026-01-27T01:13:51.396ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = metrics_producer_gc resource = Database result = Ok(())
6722026-01-27T01:13:51.476ZDEBGtest_vpcs (BackgroundTasks): activating background_task = external_endpoints iteration = 1 reason = Timeout
6732026-01-27T01:13:51.477ZTRACtest_vpcs (BackgroundTasks): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = external_endpoints resource = Fleet
6742026-01-27T01:13:51.477ZTRACtest_vpcs (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } background_task = external_endpoints resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
6752026-01-27T01:13:51.477ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = external_endpoints resource = Database
6762026-01-27T01:13:51.477ZDEBGtest_vpcs (BackgroundTasks): roles background_task = external_endpoints roles = RoleSet { roles: {} }
6772026-01-27T01:13:51.479ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = external_endpoints resource = Database result = Ok(())
6782026-01-27T01:13:51.479ZDEBGtest_vpcs (BackgroundTasks): activating background_task = nat_garbage_collector iteration = 1 reason = Timeout
6792026-01-27T01:13:51.480ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = nat_garbage_collector resource = Database
6802026-01-27T01:13:51.480ZDEBGtest_vpcs (BackgroundTasks): roles background_task = nat_garbage_collector roles = RoleSet { roles: {} }
6812026-01-27T01:13:51.480ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = nat_garbage_collector resource = Database result = Ok(())
6822026-01-27T01:13:51.481ZDEBGtest_vpcs (BackgroundTasks): activating background_task = bfd_manager iteration = 1 reason = Timeout
6832026-01-27T01:13:51.481ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = bfd_manager resource = Database
6842026-01-27T01:13:51.481ZDEBGtest_vpcs (BackgroundTasks): roles background_task = bfd_manager roles = RoleSet { roles: {} }
6852026-01-27T01:13:51.482ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = bfd_manager resource = Database result = Ok(())
6862026-01-27T01:13:51.483ZDEBGtest_vpcs (BackgroundTasks): activating background_task = phantom_disks iteration = 1 reason = Timeout
6872026-01-27T01:13:51.483ZDEBGtest_vpcs (BackgroundTasks): activating background_task = blueprint_executor iteration = 1 reason = Timeout
6882026-01-27T01:13:51.484ZWARNtest_vpcs (BackgroundTasks): Blueprint execution: skipped background_task = blueprint_executor reason = no blueprint
6892026-01-27T01:13:51.484ZDEBGtest_vpcs (BackgroundTasks): activation complete background_task = blueprint_executor elapsed = 73.023\u{b5}s iteration = 1 status = {"error":"no blueprint"}
6902026-01-27T01:13:51.484ZDEBGtest_vpcs (BackgroundTasks): activating background_task = inventory_collection iteration = 1 reason = Timeout
6912026-01-27T01:13:51.484ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = inventory_collection resource = Inventory
6922026-01-27T01:13:51.484ZTRACtest_vpcs (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } background_task = inventory_collection resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
6932026-01-27T01:13:51.484ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = inventory_collection resource = Database
6942026-01-27T01:13:51.484ZDEBGtest_vpcs (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {} }
6952026-01-27T01:13:51.484ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = inventory_collection resource = Database result = Ok(())
6962026-01-27T01:13:51.486ZDEBGtest_vpcs (BackgroundTasks): activating background_task = inventory_loader iteration = 1 reason = Timeout
6972026-01-27T01:13:51.486ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = inventory_loader resource = Inventory
6982026-01-27T01:13:51.486ZTRACtest_vpcs (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } background_task = inventory_loader resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
6992026-01-27T01:13:51.486ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = inventory_loader resource = Database
7002026-01-27T01:13:51.486ZDEBGtest_vpcs (BackgroundTasks): roles background_task = inventory_loader roles = RoleSet { roles: {} }
7012026-01-27T01:13:51.486ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = inventory_loader resource = Database result = Ok(())
7022026-01-27T01:13:51.487ZDEBGtest_vpcs (BackgroundTasks): activating background_task = reconfigurator_config_watcher iteration = 1 reason = Timeout
7032026-01-27T01:13:51.487ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = reconfigurator_config_watcher resource = BlueprintConfig
7042026-01-27T01:13:51.487ZTRACtest_vpcs (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } background_task = reconfigurator_config_watcher resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
7052026-01-27T01:13:51.487ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = reconfigurator_config_watcher resource = Database
7062026-01-27T01:13:51.487ZDEBGtest_vpcs (BackgroundTasks): roles background_task = reconfigurator_config_watcher roles = RoleSet { roles: {} }
7072026-01-27T01:13:51.488ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = reconfigurator_config_watcher resource = Database result = Ok(())
7082026-01-27T01:13:51.493ZDEBGtest_vpcs (BackgroundTasks): activating background_task = blueprint_planner iteration = 1 reason = Timeout
7092026-01-27T01:13:51.493ZDEBGtest_vpcs (BackgroundTasks): reconfigurator config not yet loaded; doing nothing background_task = blueprint_planner
7102026-01-27T01:13:51.493ZDEBGtest_vpcs (BackgroundTasks): activation complete background_task = blueprint_planner elapsed = 155.526\u{b5}s iteration = 1 status = "Disabled"
7112026-01-27T01:13:51.493ZDEBGtest_vpcs (BackgroundTasks): activating background_task = blueprint_loader iteration = 1 reason = Timeout
7122026-01-27T01:13:51.493ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = blueprint_loader resource = BlueprintConfig
7132026-01-27T01:13:51.493ZTRACtest_vpcs (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } background_task = blueprint_loader resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
7142026-01-27T01:13:51.493ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = blueprint_loader resource = Database
7152026-01-27T01:13:51.493ZDEBGtest_vpcs (BackgroundTasks): roles background_task = blueprint_loader roles = RoleSet { roles: {} }
7162026-01-27T01:13:51.494ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = blueprint_loader resource = Database result = Ok(())
7172026-01-27T01:13:51.496ZDEBGtest_vpcs (BackgroundTasks): activating background_task = crdb_node_id_collector iteration = 1 reason = Timeout
7182026-01-27T01:13:51.496ZWARNtest_vpcs (BackgroundTasks): Blueprint execution: skipped background_task = crdb_node_id_collector reason = no blueprint
7192026-01-27T01:13:51.496ZDEBGtest_vpcs (BackgroundTasks): activation complete background_task = crdb_node_id_collector elapsed = 84.185\u{b5}s iteration = 1 status = {"error":"no blueprint"}
7202026-01-27T01:13:51.496ZDEBGtest_vpcs (BackgroundTasks): activating background_task = decommissioned_disk_cleaner iteration = 1 reason = Timeout
7212026-01-27T01:13:51.496ZINFOtest_vpcs (BackgroundTasks): Decommissioned Disk Cleaner disabled background_task = decommissioned_disk_cleaner
7222026-01-27T01:13:51.496ZDEBGtest_vpcs (BackgroundTasks): activation complete background_task = decommissioned_disk_cleaner elapsed = 101.088\u{b5}s iteration = 1 status = {"deleted":0,"error":null,"error_count":0,"found":0,"not_ready_to_be_deleted":0}
7232026-01-27T01:13:51.496ZDEBGtest_vpcs (BackgroundTasks): activating background_task = service_zone_nat_tracker iteration = 1 reason = Timeout
7242026-01-27T01:13:51.496ZWARNtest_vpcs (BackgroundTasks): inventory collection is None background_task = service_zone_nat_tracker
7252026-01-27T01:13:51.496ZDEBGtest_vpcs (BackgroundTasks): activation complete background_task = service_zone_nat_tracker elapsed = 69.237\u{b5}s iteration = 1 status = {"error":"inventory collection is None"}
7262026-01-27T01:13:51.496ZDEBGtest_vpcs (BackgroundTasks): activating background_task = switch_port_config_manager iteration = 1 reason = Timeout
7272026-01-27T01:13:51.496ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = switch_port_config_manager resource = Fleet
7282026-01-27T01:13:51.496ZTRACtest_vpcs (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } background_task = switch_port_config_manager resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
7292026-01-27T01:13:51.497ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = switch_port_config_manager resource = Database
7302026-01-27T01:13:51.497ZDEBGtest_vpcs (BackgroundTasks): roles background_task = switch_port_config_manager roles = RoleSet { roles: {} }
7312026-01-27T01:13:51.497ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = switch_port_config_manager resource = Database result = Ok(())
7322026-01-27T01:13:51.499ZDEBGtest_vpcs (BackgroundTasks): activating background_task = v2p_manager iteration = 1 reason = Timeout
7332026-01-27T01:13:51.500ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = v2p_manager resource = Database
7342026-01-27T01:13:51.500ZDEBGtest_vpcs (BackgroundTasks): roles background_task = v2p_manager roles = RoleSet { roles: {} }
7352026-01-27T01:13:51.501ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = v2p_manager resource = Database result = Ok(())
7362026-01-27T01:13:51.502ZDEBGtest_vpcs (BackgroundTasks): activating background_task = region_replacement iteration = 1 reason = Timeout
7372026-01-27T01:13:51.502ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = region_replacement resource = Database
7382026-01-27T01:13:51.503ZDEBGtest_vpcs (BackgroundTasks): roles background_task = region_replacement roles = RoleSet { roles: {} }
7392026-01-27T01:13:51.503ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = region_replacement resource = Database result = Ok(())
7402026-01-27T01:13:51.504ZDEBGtest_vpcs (BackgroundTasks): activating background_task = region_replacement_driver iteration = 1 reason = Timeout
7412026-01-27T01:13:51.504ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = region_replacement_driver resource = Database
7422026-01-27T01:13:51.504ZDEBGtest_vpcs (BackgroundTasks): roles background_task = region_replacement_driver roles = RoleSet { roles: {} }
7432026-01-27T01:13:51.505ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = region_replacement_driver resource = Database result = Ok(())
7442026-01-27T01:13:51.506ZDEBGtest_vpcs (BackgroundTasks): activating background_task = instance_watcher iteration = 1 reason = Timeout
7452026-01-27T01:13:51.506ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = instance_watcher resource = Fleet
7462026-01-27T01:13:51.506ZTRACtest_vpcs (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } background_task = instance_watcher resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
7472026-01-27T01:13:51.506ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = instance_watcher resource = Database
7482026-01-27T01:13:51.506ZDEBGtest_vpcs (BackgroundTasks): roles background_task = instance_watcher roles = RoleSet { roles: {} }
7492026-01-27T01:13:51.507ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = instance_watcher resource = Database result = Ok(())
7502026-01-27T01:13:51.508ZDEBGtest_vpcs (BackgroundTasks): activating background_task = instance_updater iteration = 1 reason = Timeout
7512026-01-27T01:13:51.508ZINFOtest_vpcs (BackgroundTasks): background instance updater explicitly disabled background_task = instance_updater
7522026-01-27T01:13:51.508ZDEBGtest_vpcs (BackgroundTasks): activation complete background_task = instance_updater elapsed = 385.227\u{b5}s iteration = 1 status = {"destroyed_active_vmms":0,"disabled":true,"failed_active_vmms":0,"query_errors":[],"saga_errors":[],"sagas_completed":0,"sagas_started":0,"terminated_active_migrations":0}
7532026-01-27T01:13:51.508ZDEBGtest_vpcs (BackgroundTasks): activating background_task = instance_reincarnation iteration = 1 reason = Timeout
7542026-01-27T01:13:51.508ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = instance_reincarnation resource = Database
7552026-01-27T01:13:51.508ZDEBGtest_vpcs (BackgroundTasks): roles background_task = instance_reincarnation roles = RoleSet { roles: {} }
7562026-01-27T01:13:51.509ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = instance_reincarnation resource = Database result = Ok(())
7572026-01-27T01:13:51.601ZDEBGtest_vpcs (init_with_steps): Running step start_dendrite_switch0
7582026-01-27T01:13:51.601ZDEBGtest_vpcs: Starting Dendrite for switch0
7592026-01-27T01:13:51.612ZDEBGtest_vpcs (BackgroundTasks): activating background_task = service_firewall_rule_propagation iteration = 1 reason = Timeout
7602026-01-27T01:13:51.612ZDEBGtest_vpcs (service-firewall-rule-progator): starting background task for service firewall rule propagation background_task = service_firewall_rule_propagation
7612026-01-27T01:13:51.612ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = Database
7622026-01-27T01:13:51.612ZDEBGtest_vpcs (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
7632026-01-27T01:13:51.613ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
7642026-01-27T01:13:51.614ZDEBGtest_vpcs (BackgroundTasks): activating background_task = vpc_route_manager iteration = 1 reason = Timeout
7652026-01-27T01:13:51.614ZINFOtest_vpcs (BackgroundTasks): VPC route manager running background_task = vpc_route_manager
7662026-01-27T01:13:51.614ZTRACtest_vpcs (BackgroundTasks): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = vpc_route_manager resource = Fleet
7672026-01-27T01:13:51.614ZTRACtest_vpcs (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } background_task = vpc_route_manager resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
7682026-01-27T01:13:51.614ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = vpc_route_manager resource = Database
7692026-01-27T01:13:51.614ZDEBGtest_vpcs (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
7702026-01-27T01:13:51.615ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = vpc_route_manager resource = Database result = Ok(())
7712026-01-27T01:13:51.616ZDEBGtest_vpcs (BackgroundTasks): activating background_task = abandoned_vmm_reaper iteration = 1 reason = Timeout
7722026-01-27T01:13:51.617ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = abandoned_vmm_reaper resource = Database
7732026-01-27T01:13:51.617ZDEBGtest_vpcs (BackgroundTasks): roles background_task = abandoned_vmm_reaper roles = RoleSet { roles: {} }
7742026-01-27T01:13:51.617ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = abandoned_vmm_reaper resource = Database result = Ok(())
7752026-01-27T01:13:51.618ZDEBGtest_vpcs (BackgroundTasks): activating background_task = saga_recovery iteration = 1 reason = Timeout
7762026-01-27T01:13:51.618ZINFOtest_vpcs (SagaQuiesceHandle): saga recovery pass starting
7772026-01-27T01:13:51.618ZDEBGtest_vpcs (SagaRecoverer): listing candidate sagas for recovery
7782026-01-27T01:13:51.618ZTRACtest_vpcs (SagaRecoverer): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000003a8a (built_in_user), .. }) resource = Database
7792026-01-27T01:13:51.618ZDEBGtest_vpcs (SagaRecoverer): roles roles = RoleSet { roles: {} }
7802026-01-27T01:13:51.620ZDEBGtest_vpcs (SagaRecoverer): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000003a8a (built_in_user), .. }) resource = Database result = Ok(())
7812026-01-27T01:13:51.621ZDEBGtest_vpcs (BackgroundTasks): activating background_task = lookup_region_port iteration = 1 reason = Timeout
7822026-01-27T01:13:51.621ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = lookup_region_port resource = Database
7832026-01-27T01:13:51.621ZDEBGtest_vpcs (BackgroundTasks): roles background_task = lookup_region_port roles = RoleSet { roles: {} }
7842026-01-27T01:13:51.622ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = lookup_region_port resource = Database result = Ok(())
7852026-01-27T01:13:51.623ZDEBGtest_vpcs (BackgroundTasks): activating background_task = region_snapshot_replacement_start iteration = 1 reason = Timeout
7862026-01-27T01:13:51.623ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = region_snapshot_replacement_start resource = Database
7872026-01-27T01:13:51.623ZDEBGtest_vpcs (BackgroundTasks): roles background_task = region_snapshot_replacement_start roles = RoleSet { roles: {} }
7882026-01-27T01:13:51.625ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = region_snapshot_replacement_start resource = Database result = Ok(())
7892026-01-27T01:13:51.626ZDEBGtest_vpcs (BackgroundTasks): activating background_task = region_snapshot_replacement_garbage_collection iteration = 1 reason = Timeout
7902026-01-27T01:13:51.626ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = region_snapshot_replacement_garbage_collection resource = Database
7912026-01-27T01:13:51.626ZDEBGtest_vpcs (BackgroundTasks): roles background_task = region_snapshot_replacement_garbage_collection roles = RoleSet { roles: {} }
7922026-01-27T01:13:51.628ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = region_snapshot_replacement_garbage_collection resource = Database result = Ok(())
7932026-01-27T01:13:51.629ZDEBGtest_vpcs (BackgroundTasks): activating background_task = region_snapshot_replacement_step iteration = 1 reason = Timeout
7942026-01-27T01:13:51.629ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = region_snapshot_replacement_step resource = Database
7952026-01-27T01:13:51.630ZDEBGtest_vpcs (BackgroundTasks): roles background_task = region_snapshot_replacement_step roles = RoleSet { roles: {} }
7962026-01-27T01:13:51.631ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = region_snapshot_replacement_step resource = Database result = Ok(())
7972026-01-27T01:13:51.632ZDEBGtest_vpcs (BackgroundTasks): activating background_task = region_snapshot_replacement_finish iteration = 1 reason = Timeout
7982026-01-27T01:13:51.632ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = region_snapshot_replacement_finish resource = Database
7992026-01-27T01:13:51.632ZDEBGtest_vpcs (BackgroundTasks): roles background_task = region_snapshot_replacement_finish roles = RoleSet { roles: {} }
8002026-01-27T01:13:51.634ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = region_snapshot_replacement_finish resource = Database result = Ok(())
8012026-01-27T01:13:51.636ZDEBGtest_vpcs (BackgroundTasks): activating background_task = tuf_artifact_replication iteration = 1 reason = Timeout
8022026-01-27T01:13:51.636ZTRACtest_vpcs (BackgroundTasks): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = tuf_artifact_replication resource = Fleet
8032026-01-27T01:13:51.636ZTRACtest_vpcs (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } background_task = tuf_artifact_replication resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
8042026-01-27T01:13:51.636ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = tuf_artifact_replication resource = Database
8052026-01-27T01:13:51.636ZDEBGtest_vpcs (BackgroundTasks): roles background_task = tuf_artifact_replication roles = RoleSet { roles: {} }
8062026-01-27T01:13:51.637ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = tuf_artifact_replication resource = Database result = Ok(())
8072026-01-27T01:13:51.640ZDEBGtest_vpcs (BackgroundTasks): activating background_task = tuf_repo_pruner iteration = 1 reason = Timeout
8082026-01-27T01:13:51.640ZINFOtest_vpcs (BackgroundTasks): reconfigurator config not yet loaded; doing nothing background_task = tuf_repo_pruner
8092026-01-27T01:13:51.640ZDEBGtest_vpcs (BackgroundTasks): activation complete background_task = tuf_repo_pruner elapsed = 173.451\u{b5}s iteration = 1 status = {"reason":"reconfigurator config not yet loaded","status":"disabled"}
8102026-01-27T01:13:51.641ZDEBGtest_vpcs (BackgroundTasks): activating background_task = read_only_region_replacement_start iteration = 1 reason = Timeout
8112026-01-27T01:13:51.641ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = read_only_region_replacement_start resource = Database
8122026-01-27T01:13:51.641ZDEBGtest_vpcs (BackgroundTasks): roles background_task = read_only_region_replacement_start roles = RoleSet { roles: {} }
8132026-01-27T01:13:51.642ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = read_only_region_replacement_start resource = Database result = Ok(())
8142026-01-27T01:13:51.643ZDEBGtest_vpcs (BackgroundTasks): activating background_task = alert_dispatcher iteration = 1 reason = Timeout
8152026-01-27T01:13:51.643ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = alert_dispatcher resource = Database
8162026-01-27T01:13:51.643ZDEBGtest_vpcs (BackgroundTasks): roles background_task = alert_dispatcher roles = RoleSet { roles: {} }
8172026-01-27T01:13:51.644ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = alert_dispatcher resource = Database result = Ok(())
8182026-01-27T01:13:51.646ZDEBGtest_vpcs (BackgroundTasks): activating background_task = webhook_deliverator iteration = 1 reason = Timeout
8192026-01-27T01:13:51.646ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = webhook_deliverator resource = Database
8202026-01-27T01:13:51.646ZDEBGtest_vpcs (BackgroundTasks): roles background_task = webhook_deliverator roles = RoleSet { roles: {} }
8212026-01-27T01:13:51.648ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = webhook_deliverator resource = Database result = Ok(())
8222026-01-27T01:13:51.650ZDEBGtest_vpcs (BackgroundTasks): activating background_task = multicast_reconciler iteration = 1 reason = Timeout
8232026-01-27T01:13:51.650ZTRACtest_vpcs (BackgroundTasks): multicast group reconciler activating background_task = multicast_reconciler
8242026-01-27T01:13:51.650ZTRACtest_vpcs (BackgroundTasks): starting multicast reconciliation pass background_task = multicast_reconciler
8252026-01-27T01:13:51.650ZTRACtest_vpcs (DnsResolver): lookup_all_socket_v6 srv dns_name = _dendrite._tcp.control-plane.oxide.internal
8262026-01-27T01:13:51.650ZDEBGtest_vpcs (BackgroundTasks): activating background_task = sp_ereport_ingester iteration = 1 reason = Timeout
8272026-01-27T01:13:51.650ZTRACtest_vpcs (DnsResolver): lookup_all_socket_v6 srv dns_name = _mgs._tcp.control-plane.oxide.internal
8282026-01-27T01:13:51.650ZDEBGtest_vpcs (BackgroundTasks): activating background_task = fm_sitrep_loader iteration = 1 reason = Timeout
8292026-01-27T01:13:51.650ZTRACtest_vpcs (BackgroundTasks): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = fm_sitrep_loader resource = Fleet
8302026-01-27T01:13:51.651ZTRACtest_vpcs (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } background_task = fm_sitrep_loader resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
8312026-01-27T01:13:51.651ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = fm_sitrep_loader resource = Database
8322026-01-27T01:13:51.651ZDEBGtest_vpcs (BackgroundTasks): roles background_task = fm_sitrep_loader roles = RoleSet { roles: {} }
8332026-01-27T01:13:51.663ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = fm_sitrep_loader resource = Database result = Ok(())
8342026-01-27T01:13:51.665ZDEBGtest_vpcs (BackgroundTasks): activating background_task = fm_sitrep_gc iteration = 1 reason = Timeout
8352026-01-27T01:13:51.665ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = fm_sitrep_gc resource = Database
8362026-01-27T01:13:51.665ZDEBGtest_vpcs (BackgroundTasks): roles background_task = fm_sitrep_gc roles = RoleSet { roles: {} }
8372026-01-27T01:13:51.665ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = fm_sitrep_gc resource = Database result = Ok(())
8382026-01-27T01:13:51.666ZDEBGtest_vpcs (BackgroundTasks): activating background_task = probe_distributor iteration = 1 reason = Timeout
8392026-01-27T01:13:51.666ZINFOtest_vpcs (BackgroundTasks): distributing networking probes to sleds background_task = probe_distributor
8402026-01-27T01:13:51.666ZTRACtest_vpcs (BackgroundTasks): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = probe_distributor resource = Fleet
8412026-01-27T01:13:51.666ZTRACtest_vpcs (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } background_task = probe_distributor resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
8422026-01-27T01:13:51.666ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = probe_distributor resource = Database
8432026-01-27T01:13:51.666ZDEBGtest_vpcs (BackgroundTasks): roles background_task = probe_distributor roles = RoleSet { roles: {} }
8442026-01-27T01:13:51.667ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = probe_distributor resource = Database result = Ok(())
8452026-01-27T01:13:51.668ZDEBGtest_vpcs (BackgroundTasks): activating background_task = trust_quorum_manager iteration = 1 reason = Timeout
8462026-01-27T01:13:51.668ZTRACtest_vpcs (BackgroundTasks): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = trust_quorum_manager bgtask = TrustQuorumManager resource = Fleet
8472026-01-27T01:13:51.668ZTRACtest_vpcs (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } background_task = trust_quorum_manager bgtask = TrustQuorumManager resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
8482026-01-27T01:13:51.668ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = trust_quorum_manager bgtask = TrustQuorumManager resource = Database
8492026-01-27T01:13:51.668ZDEBGtest_vpcs (BackgroundTasks): roles background_task = trust_quorum_manager bgtask = TrustQuorumManager roles = RoleSet { roles: {} }
8502026-01-27T01:13:51.669ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = trust_quorum_manager bgtask = TrustQuorumManager resource = Database result = Ok(())
8512026-01-27T01:13:51.672ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = dns_config_internal dns_group = internal resource = DnsConfig
8522026-01-27T01:13:51.672ZTRACtest_vpcs (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } background_task = dns_config_internal dns_group = internal resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
8532026-01-27T01:13:51.672ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = dns_config_internal dns_group = internal resource = Database
8542026-01-27T01:13:51.672ZDEBGtest_vpcs (BackgroundTasks): roles background_task = dns_config_internal dns_group = internal roles = RoleSet { roles: {} }
8552026-01-27T01:13:51.674ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = dns_config_internal dns_group = internal resource = Database result = Ok(())
8562026-01-27T01:13:51.677ZTRACtest_vpcs (dns): buffer buffer = Length: 75 (0x4b) bytes\n0000: 7b 5d 01 00 00 01 00 00 00 00 00 01 0c 5f 6e 61 {]..........._na\n0010: 6d 65 73 65 72 76 69 63 65 04 5f 74 63 70 0d 63 meservice._tcp.c\n0020: 6f 6e 74 72 6f 6c 2d 70 6c 61 6e 65 05 6f 78 69 ontrol-plane.oxi\n0030: 64 65 08 69 6e 74 65 72 6e 61 6c 00 00 21 00 01 de.internal..!..\n0040: 00 00 29 04 d0 00 00 00 00 00 00 ..)........ kind = dns peer_addr = [::1]:15449 req_id = 2b64e19c-877a-4ff9-b0df-6588f58de00c
8572026-01-27T01:13:51.678ZDEBGtest_vpcs (dns): message_request kind = dns mr = MessageRequest {\n header: Header {\n id: 31581,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n queries: Queries {\n queries: [\n LowerQuery {\n name: LowerName(\n Name("_nameservice._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_nameservice._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n ],\n original: [\n 12,\n 95,\n 110,\n 97,\n 109,\n 101,\n 115,\n 101,\n 114,\n 118,\n 105,\n 99,\n 101,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n flags: EdnsFlags {\n dnssec_ok: false,\n z: 0,\n },\n max_payload: 1232,\n options: OPT {\n options: [],\n },\n },\n ),\n} peer_addr = [::1]:15449 req_id = 2b64e19c-877a-4ff9-b0df-6588f58de00c
8582026-01-27T01:13:51.679ZERROtest_vpcs (dns): failed to handle incoming DNS message: MessageRequest { header: Header { id: 31581, message_type: Query, op_code: Query, authoritative: false, truncation: false, recursion_desired: true, recursion_available: false, authentic_data: false, checking_disabled: false, response_code: NoError, query_count: 1, answer_count: 0, name_server_count: 0, additional_count: 1, }, queries: Queries { queries: [ LowerQuery { name: LowerName( Name("_nameservice._tcp.control-plane.oxide.internal."), ), original: Query { name: Name("_nameservice._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN, }, }, ], original: [ 12, 95, 110, 97, 109, 101, 115, 101, 114, 118, 105, 99, 101, 4, 95, 116, 99, 112, 13, 99, 111, 110, 116, 114, 111, 108, 45, 112, 108, 97, 110, 101, 5, 111, 120, 105, 100, 101, 8, 105, 110, 116, 101, 114, 110, 97, 108, 0, 0, 33, 0, 1, ], }, answers: [], name_servers: [], additionals: [], sig0: [], edns: Some( Edns { rcode_high: 0, version: 0, flags: EdnsFlags { dnssec_ok: false, z: 0, }, max_payload: 1232, options: OPT { options: [], }, }, ), } SERVFAIL: server is not authoritative for name: "_nameservice._tcp.control-plane.oxide.internal." kind = dns peer_addr = [::1]:15449 req_id = 2b64e19c-877a-4ff9-b0df-6588f58de00c
8592026-01-27T01:13:51.679ZTRACtest_vpcs (dns): buffer buffer = Length: 76 (0x4c) bytes\n0000: 08 10 01 00 00 01 00 00 00 00 00 01 0d 5f 65 78 ............._ex\n0010: 74 65 72 6e 61 6c 2d 64 6e 73 04 5f 74 63 70 0d ternal-dns._tcp.\n0020: 63 6f 6e 74 72 6f 6c 2d 70 6c 61 6e 65 05 6f 78 control-plane.ox\n0030: 69 64 65 08 69 6e 74 65 72 6e 61 6c 00 00 21 00 ide.internal..!.\n0040: 01 00 00 29 04 d0 00 00 00 00 00 00 ...)........ kind = dns peer_addr = [::1]:26564 req_id = 89fe79eb-cdb3-4ce0-8af9-354d759054cf
8602026-01-27T01:13:51.679ZDEBGtest_vpcs (dns): message_request kind = dns mr = MessageRequest {\n header: Header {\n id: 2064,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n queries: Queries {\n queries: [\n LowerQuery {\n name: LowerName(\n Name("_external-dns._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_external-dns._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n ],\n original: [\n 13,\n 95,\n 101,\n 120,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 45,\n 100,\n 110,\n 115,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n flags: EdnsFlags {\n dnssec_ok: false,\n z: 0,\n },\n max_payload: 1232,\n options: OPT {\n options: [],\n },\n },\n ),\n} peer_addr = [::1]:26564 req_id = 89fe79eb-cdb3-4ce0-8af9-354d759054cf
8612026-01-27T01:13:51.680ZERROtest_vpcs (dns): failed to handle incoming DNS message: MessageRequest { header: Header { id: 2064, message_type: Query, op_code: Query, authoritative: false, truncation: false, recursion_desired: true, recursion_available: false, authentic_data: false, checking_disabled: false, response_code: NoError, query_count: 1, answer_count: 0, name_server_count: 0, additional_count: 1, }, queries: Queries { queries: [ LowerQuery { name: LowerName( Name("_external-dns._tcp.control-plane.oxide.internal."), ), original: Query { name: Name("_external-dns._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN, }, }, ], original: [ 13, 95, 101, 120, 116, 101, 114, 110, 97, 108, 45, 100, 110, 115, 4, 95, 116, 99, 112, 13, 99, 111, 110, 116, 114, 111, 108, 45, 112, 108, 97, 110, 101, 5, 111, 120, 105, 100, 101, 8, 105, 110, 116, 101, 114, 110, 97, 108, 0, 0, 33, 0, 1, ], }, answers: [], name_servers: [], additionals: [], sig0: [], edns: Some( Edns { rcode_high: 0, version: 0, flags: EdnsFlags { dnssec_ok: false, z: 0, }, max_payload: 1232, options: OPT { options: [], }, }, ), } SERVFAIL: server is not authoritative for name: "_external-dns._tcp.control-plane.oxide.internal." kind = dns peer_addr = [::1]:26564 req_id = 89fe79eb-cdb3-4ce0-8af9-354d759054cf
8622026-01-27T01:13:51.684ZDEBGtest_vpcs (BackgroundTasks): roles background_task = support_bundle_collector roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
8632026-01-27T01:13:51.693ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = support_bundle_collector resource = Fleet result = Ok(())
8642026-01-27T01:13:51.693ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = support_bundle_collector resource = Database
8652026-01-27T01:13:51.693ZDEBGtest_vpcs (BackgroundTasks): roles background_task = support_bundle_collector roles = RoleSet { roles: {} }
8662026-01-27T01:13:51.694ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = support_bundle_collector resource = Database result = Ok(())
8672026-01-27T01:13:51.697ZDEBGtest_vpcs (init_with_steps): Running step start_mgd_switch0
8682026-01-27T01:13:51.697ZDEBGtest_vpcs: Starting mgd for switch0
8692026-01-27T01:13:51.700ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = dns_config_external dns_group = external resource = DnsConfig
8702026-01-27T01:13:51.701ZTRACtest_vpcs (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } background_task = dns_config_external dns_group = external resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
8712026-01-27T01:13:51.701ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = dns_config_external dns_group = external resource = Database
8722026-01-27T01:13:51.702ZDEBGtest_vpcs (BackgroundTasks): roles background_task = dns_config_external dns_group = external roles = RoleSet { roles: {} }
8732026-01-27T01:13:51.703ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = dns_config_external dns_group = external resource = Database result = Ok(())
8742026-01-27T01:13:51.707ZWARNtest_vpcs (BackgroundTasks): failed to lookup DNS servers background_task = dns_servers_internal dns_group = internal error = proto error: no records found for Query { name: Name("_nameservice._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN }
8752026-01-27T01:13:51.708ZDEBGtest_vpcs (BackgroundTasks): activation complete background_task = dns_servers_internal dns_group = internal elapsed = 317.947881ms iteration = 1 status = {"error":"failed to read list of DNS servers: proto error: no records found for Query { name: Name(\\"_nameservice._tcp.control-plane.oxide.internal.\\"), query_type: SRV, query_class: IN }"}
8762026-01-27T01:13:51.708ZWARNtest_vpcs (BackgroundTasks): failed to lookup DNS servers background_task = dns_servers_external dns_group = external error = proto error: no records found for Query { name: Name("_external-dns._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN }
8772026-01-27T01:13:51.709ZDEBGtest_vpcs (BackgroundTasks): activation complete background_task = dns_servers_external dns_group = external elapsed = 315.14723ms iteration = 1 status = {"error":"failed to read list of DNS servers: proto error: no records found for Query { name: Name(\\"_external-dns._tcp.control-plane.oxide.internal.\\"), query_type: SRV, query_class: IN }"}
8782026-01-27T01:13:51.709ZTRACtest_vpcs (dns): buffer buffer = Length: 72 (0x48) bytes\n0000: 66 ca 01 00 00 01 00 00 00 00 00 01 09 5f 64 65 f............_de\n0010: 6e 64 72 69 74 65 04 5f 74 63 70 0d 63 6f 6e 74 ndrite._tcp.cont\n0020: 72 6f 6c 2d 70 6c 61 6e 65 05 6f 78 69 64 65 08 rol-plane.oxide.\n0030: 69 6e 74 65 72 6e 61 6c 00 00 21 00 01 00 00 29 internal..!....)\n0040: 04 d0 00 00 00 00 00 00 ........ kind = dns peer_addr = [::1]:21252 req_id = 1241f2f6-c329-45a5-a344-359b29d7d4ea
8792026-01-27T01:13:51.709ZDEBGtest_vpcs (dns): message_request kind = dns mr = MessageRequest {\n header: Header {\n id: 26314,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n queries: Queries {\n queries: [\n LowerQuery {\n name: LowerName(\n Name("_dendrite._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_dendrite._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n ],\n original: [\n 9,\n 95,\n 100,\n 101,\n 110,\n 100,\n 114,\n 105,\n 116,\n 101,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n flags: EdnsFlags {\n dnssec_ok: false,\n z: 0,\n },\n max_payload: 1232,\n options: OPT {\n options: [],\n },\n },\n ),\n} peer_addr = [::1]:21252 req_id = 1241f2f6-c329-45a5-a344-359b29d7d4ea
8802026-01-27T01:13:51.710ZERROtest_vpcs (dns): failed to handle incoming DNS message: MessageRequest { header: Header { id: 26314, message_type: Query, op_code: Query, authoritative: false, truncation: false, recursion_desired: true, recursion_available: false, authentic_data: false, checking_disabled: false, response_code: NoError, query_count: 1, answer_count: 0, name_server_count: 0, additional_count: 1, }, queries: Queries { queries: [ LowerQuery { name: LowerName( Name("_dendrite._tcp.control-plane.oxide.internal."), ), original: Query { name: Name("_dendrite._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN, }, }, ], original: [ 9, 95, 100, 101, 110, 100, 114, 105, 116, 101, 4, 95, 116, 99, 112, 13, 99, 111, 110, 116, 114, 111, 108, 45, 112, 108, 97, 110, 101, 5, 111, 120, 105, 100, 101, 8, 105, 110, 116, 101, 114, 110, 97, 108, 0, 0, 33, 0, 1, ], }, answers: [], name_servers: [], additionals: [], sig0: [], edns: Some( Edns { rcode_high: 0, version: 0, flags: EdnsFlags { dnssec_ok: false, z: 0, }, max_payload: 1232, options: OPT { options: [], }, }, ), } SERVFAIL: server is not authoritative for name: "_dendrite._tcp.control-plane.oxide.internal." kind = dns peer_addr = [::1]:21252 req_id = 1241f2f6-c329-45a5-a344-359b29d7d4ea
8812026-01-27T01:13:51.710ZTRACtest_vpcs (dns): buffer buffer = Length: 67 (0x43) bytes\n0000: 5f 94 01 00 00 01 00 00 00 00 00 01 04 5f 6d 67 _............_mg\n0010: 73 04 5f 74 63 70 0d 63 6f 6e 74 72 6f 6c 2d 70 s._tcp.control-p\n0020: 6c 61 6e 65 05 6f 78 69 64 65 08 69 6e 74 65 72 lane.oxide.inter\n0030: 6e 61 6c 00 00 21 00 01 00 00 29 04 d0 00 00 00 nal..!....).....\n0040: 00 00 00 ... kind = dns peer_addr = [::1]:50178 req_id = 69900724-6b16-48de-a6be-d14e4ea528f7
8822026-01-27T01:13:51.710ZDEBGtest_vpcs (dns): message_request kind = dns mr = MessageRequest {\n header: Header {\n id: 24468,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n queries: Queries {\n queries: [\n LowerQuery {\n name: LowerName(\n Name("_mgs._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_mgs._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n ],\n original: [\n 4,\n 95,\n 109,\n 103,\n 115,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n flags: EdnsFlags {\n dnssec_ok: false,\n z: 0,\n },\n max_payload: 1232,\n options: OPT {\n options: [],\n },\n },\n ),\n} peer_addr = [::1]:50178 req_id = 69900724-6b16-48de-a6be-d14e4ea528f7
8832026-01-27T01:13:51.711ZERROtest_vpcs (dns): failed to handle incoming DNS message: MessageRequest { header: Header { id: 24468, message_type: Query, op_code: Query, authoritative: false, truncation: false, recursion_desired: true, recursion_available: false, authentic_data: false, checking_disabled: false, response_code: NoError, query_count: 1, answer_count: 0, name_server_count: 0, additional_count: 1, }, queries: Queries { queries: [ LowerQuery { name: LowerName( Name("_mgs._tcp.control-plane.oxide.internal."), ), original: Query { name: Name("_mgs._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN, }, }, ], original: [ 4, 95, 109, 103, 115, 4, 95, 116, 99, 112, 13, 99, 111, 110, 116, 114, 111, 108, 45, 112, 108, 97, 110, 101, 5, 111, 120, 105, 100, 101, 8, 105, 110, 116, 101, 114, 110, 97, 108, 0, 0, 33, 0, 1, ], }, answers: [], name_servers: [], additionals: [], sig0: [], edns: Some( Edns { rcode_high: 0, version: 0, flags: EdnsFlags { dnssec_ok: false, z: 0, }, max_payload: 1232, options: OPT { options: [], }, }, ), } SERVFAIL: server is not authoritative for name: "_mgs._tcp.control-plane.oxide.internal." kind = dns peer_addr = [::1]:50178 req_id = 69900724-6b16-48de-a6be-d14e4ea528f7
8842026-01-27T01:13:51.720ZERROtest_vpcs (BackgroundTasks): failed to resolve addresses for Dendrite services background_task = multicast_reconciler error = proto error: no records found for Query { name: Name("_dendrite._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN }
8852026-01-27T01:13:51.721ZERROtest_vpcs (BackgroundTasks): failed to build DPD clients background_task = multicast_reconciler error = proto error: no records found for Query { name: Name("_dendrite._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN }
8862026-01-27T01:13:51.721ZERROtest_vpcs (BackgroundTasks): multicast RPW reconciliation pass completed with dataplane inconsistencies active_groups_verified = 0 background_task = multicast_reconciler dataplane_error_count = 1 external_groups_created = 0 external_groups_deleted = 0 member_state_transitions = 0 orphaned_members_cleaned = 0
8872026-01-27T01:13:51.721ZDEBGtest_vpcs (BackgroundTasks): activation complete background_task = multicast_reconciler elapsed = 71.466948ms iteration = 1 status = {"disabled":false,"empty_groups_marked":0,"errors":["failed to create multicast dataplane client: Internal Error: failed to build DPD clients"],"groups_created":0,"groups_deleted":0,"groups_verified":0,"members_deleted":0,"members_processed":0}
8882026-01-27T01:13:51.722ZERROtest_vpcs (BackgroundTasks): failed to resolve MGS addresses background_task = sp_ereport_ingester error = Resolve(ResolveError { kind: Proto(ProtoError { kind: NoRecordsFound { query: Query { name: Name("_mgs._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN }, soa: None, ns: None, negative_ttl: None, response_code: ServFail, trusted: true, authorities: None } }) })
8892026-01-27T01:13:51.722ZDEBGtest_vpcs (BackgroundTasks): activation complete background_task = sp_ereport_ingester elapsed = 72.029704ms iteration = 1 status = {"disabled":false,"errors":["failed to resolve MGS addresses: proto error: no records found for Query { name: Name(\\"_mgs._tcp.control-plane.oxide.internal.\\"), query_type: SRV, query_class: IN }"],"sps":[]}
8902026-01-27T01:13:51.767ZTRACtest_vpcs (DnsResolver): lookup_all_socket_v6 srv dns_name = _dendrite._tcp.control-plane.oxide.internal
8912026-01-27T01:13:51.769ZINFOtest_vpcs (BackgroundTasks): Metric producer GC complete (no errors) background_task = metrics_producer_gc expiration = 2026-01-27 01:03:51.394482868 UTC pruned = {}
8922026-01-27T01:13:51.769ZDEBGtest_vpcs (BackgroundTasks): activation complete background_task = metrics_producer_gc elapsed = 374.892803ms iteration = 1 status = {"expiration":"2026-01-27T01:03:51.394482868Z","pruned":[]}
8932026-01-27T01:13:51.770ZTRACtest_vpcs (DnsResolver): lookup_all_ipv6 srv dns_name = _dendrite._tcp.control-plane.oxide.internal
8942026-01-27T01:13:51.774ZDEBGtest_vpcs (BackgroundTasks): activation complete background_task = phantom_disks elapsed = 291.426754ms iteration = 1 status = {"phantom_disk_deleted_err":0,"phantom_disk_deleted_ok":0}
8952026-01-27T01:13:51.787ZTRACtest_vpcs (dns): buffer buffer = Length: 72 (0x48) bytes\n0000: 8d 58 01 00 00 01 00 00 00 00 00 01 09 5f 64 65 .X..........._de\n0010: 6e 64 72 69 74 65 04 5f 74 63 70 0d 63 6f 6e 74 ndrite._tcp.cont\n0020: 72 6f 6c 2d 70 6c 61 6e 65 05 6f 78 69 64 65 08 rol-plane.oxide.\n0030: 69 6e 74 65 72 6e 61 6c 00 00 21 00 01 00 00 29 internal..!....)\n0040: 04 d0 00 00 00 00 00 00 ........ kind = dns peer_addr = [::1]:60664 req_id = 2cae67e7-e9b5-4522-b8ff-09d836ad8efc
8962026-01-27T01:13:51.788ZDEBGtest_vpcs (dns): message_request kind = dns mr = MessageRequest {\n header: Header {\n id: 36184,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n queries: Queries {\n queries: [\n LowerQuery {\n name: LowerName(\n Name("_dendrite._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_dendrite._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n ],\n original: [\n 9,\n 95,\n 100,\n 101,\n 110,\n 100,\n 114,\n 105,\n 116,\n 101,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n flags: EdnsFlags {\n dnssec_ok: false,\n z: 0,\n },\n max_payload: 1232,\n options: OPT {\n options: [],\n },\n },\n ),\n} peer_addr = [::1]:60664 req_id = 2cae67e7-e9b5-4522-b8ff-09d836ad8efc
8972026-01-27T01:13:51.793ZERROtest_vpcs (dns): failed to handle incoming DNS message: MessageRequest { header: Header { id: 36184, message_type: Query, op_code: Query, authoritative: false, truncation: false, recursion_desired: true, recursion_available: false, authentic_data: false, checking_disabled: false, response_code: NoError, query_count: 1, answer_count: 0, name_server_count: 0, additional_count: 1, }, queries: Queries { queries: [ LowerQuery { name: LowerName( Name("_dendrite._tcp.control-plane.oxide.internal."), ), original: Query { name: Name("_dendrite._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN, }, }, ], original: [ 9, 95, 100, 101, 110, 100, 114, 105, 116, 101, 4, 95, 116, 99, 112, 13, 99, 111, 110, 116, 114, 111, 108, 45, 112, 108, 97, 110, 101, 5, 111, 120, 105, 100, 101, 8, 105, 110, 116, 101, 114, 110, 97, 108, 0, 0, 33, 0, 1, ], }, answers: [], name_servers: [], additionals: [], sig0: [], edns: Some( Edns { rcode_high: 0, version: 0, flags: EdnsFlags { dnssec_ok: false, z: 0, }, max_payload: 1232, options: OPT { options: [], }, }, ), } SERVFAIL: server is not authoritative for name: "_dendrite._tcp.control-plane.oxide.internal." kind = dns peer_addr = [::1]:60664 req_id = 2cae67e7-e9b5-4522-b8ff-09d836ad8efc
8982026-01-27T01:13:51.881ZERROtest_vpcs (BackgroundTasks): failed to resolve addresses for Dendrite services background_task = nat_garbage_collector error = proto error: no records found for Query { name: Name("_dendrite._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN }
8992026-01-27T01:13:51.881ZERROtest_vpcs (BackgroundTasks): failed to resolve addresses for Dendrite services background_task = nat_garbage_collector error = proto error: no records found for Query { name: Name("_dendrite._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN }
9002026-01-27T01:13:51.881ZDEBGtest_vpcs (BackgroundTasks): activation complete background_task = nat_garbage_collector elapsed = 401.822001ms iteration = 1 status = {"error":"failed to resolve addresses for Dendrite services: proto error: no records found for Query { name: Name(\\"_dendrite._tcp.control-plane.oxide.internal.\\"), query_type: SRV, query_class: IN }"}
9012026-01-27T01:13:51.881ZTRACtest_vpcs (dns): buffer buffer = Length: 72 (0x48) bytes\n0000: 79 e1 01 00 00 01 00 00 00 00 00 01 09 5f 64 65 y............_de\n0010: 6e 64 72 69 74 65 04 5f 74 63 70 0d 63 6f 6e 74 ndrite._tcp.cont\n0020: 72 6f 6c 2d 70 6c 61 6e 65 05 6f 78 69 64 65 08 rol-plane.oxide.\n0030: 69 6e 74 65 72 6e 61 6c 00 00 21 00 01 00 00 29 internal..!....)\n0040: 04 d0 00 00 00 00 00 00 ........ kind = dns peer_addr = [::1]:46383 req_id = 5bcbd124-1a6a-4705-ae65-c0a4189d8f3f
9022026-01-27T01:13:51.882ZDEBGtest_vpcs (dns): message_request kind = dns mr = MessageRequest {\n header: Header {\n id: 31201,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n queries: Queries {\n queries: [\n LowerQuery {\n name: LowerName(\n Name("_dendrite._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_dendrite._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n ],\n original: [\n 9,\n 95,\n 100,\n 101,\n 110,\n 100,\n 114,\n 105,\n 116,\n 101,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n flags: EdnsFlags {\n dnssec_ok: false,\n z: 0,\n },\n max_payload: 1232,\n options: OPT {\n options: [],\n },\n },\n ),\n} peer_addr = [::1]:46383 req_id = 5bcbd124-1a6a-4705-ae65-c0a4189d8f3f
9032026-01-27T01:13:51.882ZERROtest_vpcs (dns): failed to handle incoming DNS message: MessageRequest { header: Header { id: 31201, message_type: Query, op_code: Query, authoritative: false, truncation: false, recursion_desired: true, recursion_available: false, authentic_data: false, checking_disabled: false, response_code: NoError, query_count: 1, answer_count: 0, name_server_count: 0, additional_count: 1, }, queries: Queries { queries: [ LowerQuery { name: LowerName( Name("_dendrite._tcp.control-plane.oxide.internal."), ), original: Query { name: Name("_dendrite._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN, }, }, ], original: [ 9, 95, 100, 101, 110, 100, 114, 105, 116, 101, 4, 95, 116, 99, 112, 13, 99, 111, 110, 116, 114, 111, 108, 45, 112, 108, 97, 110, 101, 5, 111, 120, 105, 100, 101, 8, 105, 110, 116, 101, 114, 110, 97, 108, 0, 0, 33, 0, 1, ], }, answers: [], name_servers: [], additionals: [], sig0: [], edns: Some( Edns { rcode_high: 0, version: 0, flags: EdnsFlags { dnssec_ok: false, z: 0, }, max_payload: 1232, options: OPT { options: [], }, }, ), } SERVFAIL: server is not authoritative for name: "_dendrite._tcp.control-plane.oxide.internal." kind = dns peer_addr = [::1]:46383 req_id = 5bcbd124-1a6a-4705-ae65-c0a4189d8f3f
9042026-01-27T01:13:51.883ZERROtest_vpcs (BackgroundTasks): failed to resolve addresses for Dendrite services background_task = bfd_manager error = proto error: no records found for Query { name: Name("_dendrite._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN }
9052026-01-27T01:13:51.883ZERROtest_vpcs (BackgroundTasks): failed to resolve addresses for Dendrite services background_task = bfd_manager error = proto error: no records found for Query { name: Name("_dendrite._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN }
9062026-01-27T01:13:51.883ZDEBGtest_vpcs (BackgroundTasks): activation complete background_task = bfd_manager elapsed = 401.644994ms iteration = 1 status = {"error":"failed to resolve addresses for Dendrite services: proto error: no records found for Query { name: Name(\\"_dendrite._tcp.control-plane.oxide.internal.\\"), query_type: SRV, query_class: IN }"}
9072026-01-27T01:13:51.909ZDEBGtest_vpcs: mgd port is 53789
9082026-01-27T01:13:51.909ZDEBGtest_vpcs (init_with_steps): Running step record_switch_dns
9092026-01-27T01:13:51.909ZDEBGtest_vpcs: Recording DNS for the switch zones sled_id = b6d65341-167c-41df-9b5c-41cded99c229 switch_location = switch0
9102026-01-27T01:13:51.909ZDEBGtest_vpcs (init_with_steps): Running step start_sled1
9112026-01-27T01:13:51.910ZINFOtest_vpcs (omicron_sled_agent::sim::Server): setting up sled agent server sled_id = b6d65341-167c-41df-9b5c-41cded99c229
9122026-01-27T01:13:51.985ZINFOtest_vpcs (SledAgent): created simulated sled agent server = b6d65341-167c-41df-9b5c-41cded99c229 sim_mode = Explicit sled_id = b6d65341-167c-41df-9b5c-41cded99c229
9132026-01-27T01:13:51.985ZINFOtest_vpcs (omicron_sled_agent::sim::SimulatedUpstairs): registered sled b6d65341-167c-41df-9b5c-41cded99c229 storage
9142026-01-27T01:13:51.987ZDEBGtest_vpcs (BackgroundTasks): roles background_task = instance_watcher roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
9152026-01-27T01:13:51.996ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = instance_watcher resource = Fleet result = Ok(())
9162026-01-27T01:13:51.996ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = instance_watcher resource = Database
9172026-01-27T01:13:51.996ZDEBGtest_vpcs (BackgroundTasks): roles background_task = instance_watcher roles = RoleSet { roles: {} }
9182026-01-27T01:13:51.997ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = instance_watcher resource = Database result = Ok(())
9192026-01-27T01:13:52.011ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = Database
9202026-01-27T01:13:52.011ZDEBGtest_vpcs (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
9212026-01-27T01:13:52.013ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
9222026-01-27T01:13:52.014ZDEBGtest_vpcs (BackgroundTasks): roles background_task = external_endpoints roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
9232026-01-27T01:13:52.046ZDEBGtest_vpcs (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = external_endpoints resource = Fleet result = Ok(())
9242026-01-27T01:13:52.047ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = external_endpoints resource = Database
9252026-01-27T01:13:52.047ZDEBGtest_vpcs (BackgroundTasks): roles background_task = external_endpoints roles = RoleSet { roles: {} }
9262026-01-27T01:13:52.048ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = external_endpoints resource = Database result = Ok(())
9272026-01-27T01:13:52.049ZDEBGtest_vpcs (BackgroundTasks): roles background_task = blueprint_loader roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
9282026-01-27T01:13:52.074ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = blueprint_loader resource = BlueprintConfig result = Ok(())
9292026-01-27T01:13:52.074ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = blueprint_loader resource = Database
9302026-01-27T01:13:52.074ZDEBGtest_vpcs (BackgroundTasks): roles background_task = blueprint_loader roles = RoleSet { roles: {} }
9312026-01-27T01:13:52.075ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = blueprint_loader resource = Database result = Ok(())
9322026-01-27T01:13:52.077ZDEBGtest_vpcs (BackgroundTasks): roles background_task = reconfigurator_config_watcher roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
9332026-01-27T01:13:52.094ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = reconfigurator_config_watcher resource = BlueprintConfig result = Ok(())
9342026-01-27T01:13:52.094ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = reconfigurator_config_watcher resource = Database
9352026-01-27T01:13:52.094ZDEBGtest_vpcs (BackgroundTasks): roles background_task = reconfigurator_config_watcher roles = RoleSet { roles: {} }
9362026-01-27T01:13:52.095ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = reconfigurator_config_watcher resource = Database result = Ok(())
9372026-01-27T01:13:52.098ZINFOtest_vpcs (ArtifactStore): No ledger in /var/tmp/omicron_tmp/.tmpRZLK7V/artifact-config.json server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
9382026-01-27T01:13:52.098ZDEBGtest_vpcs (ArtifactStore): Failed to read ledger: Not found in storage path = /var/tmp/omicron_tmp/.tmpRZLK7V/artifact-config.json server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
9392026-01-27T01:13:52.098ZINFOtest_vpcs (ArtifactStore): No ledger in /var/tmp/omicron_tmp/.tmpNYh8YN/artifact-config.json server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
9402026-01-27T01:13:52.098ZDEBGtest_vpcs (ArtifactStore): Failed to read ledger: Not found in storage path = /var/tmp/omicron_tmp/.tmpNYh8YN/artifact-config.json server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
9412026-01-27T01:13:52.263ZDEBGtest_vpcs (dropshot (Repo Depot)): registered endpoint local_addr = [::1]:50229 method = GET path = /artifact/sha256/{sha256} server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
9422026-01-27T01:13:52.263ZINFOtest_vpcs (dropshot (Repo Depot)): listening local_addr = [::1]:50229 server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
9432026-01-27T01:13:52.268ZDEBGtest_vpcs (dropshot (Repo Depot)): successfully registered DTrace USDT probes local_addr = [::1]:50229 server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
9442026-01-27T01:13:52.278ZDEBGtest_vpcs (dropshot): registered endpoint local_addr = [::1]:59842 method = GET path = /artifacts sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
9452026-01-27T01:13:52.278ZDEBGtest_vpcs (dropshot): registered endpoint local_addr = [::1]:59842 method = PUT path = /artifacts/{sha256} sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
9462026-01-27T01:13:52.279ZDEBGtest_vpcs (dropshot): registered endpoint local_addr = [::1]:59842 method = POST path = /artifacts/{sha256}/copy-from-depot sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
9472026-01-27T01:13:52.279ZDEBGtest_vpcs (dropshot): registered endpoint local_addr = [::1]:59842 method = GET path = /artifacts-config sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
9482026-01-27T01:13:52.279ZDEBGtest_vpcs (dropshot): registered endpoint local_addr = [::1]:59842 method = PUT path = /artifacts-config sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
9492026-01-27T01:13:52.279ZDEBGtest_vpcs (dropshot): registered endpoint local_addr = [::1]:59842 method = GET path = /bootstore/status sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
9502026-01-27T01:13:52.279ZDEBGtest_vpcs (dropshot): registered endpoint local_addr = [::1]:59842 method = GET path = /chicken-switch/destroy-orphaned-datasets sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all ending with 2.0.0
9512026-01-27T01:13:52.279ZDEBGtest_vpcs (dropshot): registered endpoint local_addr = [::1]:59842 method = PUT path = /chicken-switch/destroy-orphaned-datasets sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all ending with 3.0.0
9522026-01-27T01:13:52.279ZDEBGtest_vpcs (dropshot): registered endpoint local_addr = [::1]:59842 method = GET path = /debug/switch-zone-policy sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all starting from 3.0.0
9532026-01-27T01:13:52.280ZDEBGtest_vpcs (dropshot): registered endpoint local_addr = [::1]:59842 method = PUT path = /debug/switch-zone-policy sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all starting from 3.0.0
9542026-01-27T01:13:52.280ZDEBGtest_vpcs (dropshot): registered endpoint local_addr = [::1]:59842 method = PUT path = /disks/{disk_id} sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
9552026-01-27T01:13:52.280ZDEBGtest_vpcs (dropshot): registered endpoint local_addr = [::1]:59842 method = POST path = /disks/{disk_id}/poke sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
9562026-01-27T01:13:52.280ZDEBGtest_vpcs (dropshot): registered endpoint local_addr = [::1]:59842 method = PUT path = /eip-gateways sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
9572026-01-27T01:13:52.280ZDEBGtest_vpcs (dropshot): registered endpoint local_addr = [::1]:59842 method = GET path = /inventory sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all starting from 14.0.0
9582026-01-27T01:13:52.280ZDEBGtest_vpcs (dropshot): registered endpoint local_addr = [::1]:59842 method = GET path = /inventory sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = from 12.0.0 to 14.0.0
9592026-01-27T01:13:52.280ZDEBGtest_vpcs (dropshot): registered endpoint local_addr = [::1]:59842 method = GET path = /inventory sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = from 11.0.0 to 12.0.0
9602026-01-27T01:13:52.280ZDEBGtest_vpcs (dropshot): registered endpoint local_addr = [::1]:59842 method = GET path = /inventory sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = from 10.0.0 to 11.0.0
9612026-01-27T01:13:52.280ZDEBGtest_vpcs (dropshot): registered endpoint local_addr = [::1]:59842 method = GET path = /inventory sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = from 4.0.0 to 10.0.0
9622026-01-27T01:13:52.280ZDEBGtest_vpcs (dropshot): registered endpoint local_addr = [::1]:59842 method = GET path = /inventory sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all ending with 4.0.0
9632026-01-27T01:13:52.281ZDEBGtest_vpcs (dropshot): registered endpoint local_addr = [::1]:59842 method = DELETE path = /local-storage/{zpool_id}/{dataset_id} sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all starting from 9.0.0
9642026-01-27T01:13:52.281ZDEBGtest_vpcs (dropshot): registered endpoint local_addr = [::1]:59842 method = POST path = /local-storage/{zpool_id}/{dataset_id} sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all starting from 9.0.0
9652026-01-27T01:13:52.281ZDEBGtest_vpcs (dropshot): registered endpoint local_addr = [::1]:59842 method = GET path = /network-bootstore-config sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
9662026-01-27T01:13:52.281ZDEBGtest_vpcs (dropshot): registered endpoint local_addr = [::1]:59842 method = PUT path = /network-bootstore-config sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
9672026-01-27T01:13:52.281ZDEBGtest_vpcs (dropshot): registered endpoint local_addr = [::1]:59842 method = PUT path = /omicron-config sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all starting from 14.0.0
9682026-01-27T01:13:52.281ZDEBGtest_vpcs (dropshot): registered endpoint local_addr = [::1]:59842 method = PUT path = /omicron-config sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = from 11.0.0 to 14.0.0
9692026-01-27T01:13:52.281ZDEBGtest_vpcs (dropshot): registered endpoint local_addr = [::1]:59842 method = PUT path = /omicron-config sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = from 10.0.0 to 11.0.0
9702026-01-27T01:13:52.282ZDEBGtest_vpcs (dropshot): registered endpoint local_addr = [::1]:59842 method = PUT path = /omicron-config sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = from 4.0.0 to 10.0.0
9712026-01-27T01:13:52.282ZDEBGtest_vpcs (dropshot): registered endpoint local_addr = [::1]:59842 method = PUT path = /omicron-config sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all ending with 4.0.0
9722026-01-27T01:13:52.282ZDEBGtest_vpcs (dropshot): registered endpoint local_addr = [::1]:59842 method = PUT path = /probes sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all starting from 10.0.0
9732026-01-27T01:13:52.282ZDEBGtest_vpcs (dropshot): registered endpoint local_addr = [::1]:59842 method = PUT path = /probes sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = from 6.0.0 to 10.0.0
9742026-01-27T01:13:52.282ZDEBGtest_vpcs (dropshot): registered endpoint local_addr = [::1]:59842 method = GET path = /sled-identifiers sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
9752026-01-27T01:13:52.282ZDEBGtest_vpcs (dropshot): registered endpoint local_addr = [::1]:59842 method = GET path = /sled-role sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all ending with 8.0.0
9762026-01-27T01:13:52.282ZDEBGtest_vpcs (dropshot): registered endpoint local_addr = [::1]:59842 method = PUT path = /sleds sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
9772026-01-27T01:13:52.282ZDEBGtest_vpcs (dropshot): registered endpoint local_addr = [::1]:59842 method = GET path = /support/dladm-info sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
9782026-01-27T01:13:52.282ZDEBGtest_vpcs (dropshot): registered endpoint local_addr = [::1]:59842 method = GET path = /support/health-check sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
9792026-01-27T01:13:52.282ZDEBGtest_vpcs (dropshot): registered endpoint local_addr = [::1]:59842 method = GET path = /support/ipadm-info sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
9802026-01-27T01:13:52.283ZDEBGtest_vpcs (dropshot): registered endpoint local_addr = [::1]:59842 method = GET path = /support/logs/download/{zone} sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
9812026-01-27T01:13:52.283ZDEBGtest_vpcs (dropshot): registered endpoint local_addr = [::1]:59842 method = GET path = /support/logs/zones sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
9822026-01-27T01:13:52.283ZDEBGtest_vpcs (dropshot): registered endpoint local_addr = [::1]:59842 method = GET path = /support/nvmeadm-info sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
9832026-01-27T01:13:52.283ZDEBGtest_vpcs (dropshot): registered endpoint local_addr = [::1]:59842 method = GET path = /support/pargs-info sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
9842026-01-27T01:13:52.283ZDEBGtest_vpcs (dropshot): registered endpoint local_addr = [::1]:59842 method = GET path = /support/pfiles-info sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
9852026-01-27T01:13:52.283ZDEBGtest_vpcs (dropshot): registered endpoint local_addr = [::1]:59842 method = GET path = /support/pstack-info sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
9862026-01-27T01:13:52.283ZDEBGtest_vpcs (dropshot): registered endpoint local_addr = [::1]:59842 method = GET path = /support/zfs-info sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
9872026-01-27T01:13:52.283ZDEBGtest_vpcs (dropshot): registered endpoint local_addr = [::1]:59842 method = GET path = /support/zoneadm-info sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
9882026-01-27T01:13:52.283ZDEBGtest_vpcs (dropshot): registered endpoint local_addr = [::1]:59842 method = GET path = /support/zpool-info sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
9892026-01-27T01:13:52.283ZDEBGtest_vpcs (dropshot): registered endpoint local_addr = [::1]:59842 method = GET path = /support-bundles/{zpool_id}/{dataset_id} sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
9902026-01-27T01:13:52.284ZDEBGtest_vpcs (dropshot): registered endpoint local_addr = [::1]:59842 method = DELETE path = /support-bundles/{zpool_id}/{dataset_id}/{support_bundle_id} sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
9912026-01-27T01:13:52.284ZDEBGtest_vpcs (dropshot): registered endpoint local_addr = [::1]:59842 method = POST path = /support-bundles/{zpool_id}/{dataset_id}/{support_bundle_id} sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
9922026-01-27T01:13:52.284ZDEBGtest_vpcs (dropshot): registered endpoint local_addr = [::1]:59842 method = GET path = /support-bundles/{zpool_id}/{dataset_id}/{support_bundle_id}/download sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
9932026-01-27T01:13:52.284ZDEBGtest_vpcs (dropshot): registered endpoint local_addr = [::1]:59842 method = HEAD path = /support-bundles/{zpool_id}/{dataset_id}/{support_bundle_id}/download sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
9942026-01-27T01:13:52.284ZDEBGtest_vpcs (dropshot): registered endpoint local_addr = [::1]:59842 method = GET path = /support-bundles/{zpool_id}/{dataset_id}/{support_bundle_id}/download/{file} sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
9952026-01-27T01:13:52.284ZDEBGtest_vpcs (dropshot): registered endpoint local_addr = [::1]:59842 method = HEAD path = /support-bundles/{zpool_id}/{dataset_id}/{support_bundle_id}/download/{file} sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
9962026-01-27T01:13:52.284ZDEBGtest_vpcs (dropshot): registered endpoint local_addr = [::1]:59842 method = POST path = /support-bundles/{zpool_id}/{dataset_id}/{support_bundle_id}/finalize sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
9972026-01-27T01:13:52.284ZDEBGtest_vpcs (dropshot): registered endpoint local_addr = [::1]:59842 method = GET path = /support-bundles/{zpool_id}/{dataset_id}/{support_bundle_id}/index sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
9982026-01-27T01:13:52.284ZDEBGtest_vpcs (dropshot): registered endpoint local_addr = [::1]:59842 method = HEAD path = /support-bundles/{zpool_id}/{dataset_id}/{support_bundle_id}/index sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
9992026-01-27T01:13:52.284ZDEBGtest_vpcs (dropshot): registered endpoint local_addr = [::1]:59842 method = PUT path = /support-bundles/{zpool_id}/{dataset_id}/{support_bundle_id}/transfer sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
10002026-01-27T01:13:52.284ZDEBGtest_vpcs (dropshot): registered endpoint local_addr = [::1]:59842 method = POST path = /switch-ports sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
10012026-01-27T01:13:52.284ZDEBGtest_vpcs (dropshot): registered endpoint local_addr = [::1]:59842 method = PUT path = /trust-quorum/commit sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all starting from 13.0.0
10022026-01-27T01:13:52.285ZDEBGtest_vpcs (dropshot): registered endpoint local_addr = [::1]:59842 method = POST path = /trust-quorum/configuration sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all starting from 13.0.0
10032026-01-27T01:13:52.285ZDEBGtest_vpcs (dropshot): registered endpoint local_addr = [::1]:59842 method = GET path = /trust-quorum/coordinator-status sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all starting from 13.0.0
10042026-01-27T01:13:52.285ZDEBGtest_vpcs (dropshot): registered endpoint local_addr = [::1]:59842 method = GET path = /trust-quorum/network-config sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all starting from 15.0.0
10052026-01-27T01:13:52.285ZDEBGtest_vpcs (dropshot): registered endpoint local_addr = [::1]:59842 method = PUT path = /trust-quorum/network-config sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all starting from 15.0.0
10062026-01-27T01:13:52.285ZDEBGtest_vpcs (dropshot): registered endpoint local_addr = [::1]:59842 method = PUT path = /trust-quorum/prepare-and-commit sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all starting from 13.0.0
10072026-01-27T01:13:52.285ZDEBGtest_vpcs (dropshot): registered endpoint local_addr = [::1]:59842 method = PUT path = /trust-quorum/proxy/commit sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all starting from 13.0.0
10082026-01-27T01:13:52.285ZDEBGtest_vpcs (dropshot): registered endpoint local_addr = [::1]:59842 method = PUT path = /trust-quorum/proxy/prepare-and-commit sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all starting from 13.0.0
10092026-01-27T01:13:52.285ZDEBGtest_vpcs (dropshot): registered endpoint local_addr = [::1]:59842 method = GET path = /trust-quorum/proxy/status sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all starting from 13.0.0
10102026-01-27T01:13:52.285ZDEBGtest_vpcs (dropshot): registered endpoint local_addr = [::1]:59842 method = GET path = /trust-quorum/status sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all starting from 15.0.0
10112026-01-27T01:13:52.285ZDEBGtest_vpcs (dropshot): registered endpoint local_addr = [::1]:59842 method = POST path = /trust-quorum/upgrade sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all starting from 13.0.0
10122026-01-27T01:13:52.285ZDEBGtest_vpcs (dropshot): registered endpoint local_addr = [::1]:59842 method = DELETE path = /v2p sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
10132026-01-27T01:13:52.286ZDEBGtest_vpcs (dropshot): registered endpoint local_addr = [::1]:59842 method = GET path = /v2p sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
10142026-01-27T01:13:52.286ZDEBGtest_vpcs (dropshot): registered endpoint local_addr = [::1]:59842 method = PUT path = /v2p sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
10152026-01-27T01:13:52.286ZDEBGtest_vpcs (dropshot): registered endpoint local_addr = [::1]:59842 method = DELETE path = /vmms/{propolis_id} sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
10162026-01-27T01:13:52.286ZDEBGtest_vpcs (dropshot): registered endpoint local_addr = [::1]:59842 method = PUT path = /vmms/{propolis_id} sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all starting from 11.0.0
10172026-01-27T01:13:52.286ZDEBGtest_vpcs (dropshot): registered endpoint local_addr = [::1]:59842 method = PUT path = /vmms/{propolis_id} sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = from 10.0.0 to 11.0.0
10182026-01-27T01:13:52.286ZDEBGtest_vpcs (dropshot): registered endpoint local_addr = [::1]:59842 method = PUT path = /vmms/{propolis_id} sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = from 9.0.0 to 10.0.0
10192026-01-27T01:13:52.286ZDEBGtest_vpcs (dropshot): registered endpoint local_addr = [::1]:59842 method = PUT path = /vmms/{propolis_id} sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = from 7.0.0 to 9.0.0
10202026-01-27T01:13:52.286ZDEBGtest_vpcs (dropshot): registered endpoint local_addr = [::1]:59842 method = PUT path = /vmms/{propolis_id} sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all ending with 7.0.0
10212026-01-27T01:13:52.286ZDEBGtest_vpcs (dropshot): registered endpoint local_addr = [::1]:59842 method = POST path = /vmms/{propolis_id}/disks/{disk_id}/snapshot sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
10222026-01-27T01:13:52.286ZDEBGtest_vpcs (dropshot): registered endpoint local_addr = [::1]:59842 method = DELETE path = /vmms/{propolis_id}/external-ip sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
10232026-01-27T01:13:52.286ZDEBGtest_vpcs (dropshot): registered endpoint local_addr = [::1]:59842 method = PUT path = /vmms/{propolis_id}/external-ip sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
10242026-01-27T01:13:52.287ZDEBGtest_vpcs (dropshot): registered endpoint local_addr = [::1]:59842 method = DELETE path = /vmms/{propolis_id}/multicast-group sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all starting from 7.0.0
10252026-01-27T01:13:52.287ZDEBGtest_vpcs (dropshot): registered endpoint local_addr = [::1]:59842 method = PUT path = /vmms/{propolis_id}/multicast-group sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all starting from 7.0.0
10262026-01-27T01:13:52.287ZDEBGtest_vpcs (dropshot): registered endpoint local_addr = [::1]:59842 method = POST path = /vmms/{propolis_id}/poke sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
10272026-01-27T01:13:52.287ZDEBGtest_vpcs (dropshot): registered endpoint local_addr = [::1]:59842 method = POST path = /vmms/{propolis_id}/poke-single-step sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
10282026-01-27T01:13:52.287ZDEBGtest_vpcs (dropshot): registered endpoint local_addr = [::1]:59842 method = POST path = /vmms/{propolis_id}/sim-migration-source sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
10292026-01-27T01:13:52.287ZDEBGtest_vpcs (dropshot): registered endpoint local_addr = [::1]:59842 method = GET path = /vmms/{propolis_id}/state sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
10302026-01-27T01:13:52.287ZDEBGtest_vpcs (dropshot): registered endpoint local_addr = [::1]:59842 method = PUT path = /vmms/{propolis_id}/state sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
10312026-01-27T01:13:52.287ZDEBGtest_vpcs (dropshot): registered endpoint local_addr = [::1]:59842 method = PUT path = /vpc/{vpc_id}/firewall/rules sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all starting from 10.0.0
10322026-01-27T01:13:52.287ZDEBGtest_vpcs (dropshot): registered endpoint local_addr = [::1]:59842 method = PUT path = /vpc/{vpc_id}/firewall/rules sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all ending with 10.0.0
10332026-01-27T01:13:52.287ZDEBGtest_vpcs (dropshot): registered endpoint local_addr = [::1]:59842 method = GET path = /vpc-routes sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
10342026-01-27T01:13:52.288ZDEBGtest_vpcs (dropshot): registered endpoint local_addr = [::1]:59842 method = PUT path = /vpc-routes sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
10352026-01-27T01:13:52.288ZDEBGtest_vpcs (dropshot): registered endpoint local_addr = [::1]:59842 method = GET path = /zones sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
10362026-01-27T01:13:52.288ZDEBGtest_vpcs (dropshot): registered endpoint local_addr = [::1]:59842 method = POST path = /zones/bundle-cleanup sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
10372026-01-27T01:13:52.288ZDEBGtest_vpcs (dropshot): registered endpoint local_addr = [::1]:59842 method = GET path = /zones/bundle-cleanup/context sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
10382026-01-27T01:13:52.288ZDEBGtest_vpcs (dropshot): registered endpoint local_addr = [::1]:59842 method = PUT path = /zones/bundle-cleanup/context sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
10392026-01-27T01:13:52.288ZDEBGtest_vpcs (dropshot): registered endpoint local_addr = [::1]:59842 method = GET path = /zones/bundle-cleanup/utilization sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
10402026-01-27T01:13:52.288ZDEBGtest_vpcs (dropshot): registered endpoint local_addr = [::1]:59842 method = GET path = /zones/bundles sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
10412026-01-27T01:13:52.288ZDEBGtest_vpcs (dropshot): registered endpoint local_addr = [::1]:59842 method = GET path = /zones/bundles/{zone_name} sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
10422026-01-27T01:13:52.288ZDEBGtest_vpcs (dropshot): registered endpoint local_addr = [::1]:59842 method = DELETE path = /zones/bundles/{zone_name}/{bundle_id} sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
10432026-01-27T01:13:52.288ZDEBGtest_vpcs (dropshot): registered endpoint local_addr = [::1]:59842 method = GET path = /zones/bundles/{zone_name}/{bundle_id} sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
10442026-01-27T01:13:52.289ZINFOtest_vpcs (dropshot): listening local_addr = [::1]:59842 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
10452026-01-27T01:13:52.291ZDEBGtest_vpcs (dropshot): successfully registered DTrace USDT probes local_addr = [::1]:59842 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
10462026-01-27T01:13:52.291ZINFOtest_vpcs (dropshot_internal): accepted connection local_addr = 127.0.0.1:46983 remote_addr = 127.0.0.1:63662
10472026-01-27T01:13:52.293ZDEBGtest_vpcs (omicron_sled_agent::sim::Server): contacting server nexus sled_id = b6d65341-167c-41df-9b5c-41cded99c229
10482026-01-27T01:13:52.293ZDEBGtest_vpcs (NexusClient): client request body = Some(Body) method = POST sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = http://127.0.0.1:46983/sled-agents/b6d65341-167c-41df-9b5c-41cded99c229
10492026-01-27T01:13:52.297ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = region_replacement_driver resource = Database
10502026-01-27T01:13:52.297ZDEBGtest_vpcs (BackgroundTasks): roles background_task = region_replacement_driver roles = RoleSet { roles: {} }
10512026-01-27T01:13:52.298ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = region_replacement_driver resource = Database result = Ok(())
10522026-01-27T01:13:52.301ZDEBGtest_vpcs (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
10532026-01-27T01:13:52.307ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = inventory_collection resource = Inventory result = Ok(())
10542026-01-27T01:13:52.307ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = inventory_collection resource = Database
10552026-01-27T01:13:52.308ZDEBGtest_vpcs (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {} }
10562026-01-27T01:13:52.309ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = inventory_collection resource = Database result = Ok(())
10572026-01-27T01:13:52.311ZDEBGtest_vpcs (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
10582026-01-27T01:13:52.327ZDEBGtest_vpcs (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = vpc_route_manager resource = Fleet result = Ok(())
10592026-01-27T01:13:52.327ZTRACtest_vpcs (BackgroundTasks): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = vpc_route_manager resource = Fleet
10602026-01-27T01:13:52.327ZTRACtest_vpcs (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } background_task = vpc_route_manager resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
10612026-01-27T01:13:52.327ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = vpc_route_manager resource = Database
10622026-01-27T01:13:52.327ZDEBGtest_vpcs (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
10632026-01-27T01:13:52.328ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = vpc_route_manager resource = Database result = Ok(())
10642026-01-27T01:13:52.331ZINFOtest_vpcs (dropshot_internal): accepted connection local_addr = 127.0.0.1:46983 remote_addr = 127.0.0.1:36890
10652026-01-27T01:13:52.332ZTRACtest_vpcs (dropshot_internal): incoming request local_addr = 127.0.0.1:46983 method = GET remote_addr = 127.0.0.1:63662 req_id = e3db9b9f-f198-46ef-93ee-3a99b412fcc8 uri = /nat/ipv4/changeset/0?limit=100
10662026-01-27T01:13:52.332ZDEBGtest_vpcs (dropshot_internal): determined request API version local_addr = 127.0.0.1:46983 method = GET remote_addr = 127.0.0.1:63662 req_id = e3db9b9f-f198-46ef-93ee-3a99b412fcc8 uri = /nat/ipv4/changeset/0?limit=100 version = 1.0.0
10672026-01-27T01:13:52.334ZTRACtest_vpcs (dropshot_internal): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) authenticated = true local_addr = 127.0.0.1:46983 method = GET remote_addr = 127.0.0.1:63662 req_id = e3db9b9f-f198-46ef-93ee-3a99b412fcc8 resource = Database type = user_builtin uri = /nat/ipv4/changeset/0?limit=100 user_builtin_id = 001de000-05e4-4000-8000-000000000002
10682026-01-27T01:13:52.334ZDEBGtest_vpcs (dropshot_internal): roles authenticated = true local_addr = 127.0.0.1:46983 method = GET remote_addr = 127.0.0.1:63662 req_id = e3db9b9f-f198-46ef-93ee-3a99b412fcc8 roles = RoleSet { roles: {} } type = user_builtin uri = /nat/ipv4/changeset/0?limit=100 user_builtin_id = 001de000-05e4-4000-8000-000000000002
10692026-01-27T01:13:52.335ZDEBGtest_vpcs (dropshot_internal): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) authenticated = true local_addr = 127.0.0.1:46983 method = GET remote_addr = 127.0.0.1:63662 req_id = e3db9b9f-f198-46ef-93ee-3a99b412fcc8 resource = Database result = Ok(()) type = user_builtin uri = /nat/ipv4/changeset/0?limit=100 user_builtin_id = 001de000-05e4-4000-8000-000000000002
10702026-01-27T01:13:52.412ZDEBGtest_vpcs (BackgroundTasks): roles background_task = switch_port_config_manager roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
10712026-01-27T01:13:52.418ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = switch_port_config_manager resource = Fleet result = Ok(())
10722026-01-27T01:13:52.418ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = switch_port_config_manager resource = Database
10732026-01-27T01:13:52.418ZDEBGtest_vpcs (BackgroundTasks): roles background_task = switch_port_config_manager roles = RoleSet { roles: {} }
10742026-01-27T01:13:52.418ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = switch_port_config_manager resource = Database result = Ok(())
10752026-01-27T01:13:52.420ZDEBGtest_vpcs (BackgroundTasks): roles background_task = inventory_loader roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
10762026-01-27T01:13:52.426ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = inventory_loader resource = Inventory result = Ok(())
10772026-01-27T01:13:52.427ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = inventory_loader resource = Database
10782026-01-27T01:13:52.427ZDEBGtest_vpcs (BackgroundTasks): roles background_task = inventory_loader roles = RoleSet { roles: {} }
10792026-01-27T01:13:52.427ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = inventory_loader resource = Database result = Ok(())
10802026-01-27T01:13:52.430ZDEBGtest_vpcs (BackgroundTasks): Found abandoned VMMs background_task = abandoned_vmm_reaper count = 0 total = 0
10812026-01-27T01:13:52.430ZINFOtest_vpcs (BackgroundTasks): Abandoned VMMs reaped background_task = abandoned_vmm_reaper sled_reservations_deleted = 0 vmms_already_deleted = 0 vmms_deleted = 0 vmms_found = 0
10822026-01-27T01:13:52.430ZDEBGtest_vpcs (BackgroundTasks): activation complete background_task = abandoned_vmm_reaper elapsed = 813.844662ms iteration = 1 status = {"errors":[],"sled_reservations_deleted":0,"vmms_already_deleted":0,"vmms_deleted":0,"vmms_found":0}
10832026-01-27T01:13:52.431ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = region_replacement resource = Database
10842026-01-27T01:13:52.431ZDEBGtest_vpcs (BackgroundTasks): roles background_task = region_replacement roles = RoleSet { roles: {} }
10852026-01-27T01:13:52.431ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = region_replacement resource = Database result = Ok(())
10862026-01-27T01:13:52.433ZTRACtest_vpcs (dropshot_internal): incoming request local_addr = 127.0.0.1:46983 method = POST remote_addr = 127.0.0.1:36890 req_id = 6ecdb88c-8de5-4bb4-bf39-561995c8df28 uri = /sled-agents/b6d65341-167c-41df-9b5c-41cded99c229
10872026-01-27T01:13:52.433ZDEBGtest_vpcs (dropshot_internal): determined request API version local_addr = 127.0.0.1:46983 method = POST remote_addr = 127.0.0.1:36890 req_id = 6ecdb88c-8de5-4bb4-bf39-561995c8df28 uri = /sled-agents/b6d65341-167c-41df-9b5c-41cded99c229 version = 1.0.0
10882026-01-27T01:13:52.435ZINFOtest_vpcs (nexus): registered sled agent sled_uuid = b6d65341-167c-41df-9b5c-41cded99c229
10892026-01-27T01:13:52.438ZTRACtest_vpcs (BackgroundTasks): no more instances in need of reincarnation background_task = instance_reincarnation reincarnation_reason = instance failed total_found = 0
10902026-01-27T01:13:52.438ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = instance_reincarnation resource = Database
10912026-01-27T01:13:52.438ZDEBGtest_vpcs (BackgroundTasks): roles background_task = instance_reincarnation roles = RoleSet { roles: {} }
10922026-01-27T01:13:52.438ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = instance_reincarnation resource = Database result = Ok(())
10932026-01-27T01:13:52.439ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = v2p_manager resource = Database
10942026-01-27T01:13:52.439ZDEBGtest_vpcs (BackgroundTasks): roles background_task = v2p_manager roles = RoleSet { roles: {} }
10952026-01-27T01:13:52.440ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = v2p_manager resource = Database result = Ok(())
10962026-01-27T01:13:52.441ZINFOtest_vpcs (SagaRecoverer): listed in-progress sagas count = 0
10972026-01-27T01:13:52.441ZINFOtest_vpcs (SagaQuiesceHandle): saga recovery pass finished blueprint_id = None generation = 1
10982026-01-27T01:13:52.442ZDEBGtest_vpcs (BackgroundTasks): activation complete background_task = saga_recovery elapsed = 823.602951ms iteration = 1 status = {"last_pass":{"Success":{"nfailed":0,"nfound":0,"nrecovered":0,"nremoved":0,"nskipped":0}},"ntotal_failures":0,"ntotal_finished":0,"ntotal_recovered":0,"ntotal_sec_errors_bad_state":0,"ntotal_sec_errors_missing":0,"ntotal_started":0,"recent_failures":[],"recent_recoveries":[]}
10992026-01-27T01:13:52.451ZDEBGtest_vpcs (BackgroundTasks): roles background_task = tuf_artifact_replication roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
11002026-01-27T01:13:52.461ZDEBGtest_vpcs (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = tuf_artifact_replication resource = Fleet result = Ok(())
11012026-01-27T01:13:52.461ZTRACtest_vpcs (BackgroundTasks): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = tuf_artifact_replication resource = Fleet
11022026-01-27T01:13:52.461ZTRACtest_vpcs (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } background_task = tuf_artifact_replication resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
11032026-01-27T01:13:52.461ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = tuf_artifact_replication resource = Database
11042026-01-27T01:13:52.461ZDEBGtest_vpcs (BackgroundTasks): roles background_task = tuf_artifact_replication roles = RoleSet { roles: {} }
11052026-01-27T01:13:52.461ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = tuf_artifact_replication resource = Database result = Ok(())
11062026-01-27T01:13:52.468ZDEBGtest_vpcs (BackgroundTasks): activation complete background_task = lookup_region_port elapsed = 847.225174ms iteration = 1 status = {"errors":[],"found_port_ok":[]}
11072026-01-27T01:13:52.495ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = fm_sitrep_gc resource = Fleet
11082026-01-27T01:13:52.495ZTRACtest_vpcs (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } background_task = fm_sitrep_gc resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
11092026-01-27T01:13:52.495ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = fm_sitrep_gc resource = Database
11102026-01-27T01:13:52.495ZDEBGtest_vpcs (BackgroundTasks): roles background_task = fm_sitrep_gc roles = RoleSet { roles: {} }
11112026-01-27T01:13:52.496ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = fm_sitrep_gc resource = Database result = Ok(())
11122026-01-27T01:13:52.514ZDEBGtest_vpcs (BackgroundTasks): roles background_task = probe_distributor roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
11132026-01-27T01:13:52.519ZDEBGtest_vpcs (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = probe_distributor resource = Fleet result = Ok(())
11142026-01-27T01:13:52.519ZTRACtest_vpcs (BackgroundTasks): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = probe_distributor resource = Fleet
11152026-01-27T01:13:52.519ZTRACtest_vpcs (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } background_task = probe_distributor resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
11162026-01-27T01:13:52.519ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = probe_distributor resource = Database
11172026-01-27T01:13:52.519ZDEBGtest_vpcs (BackgroundTasks): roles background_task = probe_distributor roles = RoleSet { roles: {} }
11182026-01-27T01:13:52.520ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = probe_distributor resource = Database result = Ok(())
11192026-01-27T01:13:52.521ZDEBGtest_vpcs (BackgroundTasks): roles background_task = dns_config_external dns_group = external roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
11202026-01-27T01:13:52.530ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = dns_config_external dns_group = external resource = DnsConfig result = Ok(())
11212026-01-27T01:13:52.710ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = Database
11222026-01-27T01:13:52.710ZDEBGtest_vpcs (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
11232026-01-27T01:13:52.713ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
11242026-01-27T01:13:52.714ZDEBGtest_vpcs (BackgroundTasks): activation complete background_task = read_only_region_replacement_start elapsed = 1.073678726s iteration = 1 status = {"errors":[],"requests_created_ok":[]}
11252026-01-27T01:13:52.714ZINFOtest_vpcs (BackgroundTasks): all webhook delivery tasks completed background_task = webhook_deliverator num_receivers = 0
11262026-01-27T01:13:52.715ZDEBGtest_vpcs (BackgroundTasks): activation complete background_task = webhook_deliverator elapsed = 1.068947322s iteration = 1 status = {"by_rx":{},"error":null}
11272026-01-27T01:13:52.731ZDEBGtest_vpcs (BackgroundTasks): activation complete background_task = region_snapshot_replacement_garbage_collection elapsed = 1.104874617s iteration = 1 status = {"errors":[],"garbage_collect_requested":[]}
11282026-01-27T01:13:52.777ZDEBGtest_vpcs (BackgroundTasks): activation complete background_task = region_snapshot_replacement_finish elapsed = 1.144419398s iteration = 1 status = {"errors":[],"finish_invoked_ok":[]}
11292026-01-27T01:13:52.785ZDEBGtest_vpcs (BackgroundTasks): activation complete background_task = region_replacement_driver elapsed = 1.280664714s iteration = 1 status = {"drive_invoked_ok":[],"errors":[],"finish_invoked_ok":[]}
11302026-01-27T01:13:52.785ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = support_bundle_collector resource = Fleet
11312026-01-27T01:13:52.785ZTRACtest_vpcs (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } background_task = support_bundle_collector resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
11322026-01-27T01:13:52.785ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = support_bundle_collector resource = Database
11332026-01-27T01:13:52.785ZDEBGtest_vpcs (BackgroundTasks): roles background_task = support_bundle_collector roles = RoleSet { roles: {} }
11342026-01-27T01:13:52.786ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = support_bundle_collector resource = Database result = Ok(())
11352026-01-27T01:13:52.787ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = region_snapshot_replacement_step resource = Database
11362026-01-27T01:13:52.787ZDEBGtest_vpcs (BackgroundTasks): roles background_task = region_snapshot_replacement_step roles = RoleSet { roles: {} }
11372026-01-27T01:13:52.788ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = region_snapshot_replacement_step resource = Database result = Ok(())
11382026-01-27T01:13:52.791ZDEBGtest_vpcs (BackgroundTasks): reconfigurator config load complete background_task = reconfigurator_config_watcher switches = Loaded(ReconfiguratorConfigView { version: 1, config: ReconfiguratorConfig { planner_enabled: false, planner_config: PlannerConfig { add_zones_with_mupdate_override: false }, tuf_repo_pruner_enabled: true }, time_modified: 2026-01-27T01:13:51.285464Z })
11392026-01-27T01:13:52.792ZDEBGtest_vpcs (BackgroundTasks): activation complete background_task = reconfigurator_config_watcher elapsed = 1.304518683s iteration = 1 status = {"config_updated":true}
11402026-01-27T01:13:52.792ZDEBGtest_vpcs (BackgroundTasks): activating background_task = tuf_repo_pruner iteration = 2 reason = Dependency
11412026-01-27T01:13:52.792ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = tuf_repo_pruner resource = Fleet
11422026-01-27T01:13:52.792ZTRACtest_vpcs (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } background_task = tuf_repo_pruner resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
11432026-01-27T01:13:52.792ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = tuf_repo_pruner resource = Database
11442026-01-27T01:13:52.792ZDEBGtest_vpcs (BackgroundTasks): roles background_task = tuf_repo_pruner roles = RoleSet { roles: {} }
11452026-01-27T01:13:52.793ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = tuf_repo_pruner resource = Database result = Ok(())
11462026-01-27T01:13:52.794ZDEBGtest_vpcs (BackgroundTasks): activating background_task = blueprint_planner iteration = 2 reason = Dependency
11472026-01-27T01:13:52.794ZDEBGtest_vpcs (BackgroundTasks): blueprint planning disabled, doing nothing background_task = blueprint_planner
11482026-01-27T01:13:52.794ZDEBGtest_vpcs (BackgroundTasks): activation complete background_task = blueprint_planner elapsed = 66.411\u{b5}s iteration = 2 status = "Disabled"
11492026-01-27T01:13:52.795ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = external_endpoints resource = DnsConfig
11502026-01-27T01:13:52.795ZTRACtest_vpcs (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } background_task = external_endpoints resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
11512026-01-27T01:13:52.795ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = external_endpoints resource = Database
11522026-01-27T01:13:52.795ZDEBGtest_vpcs (BackgroundTasks): roles background_task = external_endpoints roles = RoleSet { roles: {} }
11532026-01-27T01:13:52.795ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = external_endpoints resource = Database result = Ok(())
11542026-01-27T01:13:52.797ZDEBGtest_vpcs (BackgroundTasks): roles background_task = fm_sitrep_loader roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
11552026-01-27T01:13:52.803ZDEBGtest_vpcs (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = fm_sitrep_loader resource = Fleet result = Ok(())
11562026-01-27T01:13:52.804ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = fm_sitrep_loader resource = Database
11572026-01-27T01:13:52.804ZDEBGtest_vpcs (BackgroundTasks): roles background_task = fm_sitrep_loader roles = RoleSet { roles: {} }
11582026-01-27T01:13:52.804ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = fm_sitrep_loader resource = Database result = Ok(())
11592026-01-27T01:13:52.806ZDEBGtest_vpcs (BackgroundTasks): roles background_task = trust_quorum_manager bgtask = TrustQuorumManager roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
11602026-01-27T01:13:52.811ZDEBGtest_vpcs (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = trust_quorum_manager bgtask = TrustQuorumManager resource = Fleet result = Ok(())
11612026-01-27T01:13:52.811ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = trust_quorum_manager bgtask = TrustQuorumManager resource = Database
11622026-01-27T01:13:52.811ZDEBGtest_vpcs (BackgroundTasks): roles background_task = trust_quorum_manager bgtask = TrustQuorumManager roles = RoleSet { roles: {} }
11632026-01-27T01:13:52.812ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = trust_quorum_manager bgtask = TrustQuorumManager resource = Database result = Ok(())
11642026-01-27T01:13:52.813ZWARNtest_vpcs (BackgroundTasks): failed to read target blueprint background_task = blueprint_loader error = Internal Error: no target blueprint set
11652026-01-27T01:13:52.813ZDEBGtest_vpcs (BackgroundTasks): activation complete background_task = blueprint_loader elapsed = 1.320261157s iteration = 1 status = {"error":"failed to read target blueprint: Internal Error: no target blueprint set"}
11662026-01-27T01:13:52.814ZDEBGtest_vpcs (BackgroundTasks): roles background_task = dns_config_internal dns_group = internal roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
11672026-01-27T01:13:52.821ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = dns_config_internal dns_group = internal resource = DnsConfig result = Ok(())
11682026-01-27T01:13:52.821ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = region_snapshot_replacement_start resource = Database
11692026-01-27T01:13:52.821ZDEBGtest_vpcs (BackgroundTasks): roles background_task = region_snapshot_replacement_start roles = RoleSet { roles: {} }
11702026-01-27T01:13:52.822ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = region_snapshot_replacement_start resource = Database result = Ok(())
11712026-01-27T01:13:52.823ZWARNtest_vpcs (BackgroundTasks): failed to read DNS config background_task = dns_config_external dns_group = external error = Internal Error: expected exactly one latest version for DNS group External, found 0
11722026-01-27T01:13:52.823ZDEBGtest_vpcs (BackgroundTasks): activation complete background_task = dns_config_external dns_group = external elapsed = 1.432864523s iteration = 1 status = {"error":"failed to read DNS config: Internal Error: expected exactly one latest version for DNS group External, found 0"}
11732026-01-27T01:13:52.836ZDEBGtest_vpcs (BackgroundTasks): inventory_prune_one: nothing eligible for removal (too few) background_task = inventory_collection candidates = []
11742026-01-27T01:13:52.836ZTRACtest_vpcs (DnsResolver): lookup_all_socket_v6 srv dns_name = _mgs._tcp.control-plane.oxide.internal
11752026-01-27T01:13:52.838ZTRACtest_vpcs (dns): buffer buffer = Length: 67 (0x43) bytes\n0000: b6 93 01 00 00 01 00 00 00 00 00 01 04 5f 6d 67 ............._mg\n0010: 73 04 5f 74 63 70 0d 63 6f 6e 74 72 6f 6c 2d 70 s._tcp.control-p\n0020: 6c 61 6e 65 05 6f 78 69 64 65 08 69 6e 74 65 72 lane.oxide.inter\n0030: 6e 61 6c 00 00 21 00 01 00 00 29 04 d0 00 00 00 nal..!....).....\n0040: 00 00 00 ... kind = dns peer_addr = [::1]:56847 req_id = 7ed2971c-49df-4c40-9eb1-9b9632be7d18
11762026-01-27T01:13:52.838ZDEBGtest_vpcs (dns): message_request kind = dns mr = MessageRequest {\n header: Header {\n id: 46739,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n queries: Queries {\n queries: [\n LowerQuery {\n name: LowerName(\n Name("_mgs._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_mgs._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n ],\n original: [\n 4,\n 95,\n 109,\n 103,\n 115,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n flags: EdnsFlags {\n dnssec_ok: false,\n z: 0,\n },\n max_payload: 1232,\n options: OPT {\n options: [],\n },\n },\n ),\n} peer_addr = [::1]:56847 req_id = 7ed2971c-49df-4c40-9eb1-9b9632be7d18
11772026-01-27T01:13:52.838ZERROtest_vpcs (dns): failed to handle incoming DNS message: MessageRequest { header: Header { id: 46739, message_type: Query, op_code: Query, authoritative: false, truncation: false, recursion_desired: true, recursion_available: false, authentic_data: false, checking_disabled: false, response_code: NoError, query_count: 1, answer_count: 0, name_server_count: 0, additional_count: 1, }, queries: Queries { queries: [ LowerQuery { name: LowerName( Name("_mgs._tcp.control-plane.oxide.internal."), ), original: Query { name: Name("_mgs._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN, }, }, ], original: [ 4, 95, 109, 103, 115, 4, 95, 116, 99, 112, 13, 99, 111, 110, 116, 114, 111, 108, 45, 112, 108, 97, 110, 101, 5, 111, 120, 105, 100, 101, 8, 105, 110, 116, 101, 114, 110, 97, 108, 0, 0, 33, 0, 1, ], }, answers: [], name_servers: [], additionals: [], sig0: [], edns: Some( Edns { rcode_high: 0, version: 0, flags: EdnsFlags { dnssec_ok: false, z: 0, }, max_payload: 1232, options: OPT { options: [], }, }, ), } SERVFAIL: server is not authoritative for name: "_mgs._tcp.control-plane.oxide.internal." kind = dns peer_addr = [::1]:56847 req_id = 7ed2971c-49df-4c40-9eb1-9b9632be7d18
11782026-01-27T01:13:52.839ZWARNtest_vpcs (BackgroundTasks): inventory collection failed background_task = inventory_collection error = failed to collect inventory: looking up MGS addresses: proto error: no records found for Query { name: Name("_mgs._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN }
11792026-01-27T01:13:52.839ZDEBGtest_vpcs (BackgroundTasks): activation complete background_task = inventory_collection elapsed = 1.355322191s iteration = 1 status = {"error":"failed to collect inventory: looking up MGS addresses: proto error: no records found for Query { name: Name(\\"_mgs._tcp.control-plane.oxide.internal.\\"), query_type: SRV, query_class: IN }"}
11802026-01-27T01:13:52.846ZDEBGtest_vpcs (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
11812026-01-27T01:13:52.856ZDEBGtest_vpcs (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = vpc_route_manager resource = Fleet result = Ok(())
11822026-01-27T01:13:52.856ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = vpc_route_manager resource = Database
11832026-01-27T01:13:52.856ZDEBGtest_vpcs (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
11842026-01-27T01:13:52.857ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = vpc_route_manager resource = Database result = Ok(())
11852026-01-27T01:13:52.861ZINFOtest_vpcs (BackgroundTasks): all instance checks complete background_task = instance_watcher pruned_instances = 0 total_completed = 0 total_failed = 0 total_incomplete = 0 total_instances = 0 update_sagas_queued = 0
11862026-01-27T01:13:52.861ZDEBGtest_vpcs (BackgroundTasks): activation complete background_task = instance_watcher elapsed = 1.355061218s iteration = 1 status = {"failed_checks":{},"incomplete_checks":{},"instance_states":{},"pruned_instances":0,"total_instances":0,"update_sagas_queued":0}
11872026-01-27T01:13:52.865ZDEBGtest_vpcs (BackgroundTasks): activation complete background_task = inventory_loader elapsed = 1.379503572s iteration = 1 status = "NoCollections"
11882026-01-27T01:13:52.866ZDEBGtest_vpcs (BackgroundTasks): activation complete background_task = switch_port_config_manager elapsed = 1.369839688s iteration = 1 status = {}
11892026-01-27T01:13:52.867ZINFOtest_vpcs (dropshot_internal): request completed latency_us = 535356 local_addr = 127.0.0.1:46983 method = GET remote_addr = 127.0.0.1:63662 req_id = e3db9b9f-f198-46ef-93ee-3a99b412fcc8 response_code = 200 uri = /nat/ipv4/changeset/0?limit=100
11902026-01-27T01:13:52.907ZDEBGtest_vpcs (BackgroundTasks): roles background_task = probe_distributor roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
11912026-01-27T01:13:52.914ZDEBGtest_vpcs (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = probe_distributor resource = Fleet result = Ok(())
11922026-01-27T01:13:52.914ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = probe_distributor resource = Database
11932026-01-27T01:13:52.914ZDEBGtest_vpcs (BackgroundTasks): roles background_task = probe_distributor roles = RoleSet { roles: {} }
11942026-01-27T01:13:52.914ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = probe_distributor resource = Database result = Ok(())
11952026-01-27T01:13:52.922ZDEBGtest_vpcs (BackgroundTasks): roles background_task = support_bundle_collector roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
11962026-01-27T01:13:52.929ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = support_bundle_collector resource = Fleet result = Ok(())
11972026-01-27T01:13:52.929ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = support_bundle_collector resource = Database
11982026-01-27T01:13:52.929ZDEBGtest_vpcs (BackgroundTasks): roles background_task = support_bundle_collector roles = RoleSet { roles: {} }
11992026-01-27T01:13:52.929ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = support_bundle_collector resource = Database result = Ok(())
12002026-01-27T01:13:52.931ZDEBGtest_vpcs (BackgroundTasks): roles background_task = tuf_repo_pruner roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
12012026-01-27T01:13:52.937ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = tuf_repo_pruner resource = Fleet result = Ok(())
12022026-01-27T01:13:52.937ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = tuf_repo_pruner resource = Database
12032026-01-27T01:13:52.937ZDEBGtest_vpcs (BackgroundTasks): roles background_task = tuf_repo_pruner roles = RoleSet { roles: {} }
12042026-01-27T01:13:52.938ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = tuf_repo_pruner resource = Database result = Ok(())
12052026-01-27T01:13:52.971ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
12062026-01-27T01:13:52.971ZTRACtest_vpcs (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } background_task = service_firewall_rule_propagation resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
12072026-01-27T01:13:52.971ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = Database
12082026-01-27T01:13:52.971ZDEBGtest_vpcs (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
12092026-01-27T01:13:52.978ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
12102026-01-27T01:13:53.018ZDEBGtest_vpcs (BackgroundTasks): roles background_task = external_endpoints roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
12112026-01-27T01:13:53.026ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = external_endpoints resource = DnsConfig result = Ok(())
12122026-01-27T01:13:53.026ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = external_endpoints resource = Database
12132026-01-27T01:13:53.026ZDEBGtest_vpcs (BackgroundTasks): roles background_task = external_endpoints roles = RoleSet { roles: {} }
12142026-01-27T01:13:53.027ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = external_endpoints resource = Database result = Ok(())
12152026-01-27T01:13:53.028ZTRACtest_vpcs (BackgroundTasks): reprocessing 0 outdated webhook globs... background_task = alert_dispatcher
12162026-01-27T01:13:53.029ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = alert_dispatcher resource = Database
12172026-01-27T01:13:53.029ZDEBGtest_vpcs (BackgroundTasks): roles background_task = alert_dispatcher roles = RoleSet { roles: {} }
12182026-01-27T01:13:53.029ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = alert_dispatcher resource = Database result = Ok(())
12192026-01-27T01:13:53.052ZDEBGtest_vpcs (BackgroundTasks): activation complete background_task = fm_sitrep_loader elapsed = 1.4010157s iteration = 1 status = "NoSitrep"
12202026-01-27T01:13:53.052ZWARNtest_vpcs (BackgroundTasks): failed to read DNS config background_task = dns_config_internal dns_group = internal error = Internal Error: expected exactly one latest version for DNS group Internal, found 0
12212026-01-27T01:13:53.053ZDEBGtest_vpcs (BackgroundTasks): activation complete background_task = dns_config_internal dns_group = internal elapsed = 1.666869509s iteration = 1 status = {"error":"failed to read DNS config: Internal Error: expected exactly one latest version for DNS group Internal, found 0"}
12222026-01-27T01:13:53.054ZDEBGtest_vpcs (BackgroundTasks): roles background_task = tuf_artifact_replication roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
12232026-01-27T01:13:53.059ZDEBGtest_vpcs (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = tuf_artifact_replication resource = Fleet result = Ok(())
12242026-01-27T01:13:53.059ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = tuf_artifact_replication resource = Database
12252026-01-27T01:13:53.059ZDEBGtest_vpcs (BackgroundTasks): roles background_task = tuf_artifact_replication roles = RoleSet { roles: {} }
12262026-01-27T01:13:53.060ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = tuf_artifact_replication resource = Database result = Ok(())
12272026-01-27T01:13:53.109ZDEBGtest_vpcs (BackgroundTasks): roles background_task = fm_sitrep_gc roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
12282026-01-27T01:13:53.113ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = fm_sitrep_gc resource = Fleet result = Ok(())
12292026-01-27T01:13:53.122ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = tuf_repo_pruner resource = Fleet
12302026-01-27T01:13:53.122ZTRACtest_vpcs (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } background_task = tuf_repo_pruner resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
12312026-01-27T01:13:53.122ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = tuf_repo_pruner resource = Database
12322026-01-27T01:13:53.122ZDEBGtest_vpcs (BackgroundTasks): roles background_task = tuf_repo_pruner roles = RoleSet { roles: {} }
12332026-01-27T01:13:53.123ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = tuf_repo_pruner resource = Database result = Ok(())
12342026-01-27T01:13:53.126ZTRACtest_vpcs (BackgroundTasks): no more instances in need of reincarnation background_task = instance_reincarnation reincarnation_reason = start saga failed total_found = 0
12352026-01-27T01:13:53.127ZINFOtest_vpcs (BackgroundTasks): instance reincarnation completed successfully background_task = instance_reincarnation instances_changed_state = 0 instances_found = 0 instances_reincarnated = 0
12362026-01-27T01:13:53.127ZDEBGtest_vpcs (BackgroundTasks): activation complete background_task = instance_reincarnation elapsed = 1.619157104s iteration = 1 status = {"changed_state":[],"disabled":false,"errors":[],"instances_found":{"Failed":0,"SagaUnwound":0},"instances_reincarnated":[],"restart_errors":[]}
12372026-01-27T01:13:53.139ZTRACtest_vpcs (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } background_task = service_firewall_rule_propagation resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
12382026-01-27T01:13:53.139ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = Database
12392026-01-27T01:13:53.139ZDEBGtest_vpcs (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
12402026-01-27T01:13:53.139ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
12412026-01-27T01:13:53.173ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = fm_sitrep_gc resource = Database
12422026-01-27T01:13:53.173ZDEBGtest_vpcs (BackgroundTasks): roles background_task = fm_sitrep_gc roles = RoleSet { roles: {} }
12432026-01-27T01:13:53.174ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = fm_sitrep_gc resource = Database result = Ok(())
12442026-01-27T01:13:53.175ZDEBGtest_vpcs (BackgroundTasks): activation complete background_task = region_replacement elapsed = 1.673051193s iteration = 1 status = {"errors":[],"requests_completed_ok":[],"requests_created_ok":[],"start_invoked_ok":[]}
12452026-01-27T01:13:53.223ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = fm_sitrep_gc resource = Fleet
12462026-01-27T01:13:53.224ZTRACtest_vpcs (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } background_task = fm_sitrep_gc resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
12472026-01-27T01:13:53.224ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = fm_sitrep_gc resource = Database
12482026-01-27T01:13:53.224ZDEBGtest_vpcs (BackgroundTasks): roles background_task = fm_sitrep_gc roles = RoleSet { roles: {} }
12492026-01-27T01:13:53.224ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = fm_sitrep_gc resource = Database result = Ok(())
12502026-01-27T01:13:53.231ZTRACtest_vpcs (BackgroundTasks): webhook dispatching completed successfully background_task = alert_dispatcher events_dispatched = 0 events_without_receivers = 0
12512026-01-27T01:13:53.231ZDEBGtest_vpcs (BackgroundTasks): activation complete background_task = alert_dispatcher elapsed = 1.588199932s iteration = 1 status = {"dispatched":[],"errors":[],"glob_version":"225.0.0","globs_reprocessed":{},"no_receivers":[]}
12522026-01-27T01:13:53.281ZDEBGtest_vpcs (BackgroundTasks): roles background_task = fm_sitrep_gc roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
12532026-01-27T01:13:53.284ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = fm_sitrep_gc resource = Fleet result = Ok(())
12542026-01-27T01:13:53.300ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = region_snapshot_replacement_step resource = Database
12552026-01-27T01:13:53.301ZDEBGtest_vpcs (BackgroundTasks): roles background_task = region_snapshot_replacement_step roles = RoleSet { roles: {} }
12562026-01-27T01:13:53.303ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = region_snapshot_replacement_step resource = Database result = Ok(())
12572026-01-27T01:13:53.303ZINFOtest_vpcs (BackgroundTasks): Loaded 0 active trust quorum configurations from database background_task = trust_quorum_manager bgtask = TrustQuorumManager
12582026-01-27T01:13:53.303ZDEBGtest_vpcs (BackgroundTasks): activation complete background_task = trust_quorum_manager elapsed = 1.635357266s iteration = 1 status = {"PerRackStatus":{"errors":[],"statuses":[]}}
12592026-01-27T01:13:53.356ZTRACtest_vpcs (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } background_task = service_firewall_rule_propagation resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
12602026-01-27T01:13:53.356ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = Database
12612026-01-27T01:13:53.356ZDEBGtest_vpcs (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
12622026-01-27T01:13:53.357ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
12632026-01-27T01:13:53.420ZDEBGtest_vpcs (BackgroundTasks): activation complete background_task = region_snapshot_replacement_start elapsed = 1.796934185s iteration = 1 status = {"errors":[],"requests_completed_ok":[],"requests_created_ok":[],"start_invoked_ok":[]}
12642026-01-27T01:13:53.433ZDEBGtest_vpcs (BackgroundTasks): activation complete background_task = region_snapshot_replacement_step elapsed = 1.803318557s iteration = 1 status = {"errors":[],"step_garbage_collect_invoked_ok":[],"step_invoked_ok":[],"step_records_created_ok":[],"step_set_volume_deleted_ok":[]}
12652026-01-27T01:13:53.434ZWARNtest_vpcs (BackgroundTasks): failed to read Silo/DNS/TLS configuration background_task = external_endpoints error = Internal Error: expected at least one external DNS zone
12662026-01-27T01:13:53.434ZDEBGtest_vpcs (BackgroundTasks): activation complete background_task = external_endpoints elapsed = 1.957381496s iteration = 1 status = {"error":"failed to read Silo/DNS/TLS configuration: Internal Error: expected at least one external DNS zone"}
12672026-01-27T01:13:53.479ZDEBGtest_vpcs (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
12682026-01-27T01:13:53.489ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) } result = Ok(())
12692026-01-27T01:13:53.489ZTRACtest_vpcs (BackgroundTasks): successful lookup of siloed resource "Vpc" using built-in user background_task = service_firewall_rule_propagation
12702026-01-27T01:13:53.489ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
12712026-01-27T01:13:53.489ZTRACtest_vpcs (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } background_task = service_firewall_rule_propagation resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
12722026-01-27T01:13:53.490ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = Database
12732026-01-27T01:13:53.490ZDEBGtest_vpcs (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
12742026-01-27T01:13:53.490ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
12752026-01-27T01:13:53.508ZINFOtest_vpcs (BackgroundTasks): No bundles to collect background_task = support_bundle_collector
12762026-01-27T01:13:53.508ZDEBGtest_vpcs (BackgroundTasks): activation complete background_task = support_bundle_collector elapsed = 2.128661155s iteration = 1 status = {"cleanup_err":null,"cleanup_report":{"db_destroying_bundles_removed":0,"db_failing_bundles_updated":0,"sled_bundles_delete_failed":0,"sled_bundles_deleted_not_found":0,"sled_bundles_deleted_ok":0},"collection_err":null,"collection_report":null}
12772026-01-27T01:13:53.544ZDEBGtest_vpcs (BackgroundTasks): activation complete background_task = vpc_route_manager elapsed = 1.929522089s iteration = 1 status = {}
12782026-01-27T01:13:53.546ZTRACtest_vpcs (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } background_task = service_firewall_rule_propagation resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
12792026-01-27T01:13:53.553ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = Database
12802026-01-27T01:13:53.554ZDEBGtest_vpcs (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
12812026-01-27T01:13:53.555ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
12822026-01-27T01:13:53.558ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = tuf_artifact_replication resource = Fleet
12832026-01-27T01:13:53.558ZTRACtest_vpcs (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } background_task = tuf_artifact_replication resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
12842026-01-27T01:13:53.558ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = tuf_artifact_replication resource = Database
12852026-01-27T01:13:53.558ZDEBGtest_vpcs (BackgroundTasks): roles background_task = tuf_artifact_replication roles = RoleSet { roles: {} }
12862026-01-27T01:13:53.559ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = tuf_artifact_replication resource = Database result = Ok(())
12872026-01-27T01:13:53.565ZDEBGtest_vpcs (BackgroundTasks): roles background_task = tuf_repo_pruner roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
12882026-01-27T01:13:53.574ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = tuf_repo_pruner resource = Fleet result = Ok(())
12892026-01-27T01:13:53.574ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = tuf_repo_pruner resource = Database
12902026-01-27T01:13:53.574ZDEBGtest_vpcs (BackgroundTasks): roles background_task = tuf_repo_pruner roles = RoleSet { roles: {} }
12912026-01-27T01:13:53.575ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = tuf_repo_pruner resource = Database result = Ok(())
12922026-01-27T01:13:53.579ZINFOtest_vpcs (BackgroundTasks): deleted 0 of 0 sitreps sitreps background_task = fm_sitrep_gc case_ereports_deleted = 0 cases_deleted = 0 ids = [] sitreps_deleted = 0
12932026-01-27T01:13:53.579ZTRACtest_vpcs (BackgroundTasks): all 0 orphaned sitreps in this batch have already been deleted background_task = fm_sitrep_gc
12942026-01-27T01:13:53.579ZINFOtest_vpcs (BackgroundTasks): sitrep garbage collection found 0 orphaned sitreps, deleted 0 background_task = fm_sitrep_gc
12952026-01-27T01:13:53.579ZDEBGtest_vpcs (BackgroundTasks): activation complete background_task = fm_sitrep_gc elapsed = 1.914651577s iteration = 1 status = {"errors":[],"orphaned_sitreps_deleted":0,"orphaned_sitreps_found":0}
12962026-01-27T01:13:53.579ZTRACtest_vpcs (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } background_task = service_firewall_rule_propagation resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
12972026-01-27T01:13:53.580ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = Database
12982026-01-27T01:13:53.580ZDEBGtest_vpcs (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
12992026-01-27T01:13:53.581ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
13002026-01-27T01:13:53.587ZDEBGtest_vpcs (BackgroundTasks): roles background_task = tuf_artifact_replication roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
13012026-01-27T01:13:53.597ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = tuf_artifact_replication resource = Fleet result = Ok(())
13022026-01-27T01:13:53.597ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = tuf_artifact_replication resource = Database
13032026-01-27T01:13:53.597ZDEBGtest_vpcs (BackgroundTasks): roles background_task = tuf_artifact_replication roles = RoleSet { roles: {} }
13042026-01-27T01:13:53.598ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = tuf_artifact_replication resource = Database result = Ok(())
13052026-01-27T01:13:53.602ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = tuf_repo_pruner resource = TargetReleaseConfig
13062026-01-27T01:13:53.602ZTRACtest_vpcs (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } background_task = tuf_repo_pruner resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
13072026-01-27T01:13:53.602ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = tuf_repo_pruner resource = Database
13082026-01-27T01:13:53.602ZDEBGtest_vpcs (BackgroundTasks): roles background_task = tuf_repo_pruner roles = RoleSet { roles: {} }
13092026-01-27T01:13:53.604ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = tuf_repo_pruner resource = Database result = Ok(())
13102026-01-27T01:13:53.606ZINFOtest_vpcs (BackgroundTasks): finished distributing probes to sleds background_task = probe_distributor n_pushed_probes = 0
13112026-01-27T01:13:53.606ZDEBGtest_vpcs (BackgroundTasks): activation complete background_task = probe_distributor elapsed = 1.939462507s iteration = 1 status = {"errors":[],"probes_by_sled":{}}
13122026-01-27T01:13:53.606ZDEBGtest_vpcs (BackgroundTasks): activating background_task = vpc_route_manager iteration = 2 reason = Dependency
13132026-01-27T01:13:53.606ZINFOtest_vpcs (BackgroundTasks): VPC route manager running background_task = vpc_route_manager
13142026-01-27T01:13:53.606ZTRACtest_vpcs (BackgroundTasks): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = vpc_route_manager resource = Fleet
13152026-01-27T01:13:53.606ZTRACtest_vpcs (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } background_task = vpc_route_manager resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
13162026-01-27T01:13:53.606ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = vpc_route_manager resource = Database
13172026-01-27T01:13:53.606ZDEBGtest_vpcs (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
13182026-01-27T01:13:53.607ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = vpc_route_manager resource = Database result = Ok(())
13192026-01-27T01:13:53.609ZDEBGtest_vpcs (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
13202026-01-27T01:13:53.626ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) } result = Ok(())
13212026-01-27T01:13:53.626ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = Database
13222026-01-27T01:13:53.626ZDEBGtest_vpcs (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
13232026-01-27T01:13:53.627ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
13242026-01-27T01:13:53.629ZTRACtest_vpcs (BackgroundTasks): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = v2p_manager resource = Fleet
13252026-01-27T01:13:53.629ZTRACtest_vpcs (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } background_task = v2p_manager resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
13262026-01-27T01:13:53.629ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = v2p_manager resource = Database
13272026-01-27T01:13:53.629ZDEBGtest_vpcs (BackgroundTasks): roles background_task = v2p_manager roles = RoleSet { roles: {} }
13282026-01-27T01:13:53.629ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = v2p_manager resource = Database result = Ok(())
13292026-01-27T01:13:53.632ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = tuf_artifact_replication resource = Fleet
13302026-01-27T01:13:53.632ZTRACtest_vpcs (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } background_task = tuf_artifact_replication resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
13312026-01-27T01:13:53.632ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = tuf_artifact_replication resource = Database
13322026-01-27T01:13:53.633ZDEBGtest_vpcs (BackgroundTasks): roles background_task = tuf_artifact_replication roles = RoleSet { roles: {} }
13332026-01-27T01:13:53.633ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = tuf_artifact_replication resource = Database result = Ok(())
13342026-01-27T01:13:53.634ZDEBGtest_vpcs (BackgroundTasks): activating background_task = inventory_collection iteration = 2 reason = Signaled
13352026-01-27T01:13:53.634ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = inventory_collection resource = Inventory
13362026-01-27T01:13:53.634ZTRACtest_vpcs (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } background_task = inventory_collection resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
13372026-01-27T01:13:53.634ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = inventory_collection resource = Database
13382026-01-27T01:13:53.634ZDEBGtest_vpcs (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {} }
13392026-01-27T01:13:53.635ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = inventory_collection resource = Database result = Ok(())
13402026-01-27T01:13:53.636ZINFOtest_vpcs (dropshot_internal): request completed latency_us = 1202914 local_addr = 127.0.0.1:46983 method = POST remote_addr = 127.0.0.1:36890 req_id = 6ecdb88c-8de5-4bb4-bf39-561995c8df28 response_code = 204 uri = /sled-agents/b6d65341-167c-41df-9b5c-41cded99c229
13412026-01-27T01:13:53.637ZDEBGtest_vpcs (NexusClient): client response result = Ok(Response { url: "http://127.0.0.1:46983/sled-agents/b6d65341-167c-41df-9b5c-41cded99c229", status: 204, headers: {"x-request-id": "6ecdb88c-8de5-4bb4-bf39-561995c8df28", "date": "Tue, 27 Jan 2026 01:13:53 GMT"} }) sled_id = b6d65341-167c-41df-9b5c-41cded99c229
13422026-01-27T01:13:53.638ZDEBGtest_vpcs (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
13432026-01-27T01:13:53.646ZDEBGtest_vpcs (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = vpc_route_manager resource = Fleet result = Ok(())
13442026-01-27T01:13:53.647ZTRACtest_vpcs (BackgroundTasks): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = vpc_route_manager resource = Fleet
13452026-01-27T01:13:53.647ZTRACtest_vpcs (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } background_task = vpc_route_manager resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
13462026-01-27T01:13:53.648ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = vpc_route_manager resource = Database
13472026-01-27T01:13:53.648ZDEBGtest_vpcs (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
13482026-01-27T01:13:53.650ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = vpc_route_manager resource = Database result = Ok(())
13492026-01-27T01:13:53.652ZDEBGtest_vpcs (BackgroundTasks): roles background_task = tuf_repo_pruner roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
13502026-01-27T01:13:53.661ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = tuf_repo_pruner resource = TargetReleaseConfig result = Ok(())
13512026-01-27T01:13:53.661ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = tuf_repo_pruner resource = Database
13522026-01-27T01:13:53.661ZDEBGtest_vpcs (BackgroundTasks): roles background_task = tuf_repo_pruner roles = RoleSet { roles: {} }
13532026-01-27T01:13:53.661ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = tuf_repo_pruner resource = Database result = Ok(())
13542026-01-27T01:13:53.664ZDEBGtest_vpcs (BackgroundTasks): roles background_task = v2p_manager roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
13552026-01-27T01:13:53.671ZDEBGtest_vpcs (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = v2p_manager resource = Fleet result = Ok(())
13562026-01-27T01:13:53.671ZTRACtest_vpcs (BackgroundTasks): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = v2p_manager resource = Fleet
13572026-01-27T01:13:53.671ZTRACtest_vpcs (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } background_task = v2p_manager resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
13582026-01-27T01:13:53.671ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = v2p_manager resource = Database
13592026-01-27T01:13:53.672ZDEBGtest_vpcs (BackgroundTasks): roles background_task = v2p_manager roles = RoleSet { roles: {} }
13602026-01-27T01:13:53.672ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = v2p_manager resource = Database result = Ok(())
13612026-01-27T01:13:53.674ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = Database
13622026-01-27T01:13:53.674ZDEBGtest_vpcs (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
13632026-01-27T01:13:53.674ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
13642026-01-27T01:13:53.676ZDEBGtest_vpcs (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
13652026-01-27T01:13:53.683ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = inventory_collection resource = Inventory result = Ok(())
13662026-01-27T01:13:53.683ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = inventory_collection resource = Database
13672026-01-27T01:13:53.683ZDEBGtest_vpcs (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {} }
13682026-01-27T01:13:53.684ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = inventory_collection resource = Database result = Ok(())
13692026-01-27T01:13:53.685ZDEBGtest_vpcs (init_with_steps): Running step configure_boundary_ntp
13702026-01-27T01:13:53.685ZDEBGtest_vpcs (init_with_steps): Running step start_crucible_pantry
13712026-01-27T01:13:53.688ZDEBGtest_vpcs (dropshot): registered endpoint kind = pantry local_addr = [::1]:35761 method = GET path = /crucible/pantry/0 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
13722026-01-27T01:13:53.688ZDEBGtest_vpcs (dropshot): registered endpoint kind = pantry local_addr = [::1]:35761 method = GET path = /crucible/pantry/0/job/{id}/is-finished sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
13732026-01-27T01:13:53.688ZDEBGtest_vpcs (dropshot): registered endpoint kind = pantry local_addr = [::1]:35761 method = GET path = /crucible/pantry/0/job/{id}/ok sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
13742026-01-27T01:13:53.688ZDEBGtest_vpcs (dropshot): registered endpoint kind = pantry local_addr = [::1]:35761 method = DELETE path = /crucible/pantry/0/volume/{id} sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
13752026-01-27T01:13:53.688ZDEBGtest_vpcs (dropshot): registered endpoint kind = pantry local_addr = [::1]:35761 method = GET path = /crucible/pantry/0/volume/{id} sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
13762026-01-27T01:13:53.688ZDEBGtest_vpcs (dropshot): registered endpoint kind = pantry local_addr = [::1]:35761 method = POST path = /crucible/pantry/0/volume/{id} sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
13772026-01-27T01:13:53.688ZDEBGtest_vpcs (dropshot): registered endpoint kind = pantry local_addr = [::1]:35761 method = POST path = /crucible/pantry/0/volume/{id}/background sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
13782026-01-27T01:13:53.689ZDEBGtest_vpcs (dropshot): registered endpoint kind = pantry local_addr = [::1]:35761 method = POST path = /crucible/pantry/0/volume/{id}/bulk-write sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
13792026-01-27T01:13:53.689ZDEBGtest_vpcs (dropshot): registered endpoint kind = pantry local_addr = [::1]:35761 method = POST path = /crucible/pantry/0/volume/{id}/import-from-url sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
13802026-01-27T01:13:53.689ZDEBGtest_vpcs (dropshot): registered endpoint kind = pantry local_addr = [::1]:35761 method = POST path = /crucible/pantry/0/volume/{id}/scrub sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
13812026-01-27T01:13:53.689ZDEBGtest_vpcs (dropshot): registered endpoint kind = pantry local_addr = [::1]:35761 method = POST path = /crucible/pantry/0/volume/{id}/snapshot sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
13822026-01-27T01:13:53.689ZINFOtest_vpcs (dropshot): listening kind = pantry local_addr = [::1]:35761 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
13832026-01-27T01:13:53.690ZDEBGtest_vpcs (dropshot): successfully registered DTrace USDT probes kind = pantry local_addr = [::1]:35761 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
13842026-01-27T01:13:53.690ZINFOtest_vpcs (omicron_sled_agent::sim::Server): Started Simulated Crucible Pantry address = [::1]:35761 kind = pantry sled_id = b6d65341-167c-41df-9b5c-41cded99c229
13852026-01-27T01:13:53.690ZDEBGtest_vpcs (init_with_steps): Running step populate_internal_dns
13862026-01-27T01:13:53.690ZDEBGtest_vpcs: Populating Internal DNS
13872026-01-27T01:13:53.761ZINFOtest_vpcs: DNS population: DnsConfigParams { generation: Generation( 1, ), serial: 1, time_created: 2026-01-27T01:13:53.760606460Z, zones: [ DnsConfigZone { zone_name: "control-plane.oxide.internal", records: { "@": [ Ns( "ns1.control-plane.oxide.internal", ), ], "_nexus._tcp": [ Srv( Srv { prio: 0, weight: 0, port: 46983, target: "913233fe-92a8-4635-9572-183f495429c4.host.control-plane.oxide.internal", }, ), ], "b6d65341-167c-41df-9b5c-41cded99c229.sled": [ Aaaa( ::1, ), ], "13c52f51-e716-421b-8ceb-7f8d0fb2e5a3.host": [ Aaaa( ::1, ), ], "_crucible-pantry._tcp": [ Srv( Srv { prio: 0, weight: 0, port: 35761, target: "e28e8b52-f93c-4d17-8434-be542f08e849.host.control-plane.oxide.internal", }, ), ], "_boundary-ntp._tcp": [ Srv( Srv { prio: 0, weight: 0, port: 123, target: "dfa9197a-b8e0-4f4b-99de-5076da34c291.host.control-plane.oxide.internal", }, ), ], "_cockroach._tcp": [ Srv( Srv { prio: 0, weight: 0, port: 42398, target: "13c52f51-e716-421b-8ceb-7f8d0fb2e5a3.host.control-plane.oxide.internal", }, ), ], "_external-dns._tcp": [ Srv( Srv { prio: 0, weight: 0, port: 53796, target: "326b5e01-f8e6-4763-80e1-2d51b531f7e2.host.control-plane.oxide.internal", }, ), ], "_repo-depot._tcp": [ Srv( Srv { prio: 0, weight: 0, port: 50229, target: "b6d65341-167c-41df-9b5c-41cded99c229.sled.control-plane.oxide.internal", }, ), ], "_nexus-lockstep._tcp": [ Srv( Srv { prio: 0, weight: 0, port: 47722, target: "913233fe-92a8-4635-9572-183f495429c4.host.control-plane.oxide.internal", }, ), ], "_clickhouse._tcp": [ Srv( Srv { prio: 0, weight: 0, port: 58655, target: "529b6453-5266-46d6-bff2-204bfd885e0e.host.control-plane.oxide.internal", }, ), ], "boundary-ntp": [ Aaaa( ::1, ), ], "529b6453-5266-46d6-bff2-204bfd885e0e.host": [ Aaaa( ::1, ), ], "913233fe-92a8-4635-9572-183f495429c4.host": [ Aaaa( ::ffff:127.0.0.1, ), ], "dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host": [ Aaaa( ::1, ), ], "_clickhouse-native._tcp": [ Srv( Srv { prio: 0, weight: 0, port: 9000, target: "529b6453-5266-46d6-bff2-204bfd885e0e.host.control-plane.oxide.internal", }, ), ], "_nameservice._tcp": [ Srv( Srv { prio: 0, weight: 0, port: 65457, target: "fb7e8b12-2b9b-4970-85ca-299c62844890.host.control-plane.oxide.internal", }, ), ], "_oximeter-reader._tcp": [ Srv( Srv { prio: 0, weight: 0, port: 9000, target: "529b6453-5266-46d6-bff2-204bfd885e0e.host.control-plane.oxide.internal", }, ), ], "_mgs._tcp": [ Srv( Srv { prio: 0, weight: 0, port: 52572, target: "dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal", }, ), ], "_dendrite._tcp": [ Srv( Srv { prio: 0, weight: 0, port: 53072, target: "dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal", }, ), ], "_clickhouse-admin-single-server._tcp": [ Srv( Srv { prio: 0, weight: 0, port: 8888, target: "529b6453-5266-46d6-bff2-204bfd885e0e.host.control-plane.oxide.internal", }, ), ], "fb7e8b12-2b9b-4970-85ca-299c62844890.host": [ Aaaa( ::1, ), ], "dfa9197a-b8e0-4f4b-99de-5076da34c291.host": [ Aaaa( ::1, ), ], "e28e8b52-f93c-4d17-8434-be542f08e849.host": [ Aaaa( ::1, ), ], "ns1": [ Aaaa( ::1, ), ], "_mgd._tcp": [ Srv( Srv { prio: 0, weight: 0, port: 53789, target: "dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal", }, ), ], "326b5e01-f8e6-4763-80e1-2d51b531f7e2.host": [ Aaaa( ::1, ), ], }, }, ], }
13882026-01-27T01:13:53.762ZDEBGtest_vpcs: client request body = Some(Body) method = PUT uri = http://[::1]:65457/config
13892026-01-27T01:13:53.768ZDEBGtest_vpcs (BackgroundTasks): roles background_task = tuf_artifact_replication roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
13902026-01-27T01:13:53.774ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = tuf_artifact_replication resource = Fleet result = Ok(())
13912026-01-27T01:13:53.774ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = tuf_artifact_replication resource = Database
13922026-01-27T01:13:53.774ZDEBGtest_vpcs (BackgroundTasks): roles background_task = tuf_artifact_replication roles = RoleSet { roles: {} }
13932026-01-27T01:13:53.776ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = tuf_artifact_replication resource = Database result = Ok(())
13942026-01-27T01:13:53.777ZDEBGtest_vpcs (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
13952026-01-27T01:13:53.783ZDEBGtest_vpcs (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = vpc_route_manager resource = Fleet result = Ok(())
13962026-01-27T01:13:53.783ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = vpc_route_manager resource = Database
13972026-01-27T01:13:53.783ZDEBGtest_vpcs (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
13982026-01-27T01:13:53.784ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = vpc_route_manager resource = Database result = Ok(())
13992026-01-27T01:13:53.785ZINFOtest_vpcs (BackgroundTasks): tuf_repo_prune decision background_task = tuf_repo_pruner status = TufRepoPrunerDetails { nkeep_recent_releases: 3, nkeep_recent_uploads: 2, repos_keep_target_release: {}, repos_keep_recent_uploads: {}, repo_prune: None, other_repos_eligible_to_prune: {}, warnings: [] }
14002026-01-27T01:13:53.785ZDEBGtest_vpcs (BackgroundTasks): activation complete background_task = tuf_repo_pruner elapsed = 993.79267ms iteration = 2 status = {"nkeep_recent_releases":3,"nkeep_recent_uploads":2,"other_repos_eligible_to_prune":[],"repo_prune":null,"repos_keep_recent_uploads":[],"repos_keep_target_release":[],"status":"enabled","warnings":[]}
14012026-01-27T01:13:53.786ZDEBGtest_vpcs (BackgroundTasks): roles background_task = v2p_manager roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
14022026-01-27T01:13:53.793ZDEBGtest_vpcs (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = v2p_manager resource = Fleet result = Ok(())
14032026-01-27T01:13:53.793ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = v2p_manager resource = Database
14042026-01-27T01:13:53.793ZDEBGtest_vpcs (BackgroundTasks): roles background_task = v2p_manager roles = RoleSet { roles: {} }
14052026-01-27T01:13:53.794ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = v2p_manager resource = Database result = Ok(())
14062026-01-27T01:13:53.796ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = tuf_artifact_replication resource = Fleet
14072026-01-27T01:13:53.797ZTRACtest_vpcs (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } background_task = tuf_artifact_replication resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
14082026-01-27T01:13:53.797ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = tuf_artifact_replication resource = Database
14092026-01-27T01:13:53.797ZDEBGtest_vpcs (BackgroundTasks): roles background_task = tuf_artifact_replication roles = RoleSet { roles: {} }
14102026-01-27T01:13:53.798ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = tuf_artifact_replication resource = Database result = Ok(())
14112026-01-27T01:13:53.799ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = Database
14122026-01-27T01:13:53.799ZDEBGtest_vpcs (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
14132026-01-27T01:13:53.800ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
14142026-01-27T01:13:53.802ZINFOtest_vpcs (http): accepted connection kind = dns local_addr = [::1]:65457 remote_addr = [::1]:42664
14152026-01-27T01:13:53.803ZDEBGtest_vpcs (BackgroundTasks): inventory_prune_one: nothing eligible for removal (too few) background_task = inventory_collection candidates = []
14162026-01-27T01:13:53.803ZTRACtest_vpcs (DnsResolver): lookup_all_socket_v6 srv dns_name = _mgs._tcp.control-plane.oxide.internal
14172026-01-27T01:13:53.810ZTRACtest_vpcs (http): incoming request kind = dns local_addr = [::1]:65457 method = PUT remote_addr = [::1]:42664 req_id = 645e1d64-ceb2-40d9-a78a-f98429fd46e1 uri = /config
14182026-01-27T01:13:53.810ZDEBGtest_vpcs (http): determined request API version kind = dns local_addr = [::1]:65457 method = PUT remote_addr = [::1]:42664 req_id = 645e1d64-ceb2-40d9-a78a-f98429fd46e1 uri = /config version = 2.0.0
14192026-01-27T01:13:53.812ZTRACtest_vpcs (dns): buffer buffer = Length: 67 (0x43) bytes\n0000: da 0a 01 00 00 01 00 00 00 00 00 01 04 5f 6d 67 ............._mg\n0010: 73 04 5f 74 63 70 0d 63 6f 6e 74 72 6f 6c 2d 70 s._tcp.control-p\n0020: 6c 61 6e 65 05 6f 78 69 64 65 08 69 6e 74 65 72 lane.oxide.inter\n0030: 6e 61 6c 00 00 21 00 01 00 00 29 04 d0 00 00 00 nal..!....).....\n0040: 00 00 00 ... kind = dns peer_addr = [::1]:19753 req_id = 9c4c8b58-1cd7-4f63-8e24-17441805d307
14202026-01-27T01:13:53.812ZDEBGtest_vpcs (dns): message_request kind = dns mr = MessageRequest {\n header: Header {\n id: 55818,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n queries: Queries {\n queries: [\n LowerQuery {\n name: LowerName(\n Name("_mgs._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_mgs._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n ],\n original: [\n 4,\n 95,\n 109,\n 103,\n 115,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n flags: EdnsFlags {\n dnssec_ok: false,\n z: 0,\n },\n max_payload: 1232,\n options: OPT {\n options: [],\n },\n },\n ),\n} peer_addr = [::1]:19753 req_id = 9c4c8b58-1cd7-4f63-8e24-17441805d307
14212026-01-27T01:13:53.813ZERROtest_vpcs (dns): failed to handle incoming DNS message: MessageRequest { header: Header { id: 55818, message_type: Query, op_code: Query, authoritative: false, truncation: false, recursion_desired: true, recursion_available: false, authentic_data: false, checking_disabled: false, response_code: NoError, query_count: 1, answer_count: 0, name_server_count: 0, additional_count: 1, }, queries: Queries { queries: [ LowerQuery { name: LowerName( Name("_mgs._tcp.control-plane.oxide.internal."), ), original: Query { name: Name("_mgs._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN, }, }, ], original: [ 4, 95, 109, 103, 115, 4, 95, 116, 99, 112, 13, 99, 111, 110, 116, 114, 111, 108, 45, 112, 108, 97, 110, 101, 5, 111, 120, 105, 100, 101, 8, 105, 110, 116, 101, 114, 110, 97, 108, 0, 0, 33, 0, 1, ], }, answers: [], name_servers: [], additionals: [], sig0: [], edns: Some( Edns { rcode_high: 0, version: 0, flags: EdnsFlags { dnssec_ok: false, z: 0, }, max_payload: 1232, options: OPT { options: [], }, }, ), } SERVFAIL: server is not authoritative for name: "_mgs._tcp.control-plane.oxide.internal." kind = dns peer_addr = [::1]:19753 req_id = 9c4c8b58-1cd7-4f63-8e24-17441805d307
14222026-01-27T01:13:53.814ZINFOtest_vpcs (store): attempting generation update new_generation = 1 req_id = 645e1d64-ceb2-40d9-a78a-f98429fd46e1
14232026-01-27T01:13:53.814ZINFOtest_vpcs (store): pruning trees for generations newer than 0
14242026-01-27T01:13:53.814ZDEBGtest_vpcs (store): creating tree tree_name = generation_1_zone_control-plane.oxide.internal
14252026-01-27T01:13:53.815ZDEBGtest_vpcs (store): updating current config
14262026-01-27T01:13:53.816ZDEBGtest_vpcs (store): flushing default tree
14272026-01-27T01:13:53.818ZINFOtest_vpcs (store): pruning trees for generations older than 1 keep = 3
14282026-01-27T01:13:53.818ZINFOtest_vpcs (store): updated generation new_generation = 1 req_id = 645e1d64-ceb2-40d9-a78a-f98429fd46e1
14292026-01-27T01:13:53.818ZINFOtest_vpcs (http): request completed kind = dns latency_us = 8143 local_addr = [::1]:65457 method = PUT remote_addr = [::1]:42664 req_id = 645e1d64-ceb2-40d9-a78a-f98429fd46e1 response_code = 204 uri = /config
14302026-01-27T01:13:53.821ZWARNtest_vpcs (BackgroundTasks): inventory collection failed background_task = inventory_collection error = failed to collect inventory: looking up MGS addresses: proto error: no records found for Query { name: Name("_mgs._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN }
14312026-01-27T01:13:53.826ZDEBGtest_vpcs (BackgroundTasks): activation complete background_task = inventory_collection elapsed = 192.120027ms iteration = 2 status = {"error":"failed to collect inventory: looking up MGS addresses: proto error: no records found for Query { name: Name(\\"_mgs._tcp.control-plane.oxide.internal.\\"), query_type: SRV, query_class: IN }"}
14322026-01-27T01:13:53.826ZDEBGtest_vpcs (BackgroundTasks): roles background_task = tuf_artifact_replication roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
14332026-01-27T01:13:53.835ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = tuf_artifact_replication resource = Fleet result = Ok(())
14342026-01-27T01:13:53.835ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = tuf_artifact_replication resource = Database
14352026-01-27T01:13:53.835ZDEBGtest_vpcs (BackgroundTasks): roles background_task = tuf_artifact_replication roles = RoleSet { roles: {} }
14362026-01-27T01:13:53.836ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = tuf_artifact_replication resource = Database result = Ok(())
14372026-01-27T01:13:53.837ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = Database
14382026-01-27T01:13:53.837ZDEBGtest_vpcs (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
14392026-01-27T01:13:53.838ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
14402026-01-27T01:13:53.840ZDEBGtest_vpcs: client response result = Ok(Response { url: "http://[::1]:65457/config", status: 204, headers: {"x-request-id": "645e1d64-ceb2-40d9-a78a-f98429fd46e1", "date": "Tue, 27 Jan 2026 01:13:53 GMT"} })
14412026-01-27T01:13:53.841ZDEBGtest_vpcs (init_with_steps): Running step configure_sled_agents
14422026-01-27T01:13:53.934ZDEBGtest_vpcs: client request body = Some(Body) method = PUT uri = http://[::1]:59842/omicron-config
14432026-01-27T01:13:53.936ZDEBGtest_vpcs (BackgroundTasks): activation complete background_task = tuf_artifact_replication elapsed = 2.299919051s iteration = 1 status = {"generation":1,"last_run_counters":{"copy_err":0,"copy_ok":0,"list_err":0,"list_ok":0,"put_config_err":0,"put_config_ok":0,"put_err":0,"put_ok":0},"lifetime_counters":{"copy_err":0,"copy_ok":0,"list_err":0,"list_ok":0,"put_config_err":0,"put_config_ok":0,"put_err":0,"put_ok":0},"local_repos":0,"request_debug_ringbuf":[]}
14442026-01-27T01:13:53.936ZINFOtest_vpcs (dropshot): accepted connection local_addr = [::1]:59842 remote_addr = [::1]:32848 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
14452026-01-27T01:13:53.937ZTRACtest_vpcs (dropshot): incoming request local_addr = [::1]:59842 method = PUT remote_addr = [::1]:32848 req_id = 95dc101b-8f32-44bf-ac8c-03291e448d2c sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /omicron-config
14462026-01-27T01:13:53.937ZDEBGtest_vpcs (dropshot): determined request API version local_addr = [::1]:59842 method = PUT remote_addr = [::1]:32848 req_id = 95dc101b-8f32-44bf-ac8c-03291e448d2c sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /omicron-config version = 15.0.0
14472026-01-27T01:13:53.947ZINFOtest_vpcs (dropshot): request completed latency_us = 9717 local_addr = [::1]:59842 method = PUT remote_addr = [::1]:32848 req_id = 95dc101b-8f32-44bf-ac8c-03291e448d2c response_code = 204 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /omicron-config
14482026-01-27T01:13:53.947ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
14492026-01-27T01:13:53.947ZTRACtest_vpcs (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } background_task = service_firewall_rule_propagation resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
14502026-01-27T01:13:53.947ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = Database
14512026-01-27T01:13:53.947ZDEBGtest_vpcs (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
14522026-01-27T01:13:53.950ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
14532026-01-27T01:13:53.952ZDEBGtest_vpcs: client response result = Ok(Response { url: "http://[::1]:59842/omicron-config", status: 204, headers: {"x-request-id": "95dc101b-8f32-44bf-ac8c-03291e448d2c", "date": "Tue, 27 Jan 2026 01:13:53 GMT"} })
14542026-01-27T01:13:53.952ZDEBGtest_vpcs: client request body = Some(Body) method = PUT uri = http://[::1]:59842/network-bootstore-config
14552026-01-27T01:13:53.953ZTRACtest_vpcs (dropshot): incoming request local_addr = [::1]:59842 method = PUT remote_addr = [::1]:32848 req_id = 57871bbb-2766-45fc-bd68-01de70742093 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /network-bootstore-config
14562026-01-27T01:13:53.953ZDEBGtest_vpcs (dropshot): determined request API version local_addr = [::1]:59842 method = PUT remote_addr = [::1]:32848 req_id = 57871bbb-2766-45fc-bd68-01de70742093 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /network-bootstore-config version = 15.0.0
14572026-01-27T01:13:53.954ZINFOtest_vpcs (dropshot): request completed latency_us = 948 local_addr = [::1]:59842 method = PUT remote_addr = [::1]:32848 req_id = 57871bbb-2766-45fc-bd68-01de70742093 response_code = 204 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /network-bootstore-config
14582026-01-27T01:13:53.954ZDEBGtest_vpcs: client response result = Ok(Response { url: "http://[::1]:59842/network-bootstore-config", status: 204, headers: {"x-request-id": "57871bbb-2766-45fc-bd68-01de70742093", "date": "Tue, 27 Jan 2026 01:13:53 GMT"} })
14592026-01-27T01:13:53.956ZDEBGtest_vpcs (init_with_steps): Running step start_nexus_external
14602026-01-27T01:13:53.956ZDEBGtest_vpcs: Starting Nexus (external API)
14612026-01-27T01:13:57.138ZTRACtest_vpcs (InternalApi): authorize begin action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Fleet
14622026-01-27T01:13:57.138ZTRACtest_vpcs (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
14632026-01-27T01:13:57.138ZTRACtest_vpcs (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database
14642026-01-27T01:13:57.138ZDEBGtest_vpcs (InternalApi): roles roles = RoleSet { roles: {} }
14652026-01-27T01:13:57.140ZDEBGtest_vpcs (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database result = Ok(())
14662026-01-27T01:13:57.143ZTRACtest_vpcs (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } background_task = service_firewall_rule_propagation resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
14672026-01-27T01:13:57.143ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = Database
14682026-01-27T01:13:57.143ZDEBGtest_vpcs (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
14692026-01-27T01:13:57.144ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
14702026-01-27T01:13:57.369ZDEBGtest_vpcs (BackgroundTasks): client request SledAgent = b6d65341-167c-41df-9b5c-41cded99c229 background_task = v2p_manager body = None method = GET uri = http://[::1]:59842/v2p
14712026-01-27T01:13:57.448ZINFOtest_vpcs (BackgroundTasks): VPC route manager sled b6d65341-167c-41df-9b5c-41cded99c229 background_task = vpc_route_manager
14722026-01-27T01:13:57.449ZDEBGtest_vpcs (BackgroundTasks): client request SledAgent = b6d65341-167c-41df-9b5c-41cded99c229 background_task = vpc_route_manager body = None method = GET uri = http://[::1]:59842/vpc-routes
14732026-01-27T01:13:57.454ZINFOtest_vpcs (dropshot): accepted connection local_addr = [::1]:59842 remote_addr = [::1]:40850 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
14742026-01-27T01:13:57.455ZINFOtest_vpcs (dropshot): accepted connection local_addr = [::1]:59842 remote_addr = [::1]:59031 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
14752026-01-27T01:13:57.456ZDEBGtest_vpcs (BackgroundTasks): activating background_task = reconfigurator_config_watcher iteration = 2 reason = Timeout
14762026-01-27T01:13:57.456ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = reconfigurator_config_watcher resource = BlueprintConfig
14772026-01-27T01:13:57.456ZTRACtest_vpcs (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } background_task = reconfigurator_config_watcher resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
14782026-01-27T01:13:57.456ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = reconfigurator_config_watcher resource = Database
14792026-01-27T01:13:57.456ZDEBGtest_vpcs (BackgroundTasks): roles background_task = reconfigurator_config_watcher roles = RoleSet { roles: {} }
14802026-01-27T01:13:57.457ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = reconfigurator_config_watcher resource = Database result = Ok(())
14812026-01-27T01:13:57.459ZTRACtest_vpcs (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } background_task = service_firewall_rule_propagation resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
14822026-01-27T01:13:57.460ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = Database
14832026-01-27T01:13:57.460ZDEBGtest_vpcs (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
14842026-01-27T01:13:57.460ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
14852026-01-27T01:13:57.468ZTRACtest_vpcs (dropshot): incoming request local_addr = [::1]:59842 method = GET remote_addr = [::1]:40850 req_id = 6aee9cc5-7980-459f-aa01-f3eaa1bda9e4 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /v2p
14862026-01-27T01:13:57.468ZDEBGtest_vpcs (dropshot): determined request API version local_addr = [::1]:59842 method = GET remote_addr = [::1]:40850 req_id = 6aee9cc5-7980-459f-aa01-f3eaa1bda9e4 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /v2p version = 15.0.0
14872026-01-27T01:13:57.468ZTRACtest_vpcs (dropshot): incoming request local_addr = [::1]:59842 method = GET remote_addr = [::1]:59031 req_id = 6f7db099-75cd-4358-b0b8-26368cb77819 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /vpc-routes
14882026-01-27T01:13:57.468ZDEBGtest_vpcs (dropshot): determined request API version local_addr = [::1]:59842 method = GET remote_addr = [::1]:59031 req_id = 6f7db099-75cd-4358-b0b8-26368cb77819 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /vpc-routes version = 15.0.0
14892026-01-27T01:13:57.469ZINFOtest_vpcs (dropshot): request completed latency_us = 1094 local_addr = [::1]:59842 method = GET remote_addr = [::1]:40850 req_id = 6aee9cc5-7980-459f-aa01-f3eaa1bda9e4 response_code = 200 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /v2p
14902026-01-27T01:13:57.469ZINFOtest_vpcs (dropshot): request completed latency_us = 927 local_addr = [::1]:59842 method = GET remote_addr = [::1]:59031 req_id = 6f7db099-75cd-4358-b0b8-26368cb77819 response_code = 200 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /vpc-routes
14912026-01-27T01:13:57.470ZDEBGtest_vpcs (BackgroundTasks): roles background_task = reconfigurator_config_watcher roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
14922026-01-27T01:13:57.487ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = reconfigurator_config_watcher resource = BlueprintConfig result = Ok(())
14932026-01-27T01:13:57.487ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = reconfigurator_config_watcher resource = Database
14942026-01-27T01:13:57.487ZDEBGtest_vpcs (BackgroundTasks): roles background_task = reconfigurator_config_watcher roles = RoleSet { roles: {} }
14952026-01-27T01:13:57.488ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = reconfigurator_config_watcher resource = Database result = Ok(())
14962026-01-27T01:13:57.490ZDEBGtest_vpcs (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
14972026-01-27T01:13:57.504ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) } result = Ok(())
14982026-01-27T01:13:57.504ZTRACtest_vpcs (BackgroundTasks): successful lookup of siloed resource "Vpc" using built-in user background_task = service_firewall_rule_propagation
14992026-01-27T01:13:57.504ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = Database
15002026-01-27T01:13:57.504ZDEBGtest_vpcs (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
15012026-01-27T01:13:57.506ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
15022026-01-27T01:13:57.515ZDEBGtest_vpcs (BackgroundTasks): reconfigurator config load complete background_task = reconfigurator_config_watcher switches = Loaded(ReconfiguratorConfigView { version: 1, config: ReconfiguratorConfig { planner_enabled: false, planner_config: PlannerConfig { add_zones_with_mupdate_override: false }, tuf_repo_pruner_enabled: true }, time_modified: 2026-01-27T01:13:51.285464Z })
15032026-01-27T01:13:57.515ZDEBGtest_vpcs (BackgroundTasks): activation complete background_task = reconfigurator_config_watcher elapsed = 59.127719ms iteration = 2 status = {"config_updated":false}
15042026-01-27T01:13:57.515ZDEBGtest_vpcs (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
15052026-01-27T01:13:57.519ZDEBGtest_vpcs (InternalApi): authorize result action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Fleet result = Ok(())
15062026-01-27T01:13:57.519ZTRACtest_vpcs (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database
15072026-01-27T01:13:57.519ZDEBGtest_vpcs (InternalApi): roles roles = RoleSet { roles: {} }
15082026-01-27T01:13:57.520ZDEBGtest_vpcs (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database result = Ok(())
15092026-01-27T01:13:57.523ZDEBGtest_vpcs (BackgroundTasks): client response SledAgent = b6d65341-167c-41df-9b5c-41cded99c229 background_task = v2p_manager result = Ok(Response { url: "http://[::1]:59842/v2p", status: 200, headers: {"content-type": "application/json", "x-request-id": "6aee9cc5-7980-459f-aa01-f3eaa1bda9e4", "content-length": "2", "date": "Tue, 27 Jan 2026 01:13:57 GMT"} })
15102026-01-27T01:13:57.523ZINFOtest_vpcs (BackgroundTasks): found opte v2p mappings background_task = v2p_manager interfaces = {} sled = SimGimlet00
15112026-01-27T01:13:57.523ZINFOtest_vpcs (BackgroundTasks): v2p mappings to delete background_task = v2p_manager mappings = [] sled = SimGimlet00
15122026-01-27T01:13:57.523ZINFOtest_vpcs (BackgroundTasks): v2p mappings to add background_task = v2p_manager mappings = [] sled = SimGimlet00
15132026-01-27T01:13:57.525ZDEBGtest_vpcs (BackgroundTasks): activation complete background_task = v2p_manager elapsed = 6.025222663s iteration = 1 status = {}
15142026-01-27T01:13:57.525ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = Database
15152026-01-27T01:13:57.525ZDEBGtest_vpcs (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
15162026-01-27T01:13:57.526ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
15172026-01-27T01:13:57.527ZDEBGtest_vpcs (BackgroundTasks): client response SledAgent = b6d65341-167c-41df-9b5c-41cded99c229 background_task = vpc_route_manager result = Ok(Response { url: "http://[::1]:59842/vpc-routes", status: 200, headers: {"content-type": "application/json", "x-request-id": "6f7db099-75cd-4358-b0b8-26368cb77819", "content-length": "2", "date": "Tue, 27 Jan 2026 01:13:57 GMT"} })
15182026-01-27T01:13:57.527ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = vpc_route_manager resource = Database
15192026-01-27T01:13:57.527ZDEBGtest_vpcs (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
15202026-01-27T01:13:57.528ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = vpc_route_manager resource = Database result = Ok(())
15212026-01-27T01:13:57.539ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = Database
15222026-01-27T01:13:57.539ZDEBGtest_vpcs (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
15232026-01-27T01:13:57.540ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
15242026-01-27T01:13:57.552ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = Database
15252026-01-27T01:13:57.552ZDEBGtest_vpcs (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
15262026-01-27T01:13:57.553ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
15272026-01-27T01:13:57.564ZTRACtest_vpcs (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database
15282026-01-27T01:13:57.564ZDEBGtest_vpcs (InternalApi): roles roles = RoleSet { roles: {} }
15292026-01-27T01:13:57.566ZDEBGtest_vpcs (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database result = Ok(())
15302026-01-27T01:13:57.603ZTRACtest_vpcs (BackgroundTasks): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000001, lookup_type: ByName("external-dns") }
15312026-01-27T01:13:57.603ZTRACtest_vpcs (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } background_task = service_firewall_rule_propagation resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
15322026-01-27T01:13:57.603ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = Database
15332026-01-27T01:13:57.604ZDEBGtest_vpcs (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
15342026-01-27T01:13:57.604ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
15352026-01-27T01:13:57.609ZTRACtest_vpcs (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } background_task = service_firewall_rule_propagation resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
15362026-01-27T01:13:57.609ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = Database
15372026-01-27T01:13:57.609ZDEBGtest_vpcs (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
15382026-01-27T01:13:57.611ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
15392026-01-27T01:13:57.634ZINFOtest_vpcs (InternalApi): set cockroachdb setting setting = cluster.preserve_downgrade_option value = 22.1
15402026-01-27T01:13:57.634ZTRACtest_vpcs (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database
15412026-01-27T01:13:57.635ZDEBGtest_vpcs (InternalApi): roles roles = RoleSet { roles: {} }
15422026-01-27T01:13:57.636ZDEBGtest_vpcs (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database result = Ok(())
15432026-01-27T01:13:57.638ZTRACtest_vpcs (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } background_task = service_firewall_rule_propagation resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
15442026-01-27T01:13:57.638ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = Database
15452026-01-27T01:13:57.638ZDEBGtest_vpcs (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
15462026-01-27T01:13:57.639ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
15472026-01-27T01:13:57.659ZINFOtest_vpcs (BackgroundTasks): computed internet gateway mappings for sled assocs = {} background_task = vpc_route_manager sled = SimGimlet00
15482026-01-27T01:13:57.659ZDEBGtest_vpcs (BackgroundTasks): client request SledAgent = b6d65341-167c-41df-9b5c-41cded99c229 background_task = vpc_route_manager body = Some(Body) method = PUT uri = http://[::1]:59842/eip-gateways
15492026-01-27T01:13:57.660ZDEBGtest_vpcs (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
15502026-01-27T01:13:57.673ZDEBGtest_vpcs (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000001, lookup_type: ByName("external-dns") } result = Ok(())
15512026-01-27T01:13:57.686ZTRACtest_vpcs (BackgroundTasks): successful lookup of siloed resource "VpcSubnet" using built-in user background_task = service_firewall_rule_propagation
15522026-01-27T01:13:57.686ZTRACtest_vpcs (BackgroundTasks): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000001, lookup_type: ByName("external-dns") }
15532026-01-27T01:13:57.686ZTRACtest_vpcs (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } background_task = service_firewall_rule_propagation resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
15542026-01-27T01:13:57.686ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = Database
15552026-01-27T01:13:57.686ZDEBGtest_vpcs (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
15562026-01-27T01:13:57.688ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
15572026-01-27T01:13:57.690ZTRACtest_vpcs (InternalApi): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Rack { parent: Fleet, key: c19a698f-c6f9-4a17-ae30-20d711b8f7dc, lookup_type: ById(c19a698f-c6f9-4a17-ae30-20d711b8f7dc) }
15582026-01-27T01:13:57.690ZTRACtest_vpcs (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
15592026-01-27T01:13:57.690ZTRACtest_vpcs (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database
15602026-01-27T01:13:57.690ZDEBGtest_vpcs (InternalApi): roles roles = RoleSet { roles: {} }
15612026-01-27T01:13:57.692ZDEBGtest_vpcs (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database result = Ok(())
15622026-01-27T01:13:57.694ZTRACtest_vpcs (dropshot): incoming request local_addr = [::1]:59842 method = PUT remote_addr = [::1]:59031 req_id = 66955112-5b69-43ca-96b5-a5670f2dc3ee sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /eip-gateways
15632026-01-27T01:13:57.694ZDEBGtest_vpcs (dropshot): determined request API version local_addr = [::1]:59842 method = PUT remote_addr = [::1]:59031 req_id = 66955112-5b69-43ca-96b5-a5670f2dc3ee sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /eip-gateways version = 15.0.0
15642026-01-27T01:13:57.702ZINFOtest_vpcs (dropshot): request completed latency_us = 7989 local_addr = [::1]:59842 method = PUT remote_addr = [::1]:59031 req_id = 66955112-5b69-43ca-96b5-a5670f2dc3ee response_code = 204 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /eip-gateways
15652026-01-27T01:13:57.704ZDEBGtest_vpcs (BackgroundTasks): client response SledAgent = b6d65341-167c-41df-9b5c-41cded99c229 background_task = vpc_route_manager result = Ok(Response { url: "http://[::1]:59842/eip-gateways", status: 204, headers: {"x-request-id": "66955112-5b69-43ca-96b5-a5670f2dc3ee", "date": "Tue, 27 Jan 2026 01:13:57 GMT"} })
15662026-01-27T01:13:57.710ZDEBGtest_vpcs (BackgroundTasks): activation complete background_task = vpc_route_manager elapsed = 4.103761058s iteration = 2 status = {}
15672026-01-27T01:13:57.710ZTRACtest_vpcs (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } background_task = service_firewall_rule_propagation resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
15682026-01-27T01:13:57.710ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = Database
15692026-01-27T01:13:57.710ZDEBGtest_vpcs (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
15702026-01-27T01:13:57.712ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
15712026-01-27T01:13:57.723ZDEBGtest_vpcs (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
15722026-01-27T01:13:57.731ZDEBGtest_vpcs (InternalApi): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Rack { parent: Fleet, key: c19a698f-c6f9-4a17-ae30-20d711b8f7dc, lookup_type: ById(c19a698f-c6f9-4a17-ae30-20d711b8f7dc) } result = Ok(())
15732026-01-27T01:13:57.731ZDEBGtest_vpcs (InternalApi): updating rack subnet for rack c19a698f-c6f9-4a17-ae30-20d711b8f7dc to Some( V6( Ipv6Network { addr: fd00:1122:3344:100::, prefix: 56, }, ), )
15742026-01-27T01:13:57.731ZTRACtest_vpcs (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database
15752026-01-27T01:13:57.731ZDEBGtest_vpcs (InternalApi): roles roles = RoleSet { roles: {} }
15762026-01-27T01:13:57.732ZDEBGtest_vpcs (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database result = Ok(())
15772026-01-27T01:13:57.735ZTRACtest_vpcs (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } background_task = service_firewall_rule_propagation resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
15782026-01-27T01:13:57.735ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = Database
15792026-01-27T01:13:57.735ZDEBGtest_vpcs (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
15802026-01-27T01:13:57.736ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
15812026-01-27T01:13:57.796ZDEBGtest_vpcs (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
15822026-01-27T01:13:57.809ZDEBGtest_vpcs (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000001, lookup_type: ByName("external-dns") } result = Ok(())
15832026-01-27T01:13:57.809ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = Database
15842026-01-27T01:13:57.809ZDEBGtest_vpcs (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
15852026-01-27T01:13:57.809ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
15862026-01-27T01:13:57.821ZINFOtest_vpcs (InternalApi): Using static configuration for external switchports
15872026-01-27T01:13:57.821ZTRACtest_vpcs (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database
15882026-01-27T01:13:57.821ZDEBGtest_vpcs (InternalApi): roles roles = RoleSet { roles: {} }
15892026-01-27T01:13:57.823ZDEBGtest_vpcs (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database result = Ok(())
15902026-01-27T01:13:57.831ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = Database
15912026-01-27T01:13:57.831ZDEBGtest_vpcs (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
15922026-01-27T01:13:57.832ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
15932026-01-27T01:13:57.841ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = Database
15942026-01-27T01:13:57.841ZDEBGtest_vpcs (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
15952026-01-27T01:13:57.842ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
15962026-01-27T01:13:57.854ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = Database
15972026-01-27T01:13:57.854ZDEBGtest_vpcs (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
15982026-01-27T01:13:57.856ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
15992026-01-27T01:13:57.870ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = Database
16002026-01-27T01:13:57.870ZDEBGtest_vpcs (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
16012026-01-27T01:13:57.871ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
16022026-01-27T01:13:57.877ZTRACtest_vpcs (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database
16032026-01-27T01:13:57.877ZDEBGtest_vpcs (InternalApi): roles roles = RoleSet { roles: {} }
16042026-01-27T01:13:57.878ZDEBGtest_vpcs (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database result = Ok(())
16052026-01-27T01:13:57.878ZTRACtest_vpcs (BackgroundTasks): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000002, lookup_type: ByName("nexus") }
16062026-01-27T01:13:57.879ZTRACtest_vpcs (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } background_task = service_firewall_rule_propagation resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
16072026-01-27T01:13:57.879ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = Database
16082026-01-27T01:13:57.879ZDEBGtest_vpcs (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
16092026-01-27T01:13:57.879ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
16102026-01-27T01:13:57.899ZTRACtest_vpcs (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } background_task = service_firewall_rule_propagation resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
16112026-01-27T01:13:57.899ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = Database
16122026-01-27T01:13:57.899ZDEBGtest_vpcs (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
16132026-01-27T01:13:57.900ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
16142026-01-27T01:13:57.904ZTRACtest_vpcs (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } background_task = service_firewall_rule_propagation resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
16152026-01-27T01:13:57.904ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = Database
16162026-01-27T01:13:57.904ZDEBGtest_vpcs (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
16172026-01-27T01:13:57.908ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
16182026-01-27T01:13:57.913ZDEBGtest_vpcs (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
16192026-01-27T01:13:57.928ZDEBGtest_vpcs (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000002, lookup_type: ByName("nexus") } result = Ok(())
16202026-01-27T01:13:57.928ZTRACtest_vpcs (BackgroundTasks): successful lookup of siloed resource "VpcSubnet" using built-in user background_task = service_firewall_rule_propagation
16212026-01-27T01:13:57.928ZTRACtest_vpcs (BackgroundTasks): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000002, lookup_type: ByName("nexus") }
16222026-01-27T01:13:57.929ZTRACtest_vpcs (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } background_task = service_firewall_rule_propagation resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
16232026-01-27T01:13:57.929ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = Database
16242026-01-27T01:13:57.929ZDEBGtest_vpcs (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
16252026-01-27T01:13:57.929ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
16262026-01-27T01:13:57.931ZINFOtest_vpcs (InternalApi): Recording Rack Network Configuration
16272026-01-27T01:13:57.931ZTRACtest_vpcs (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database
16282026-01-27T01:13:57.931ZDEBGtest_vpcs (InternalApi): roles roles = RoleSet { roles: {} }
16292026-01-27T01:13:57.932ZDEBGtest_vpcs (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database result = Ok(())
16302026-01-27T01:13:57.935ZTRACtest_vpcs (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } background_task = service_firewall_rule_propagation resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
16312026-01-27T01:13:57.935ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = Database
16322026-01-27T01:13:57.935ZDEBGtest_vpcs (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
16332026-01-27T01:13:57.937ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
16342026-01-27T01:13:57.943ZTRACtest_vpcs (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } background_task = service_firewall_rule_propagation resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
16352026-01-27T01:13:57.943ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = Database
16362026-01-27T01:13:57.943ZDEBGtest_vpcs (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
16372026-01-27T01:13:57.944ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
16382026-01-27T01:13:57.949ZDEBGtest_vpcs (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
16392026-01-27T01:13:57.961ZDEBGtest_vpcs (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000002, lookup_type: ByName("nexus") } result = Ok(())
16402026-01-27T01:13:57.963ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = Database
16412026-01-27T01:13:57.963ZDEBGtest_vpcs (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
16422026-01-27T01:13:57.965ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
16432026-01-27T01:13:57.997ZDEBGtest_vpcs (service-firewall-rule-progator): resolved names for firewall rules background_task = service_firewall_rule_propagation instance_interfaces = {} subnet_interfaces = {} subnet_networks = {Name("external-dns"): [V4(Ipv4Network { addr: 172.30.1.0, prefix: 24 }), V6(Ipv6Network { addr: fd77:e9d2:9cd9:1::, prefix: 64 })], Name("nexus"): [V4(Ipv4Network { addr: 172.30.2.0, prefix: 24 }), V6(Ipv6Network { addr: fd77:e9d2:9cd9:2::, prefix: 64 })]} vpc_interfaces = {}
16442026-01-27T01:13:57.998ZTRACtest_vpcs (BackgroundTasks): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = Fleet
16452026-01-27T01:13:57.998ZTRACtest_vpcs (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } background_task = service_firewall_rule_propagation resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
16462026-01-27T01:13:57.998ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = Database
16472026-01-27T01:13:57.999ZDEBGtest_vpcs (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
16482026-01-27T01:13:57.999ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
16492026-01-27T01:13:58.007ZDEBGtest_vpcs (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
16502026-01-27T01:13:58.017ZDEBGtest_vpcs (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = Fleet result = Ok(())
16512026-01-27T01:13:58.017ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = Database
16522026-01-27T01:13:58.017ZDEBGtest_vpcs (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
16532026-01-27T01:13:58.019ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
16542026-01-27T01:13:58.033ZTRACtest_vpcs (service-firewall-rule-progator): fetched allowlist from DB allowed = AllowList { id: 001de000-a110-4000-8000-000000000000, time_created: 2026-01-26T23:16:37.697587Z, time_modified: 2026-01-26T23:16:37.697587Z, allowed_ips: None } background_task = service_firewall_rule_propagation
16552026-01-27T01:13:58.033ZDEBGtest_vpcs (service-firewall-rule-progator): Allowlist for user-facing services is set to allow any inbound traffic. Existing VPC firewall rules will not be modified. background_task = service_firewall_rule_propagation
16562026-01-27T01:13:58.033ZDEBGtest_vpcs (service-firewall-rule-progator): resolved firewall rules for sled agents background_task = service_firewall_rule_propagation sled_agent_rules = []
16572026-01-27T01:13:58.033ZDEBGtest_vpcs (service-firewall-rule-progator): resolved 0 rules for sleds background_task = service_firewall_rule_propagation
16582026-01-27T01:13:58.077ZTRACtest_vpcs (InternalApi): authorize begin action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Fleet
16592026-01-27T01:13:58.077ZTRACtest_vpcs (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
16602026-01-27T01:13:58.077ZTRACtest_vpcs (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database
16612026-01-27T01:13:58.077ZDEBGtest_vpcs (InternalApi): roles roles = RoleSet { roles: {} }
16622026-01-27T01:13:58.078ZDEBGtest_vpcs (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database result = Ok(())
16632026-01-27T01:13:58.082ZDEBGtest_vpcs (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
16642026-01-27T01:13:58.089ZDEBGtest_vpcs (InternalApi): authorize result action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Fleet result = Ok(())
16652026-01-27T01:13:58.089ZTRACtest_vpcs (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database
16662026-01-27T01:13:58.089ZDEBGtest_vpcs (InternalApi): roles roles = RoleSet { roles: {} }
16672026-01-27T01:13:58.090ZDEBGtest_vpcs (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database result = Ok(())
16682026-01-27T01:13:58.098ZTRACtest_vpcs (InternalApi): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = IpPool { parent: Fleet, key: cb3a3b53-75df-46bd-8fd9-9c15d8fc0604, lookup_type: ByName("oxide-service-pool-v4") }
16692026-01-27T01:13:58.098ZTRACtest_vpcs (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
16702026-01-27T01:13:58.099ZTRACtest_vpcs (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database
16712026-01-27T01:13:58.099ZDEBGtest_vpcs (InternalApi): roles roles = RoleSet { roles: {} }
16722026-01-27T01:13:58.099ZDEBGtest_vpcs (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database result = Ok(())
16732026-01-27T01:13:58.105ZDEBGtest_vpcs (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
16742026-01-27T01:13:58.112ZDEBGtest_vpcs (InternalApi): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = IpPool { parent: Fleet, key: cb3a3b53-75df-46bd-8fd9-9c15d8fc0604, lookup_type: ByName("oxide-service-pool-v4") } result = Ok(())
16752026-01-27T01:13:58.112ZTRACtest_vpcs (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database
16762026-01-27T01:13:58.112ZDEBGtest_vpcs (InternalApi): roles roles = RoleSet { roles: {} }
16772026-01-27T01:13:58.113ZDEBGtest_vpcs (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database result = Ok(())
16782026-01-27T01:13:58.116ZTRACtest_vpcs (InternalApi): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = IpPool { parent: Fleet, key: 867aa474-11ff-4274-bd22-0aea0f5c1c8c, lookup_type: ByName("oxide-service-pool-v6") }
16792026-01-27T01:13:58.117ZTRACtest_vpcs (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
16802026-01-27T01:13:58.117ZTRACtest_vpcs (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database
16812026-01-27T01:13:58.117ZDEBGtest_vpcs (InternalApi): roles roles = RoleSet { roles: {} }
16822026-01-27T01:13:58.117ZDEBGtest_vpcs (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database result = Ok(())
16832026-01-27T01:13:58.122ZDEBGtest_vpcs (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
16842026-01-27T01:13:58.131ZDEBGtest_vpcs (InternalApi): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = IpPool { parent: Fleet, key: 867aa474-11ff-4274-bd22-0aea0f5c1c8c, lookup_type: ByName("oxide-service-pool-v6") } result = Ok(())
16852026-01-27T01:13:58.131ZTRACtest_vpcs (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database
16862026-01-27T01:13:58.131ZDEBGtest_vpcs (InternalApi): roles roles = RoleSet { roles: {} }
16872026-01-27T01:13:58.132ZDEBGtest_vpcs (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database result = Ok(())
16882026-01-27T01:13:58.139ZTRACtest_vpcs (InternalApi): authorize begin action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = IpPool { parent: Fleet, key: 867aa474-11ff-4274-bd22-0aea0f5c1c8c, lookup_type: ByName("oxide-service-pool-v6") }
16892026-01-27T01:13:58.139ZTRACtest_vpcs (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
16902026-01-27T01:13:58.139ZTRACtest_vpcs (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database
16912026-01-27T01:13:58.139ZDEBGtest_vpcs (InternalApi): roles roles = RoleSet { roles: {} }
16922026-01-27T01:13:58.140ZDEBGtest_vpcs (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database result = Ok(())
16932026-01-27T01:13:58.187ZDEBGtest_vpcs (service-firewall-rule-progator): resolved sleds for vpc oxide-services background_task = service_firewall_rule_propagation vpc_to_sled = []
16942026-01-27T01:13:58.188ZDEBGtest_vpcs (service-firewall-rule-progator): sending firewall rules to sled agents background_task = service_firewall_rule_propagation
16952026-01-27T01:13:58.188ZINFOtest_vpcs (service-firewall-rule-progator): updated firewall rules on 0 sleds background_task = service_firewall_rule_propagation
16962026-01-27T01:13:58.188ZDEBGtest_vpcs (service-firewall-rule-progator): successfully propagated service firewall rules background_task = service_firewall_rule_propagation elapsed = 6.576446238s
16972026-01-27T01:13:58.188ZDEBGtest_vpcs (BackgroundTasks): activation complete background_task = service_firewall_rule_propagation elapsed = 6.576548077s iteration = 1 status = {}
16982026-01-27T01:13:58.196ZDEBGtest_vpcs (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
16992026-01-27T01:13:58.203ZDEBGtest_vpcs (InternalApi): authorize result action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = IpPool { parent: Fleet, key: 867aa474-11ff-4274-bd22-0aea0f5c1c8c, lookup_type: ByName("oxide-service-pool-v6") } result = Ok(())
17002026-01-27T01:13:58.237ZTRACtest_vpcs (InternalApi): authorize begin action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = IpPool { parent: Fleet, key: cb3a3b53-75df-46bd-8fd9-9c15d8fc0604, lookup_type: ByName("oxide-service-pool-v4") }
17012026-01-27T01:13:58.237ZTRACtest_vpcs (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
17022026-01-27T01:13:58.237ZTRACtest_vpcs (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database
17032026-01-27T01:13:58.237ZDEBGtest_vpcs (InternalApi): roles roles = RoleSet { roles: {} }
17042026-01-27T01:13:58.238ZDEBGtest_vpcs (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database result = Ok(())
17052026-01-27T01:13:58.242ZDEBGtest_vpcs (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
17062026-01-27T01:13:58.249ZDEBGtest_vpcs (InternalApi): authorize result action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = IpPool { parent: Fleet, key: cb3a3b53-75df-46bd-8fd9-9c15d8fc0604, lookup_type: ByName("oxide-service-pool-v4") } result = Ok(())
17072026-01-27T01:13:58.270ZTRACtest_vpcs (InternalApi): authorize begin action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = IpPool { parent: Fleet, key: cb3a3b53-75df-46bd-8fd9-9c15d8fc0604, lookup_type: ByName("oxide-service-pool-v4") }
17082026-01-27T01:13:58.270ZTRACtest_vpcs (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
17092026-01-27T01:13:58.271ZTRACtest_vpcs (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database
17102026-01-27T01:13:58.271ZDEBGtest_vpcs (InternalApi): roles roles = RoleSet { roles: {} }
17112026-01-27T01:13:58.272ZDEBGtest_vpcs (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database result = Ok(())
17122026-01-27T01:13:58.277ZDEBGtest_vpcs (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
17132026-01-27T01:13:58.292ZDEBGtest_vpcs (InternalApi): authorize result action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = IpPool { parent: Fleet, key: cb3a3b53-75df-46bd-8fd9-9c15d8fc0604, lookup_type: ByName("oxide-service-pool-v4") } result = Ok(())
17142026-01-27T01:13:58.306ZTRACtest_vpcs (InternalApi): authorize begin action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = BlueprintConfig
17152026-01-27T01:13:58.311ZTRACtest_vpcs (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
17162026-01-27T01:13:58.311ZTRACtest_vpcs (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database
17172026-01-27T01:13:58.311ZDEBGtest_vpcs (InternalApi): roles roles = RoleSet { roles: {} }
17182026-01-27T01:13:58.312ZDEBGtest_vpcs (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database result = Ok(())
17192026-01-27T01:13:58.319ZDEBGtest_vpcs (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
17202026-01-27T01:13:58.326ZDEBGtest_vpcs (InternalApi): authorize result action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = BlueprintConfig result = Ok(())
17212026-01-27T01:13:58.572ZINFOtest_vpcs (InternalApi): inserted blueprint blueprint_id = c01a6e26-b5bc-40f6-ba41-c1d23b303d2d
17222026-01-27T01:13:58.572ZTRACtest_vpcs (InternalApi): authorize begin action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = BlueprintConfig
17232026-01-27T01:13:58.572ZTRACtest_vpcs (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
17242026-01-27T01:13:58.572ZTRACtest_vpcs (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database
17252026-01-27T01:13:58.572ZDEBGtest_vpcs (InternalApi): roles roles = RoleSet { roles: {} }
17262026-01-27T01:13:58.574ZDEBGtest_vpcs (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database result = Ok(())
17272026-01-27T01:13:58.589ZDEBGtest_vpcs (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
17282026-01-27T01:13:58.600ZDEBGtest_vpcs (InternalApi): authorize result action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = BlueprintConfig result = Ok(())
17292026-01-27T01:13:58.626ZINFOtest_vpcs (InternalApi): No networking records needed for cockroach_db service
17302026-01-27T01:13:58.735ZINFOtest_vpcs (InternalApi): Inserted networking records for external_dns service
17312026-01-27T01:13:58.735ZINFOtest_vpcs (InternalApi): No networking records needed for clickhouse service
17322026-01-27T01:13:58.773ZINFOtest_vpcs (InternalApi): Inserted networking records for nexus service
17332026-01-27T01:13:58.819ZINFOtest_vpcs (InternalApi): Inserted networking records for boundary_ntp service
17342026-01-27T01:13:58.820ZINFOtest_vpcs (InternalApi): No networking records needed for crucible_pantry service
17352026-01-27T01:13:58.820ZINFOtest_vpcs (InternalApi): No networking records needed for internal_dns service
17362026-01-27T01:13:58.820ZINFOtest_vpcs (InternalApi): Inserted service networking records
17372026-01-27T01:13:58.820ZINFOtest_vpcs (InternalApi): Inserted physical disks
17382026-01-27T01:13:58.820ZINFOtest_vpcs (InternalApi): Inserted zpools
17392026-01-27T01:13:58.820ZINFOtest_vpcs (InternalApi): Inserted datasets
17402026-01-27T01:13:58.847ZINFOtest_vpcs (InternalApi): Populated DNS tables for internal DNS
17412026-01-27T01:13:58.854ZINFOtest_vpcs (InternalApi): Populated DNS tables for external DNS
17422026-01-27T01:13:58.855ZTRACtest_vpcs (InternalApi): authorize begin action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Fleet
17432026-01-27T01:13:58.855ZTRACtest_vpcs (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
17442026-01-27T01:13:58.855ZTRACtest_vpcs (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database
17452026-01-27T01:13:58.855ZDEBGtest_vpcs (InternalApi): roles roles = RoleSet { roles: {} }
17462026-01-27T01:13:58.856ZDEBGtest_vpcs (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database result = Ok(())
17472026-01-27T01:13:58.860ZDEBGtest_vpcs (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
17482026-01-27T01:13:58.865ZDEBGtest_vpcs (InternalApi): authorize result action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Fleet result = Ok(())
17492026-01-27T01:13:58.865ZTRACtest_vpcs (InternalApi): authorize begin action = ModifyPolicy actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Fleet
17502026-01-27T01:13:58.865ZTRACtest_vpcs (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
17512026-01-27T01:13:58.865ZTRACtest_vpcs (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database
17522026-01-27T01:13:58.865ZDEBGtest_vpcs (InternalApi): roles roles = RoleSet { roles: {} }
17532026-01-27T01:13:58.867ZDEBGtest_vpcs (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database result = Ok(())
17542026-01-27T01:13:58.869ZTRACtest_vpcs (dns): buffer buffer = Length: 67 (0x43) bytes\n0000: dd 1a 01 00 00 01 00 00 00 00 00 01 04 5f 6d 67 ............._mg\n0010: 73 04 5f 74 63 70 0d 63 6f 6e 74 72 6f 6c 2d 70 s._tcp.control-p\n0020: 6c 61 6e 65 05 6f 78 69 64 65 08 69 6e 74 65 72 lane.oxide.inter\n0030: 6e 61 6c 00 00 21 00 01 00 00 29 04 d0 00 00 00 nal..!....).....\n0040: 00 00 00 ... kind = dns peer_addr = [::1]:51294 req_id = 6eac5450-0552-4e49-bd0d-413445d667f2
17552026-01-27T01:13:58.869ZDEBGtest_vpcs (dns): message_request kind = dns mr = MessageRequest {\n header: Header {\n id: 56602,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n queries: Queries {\n queries: [\n LowerQuery {\n name: LowerName(\n Name("_mgs._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_mgs._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n ],\n original: [\n 4,\n 95,\n 109,\n 103,\n 115,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n flags: EdnsFlags {\n dnssec_ok: false,\n z: 0,\n },\n max_payload: 1232,\n options: OPT {\n options: [],\n },\n },\n ),\n} peer_addr = [::1]:51294 req_id = 6eac5450-0552-4e49-bd0d-413445d667f2
17562026-01-27T01:13:58.870ZDEBGtest_vpcs (store): query key key = _mgs._tcp
17572026-01-27T01:13:58.870ZDEBGtest_vpcs (store): query key key = dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host
17582026-01-27T01:13:58.870ZDEBGtest_vpcs (dns): dns response additional_records = [Record { name_labels: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal"), dns_class: IN, ttl: 0, rdata: AAAA(AAAA(::1)) }] kind = dns peer_addr = [::1]:51294 query = LowerQuery { name: LowerName(Name("_mgs._tcp.control-plane.oxide.internal.")), original: Query { name: Name("_mgs._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN } } records = [Record { name_labels: Name("_mgs._tcp.control-plane.oxide.internal."), dns_class: IN, ttl: 0, rdata: SRV(SRV { priority: 0, weight: 0, port: 52572, target: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal") }) }] req_id = 6eac5450-0552-4e49-bd0d-413445d667f2
17592026-01-27T01:13:58.871ZTRACtest_vpcs (dns): buffer buffer = Length: 74 (0x4a) bytes\n0000: 81 02 01 00 00 01 00 00 00 00 00 01 0b 5f 72 65 ............._re\n0010: 70 6f 2d 64 65 70 6f 74 04 5f 74 63 70 0d 63 6f po-depot._tcp.co\n0020: 6e 74 72 6f 6c 2d 70 6c 61 6e 65 05 6f 78 69 64 ntrol-plane.oxid\n0030: 65 08 69 6e 74 65 72 6e 61 6c 00 00 21 00 01 00 e.internal..!...\n0040: 00 29 04 d0 00 00 00 00 00 00 .)........ kind = dns peer_addr = [::1]:61455 req_id = b10388c5-771c-4875-ab02-604a29bbfd07
17602026-01-27T01:13:58.871ZDEBGtest_vpcs (dns): message_request kind = dns mr = MessageRequest {\n header: Header {\n id: 33026,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n queries: Queries {\n queries: [\n LowerQuery {\n name: LowerName(\n Name("_repo-depot._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_repo-depot._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n ],\n original: [\n 11,\n 95,\n 114,\n 101,\n 112,\n 111,\n 45,\n 100,\n 101,\n 112,\n 111,\n 116,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n flags: EdnsFlags {\n dnssec_ok: false,\n z: 0,\n },\n max_payload: 1232,\n options: OPT {\n options: [],\n },\n },\n ),\n} peer_addr = [::1]:61455 req_id = b10388c5-771c-4875-ab02-604a29bbfd07
17612026-01-27T01:13:58.871ZDEBGtest_vpcs (store): query key key = _repo-depot._tcp
17622026-01-27T01:13:58.871ZDEBGtest_vpcs (store): query key key = b6d65341-167c-41df-9b5c-41cded99c229.sled
17632026-01-27T01:13:58.871ZDEBGtest_vpcs (dns): dns response additional_records = [Record { name_labels: Name("b6d65341-167c-41df-9b5c-41cded99c229.sled.control-plane.oxide.internal"), dns_class: IN, ttl: 0, rdata: AAAA(AAAA(::1)) }] kind = dns peer_addr = [::1]:61455 query = LowerQuery { name: LowerName(Name("_repo-depot._tcp.control-plane.oxide.internal.")), original: Query { name: Name("_repo-depot._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN } } records = [Record { name_labels: Name("_repo-depot._tcp.control-plane.oxide.internal."), dns_class: IN, ttl: 0, rdata: SRV(SRV { priority: 0, weight: 0, port: 50229, target: Name("b6d65341-167c-41df-9b5c-41cded99c229.sled.control-plane.oxide.internal") }) }] req_id = b10388c5-771c-4875-ab02-604a29bbfd07
17642026-01-27T01:13:58.871ZTRACtest_vpcs (dns): buffer buffer = Length: 79 (0x4f) bytes\n0000: e6 fb 01 00 00 01 00 00 00 00 00 01 10 5f 63 72 ............._cr\n0010: 75 63 69 62 6c 65 2d 70 61 6e 74 72 79 04 5f 74 ucible-pantry._t\n0020: 63 70 0d 63 6f 6e 74 72 6f 6c 2d 70 6c 61 6e 65 cp.control-plane\n0030: 05 6f 78 69 64 65 08 69 6e 74 65 72 6e 61 6c 00 .oxide.internal.\n0040: 00 21 00 01 00 00 29 04 d0 00 00 00 00 00 00 .!....)........ kind = dns peer_addr = [::1]:59918 req_id = 694a31e6-062c-4d99-932a-023ea71869f4
17652026-01-27T01:13:58.871ZDEBGtest_vpcs (dns): message_request kind = dns mr = MessageRequest {\n header: Header {\n id: 59131,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n queries: Queries {\n queries: [\n LowerQuery {\n name: LowerName(\n Name("_crucible-pantry._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_crucible-pantry._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n ],\n original: [\n 16,\n 95,\n 99,\n 114,\n 117,\n 99,\n 105,\n 98,\n 108,\n 101,\n 45,\n 112,\n 97,\n 110,\n 116,\n 114,\n 121,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n flags: EdnsFlags {\n dnssec_ok: false,\n z: 0,\n },\n max_payload: 1232,\n options: OPT {\n options: [],\n },\n },\n ),\n} peer_addr = [::1]:59918 req_id = 694a31e6-062c-4d99-932a-023ea71869f4
17662026-01-27T01:13:58.872ZDEBGtest_vpcs (store): query key key = _crucible-pantry._tcp
17672026-01-27T01:13:58.872ZDEBGtest_vpcs (store): query key key = e28e8b52-f93c-4d17-8434-be542f08e849.host
17682026-01-27T01:13:58.872ZDEBGtest_vpcs (dns): dns response additional_records = [Record { name_labels: Name("e28e8b52-f93c-4d17-8434-be542f08e849.host.control-plane.oxide.internal"), dns_class: IN, ttl: 0, rdata: AAAA(AAAA(::1)) }] kind = dns peer_addr = [::1]:59918 query = LowerQuery { name: LowerName(Name("_crucible-pantry._tcp.control-plane.oxide.internal.")), original: Query { name: Name("_crucible-pantry._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN } } records = [Record { name_labels: Name("_crucible-pantry._tcp.control-plane.oxide.internal."), dns_class: IN, ttl: 0, rdata: SRV(SRV { priority: 0, weight: 0, port: 35761, target: Name("e28e8b52-f93c-4d17-8434-be542f08e849.host.control-plane.oxide.internal") }) }] req_id = 694a31e6-062c-4d99-932a-023ea71869f4
17692026-01-27T01:13:58.873ZTRACtest_vpcs (dns): buffer buffer = Length: 108 (0x6c) bytes\n0000: 67 65 01 00 00 01 00 00 00 00 00 01 2d 64 65 6e ge..........-den\n0010: 64 72 69 74 65 2d 62 36 64 36 35 33 34 31 2d 31 drite-b6d65341-1\n0020: 36 37 63 2d 34 31 64 66 2d 39 62 35 63 2d 34 31 67c-41df-9b5c-41\n0030: 63 64 65 64 39 39 63 32 32 39 04 68 6f 73 74 0d cded99c229.host.\n0040: 63 6f 6e 74 72 6f 6c 2d 70 6c 61 6e 65 05 6f 78 control-plane.ox\n0050: 69 64 65 08 69 6e 74 65 72 6e 61 6c 00 00 1c 00 ide.internal....\n0060: 01 00 00 29 04 d0 00 00 00 00 00 00 ...)........ kind = dns peer_addr = [::1]:51555 req_id = 7e295b6b-69e1-48f0-b4f1-b57bd8d7b85f
17702026-01-27T01:13:58.873ZDEBGtest_vpcs (dns): message_request kind = dns mr = MessageRequest {\n header: Header {\n id: 26469,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n queries: Queries {\n queries: [\n LowerQuery {\n name: LowerName(\n Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."),\n query_type: AAAA,\n query_class: IN,\n },\n },\n ],\n original: [\n 45,\n 100,\n 101,\n 110,\n 100,\n 114,\n 105,\n 116,\n 101,\n 45,\n 98,\n 54,\n 100,\n 54,\n 53,\n 51,\n 52,\n 49,\n 45,\n 49,\n 54,\n 55,\n 99,\n 45,\n 52,\n 49,\n 100,\n 102,\n 45,\n 57,\n 98,\n 53,\n 99,\n 45,\n 52,\n 49,\n 99,\n 100,\n 101,\n 100,\n 57,\n 57,\n 99,\n 50,\n 50,\n 57,\n 4,\n 104,\n 111,\n 115,\n 116,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 28,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n flags: EdnsFlags {\n dnssec_ok: false,\n z: 0,\n },\n max_payload: 1232,\n options: OPT {\n options: [],\n },\n },\n ),\n} peer_addr = [::1]:51555 req_id = 7e295b6b-69e1-48f0-b4f1-b57bd8d7b85f
17712026-01-27T01:13:58.873ZDEBGtest_vpcs (store): query key key = dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host
17722026-01-27T01:13:58.873ZDEBGtest_vpcs (dns): dns response additional_records = [] kind = dns peer_addr = [::1]:51555 query = LowerQuery { name: LowerName(Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal.")), original: Query { name: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."), query_type: AAAA, query_class: IN } } records = [Record { name_labels: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."), dns_class: IN, ttl: 0, rdata: AAAA(AAAA(::1)) }] req_id = 7e295b6b-69e1-48f0-b4f1-b57bd8d7b85f
17732026-01-27T01:13:58.873ZTRACtest_vpcs (dns): buffer buffer = Length: 99 (0x63) bytes\n0000: e0 2b 01 00 00 01 00 00 00 00 00 01 24 62 36 64 .+..........$b6d\n0010: 36 35 33 34 31 2d 31 36 37 63 2d 34 31 64 66 2d 65341-167c-41df-\n0020: 39 62 35 63 2d 34 31 63 64 65 64 39 39 63 32 32 9b5c-41cded99c22\n0030: 39 04 73 6c 65 64 0d 63 6f 6e 74 72 6f 6c 2d 70 9.sled.control-p\n0040: 6c 61 6e 65 05 6f 78 69 64 65 08 69 6e 74 65 72 lane.oxide.inter\n0050: 6e 61 6c 00 00 1c 00 01 00 00 29 04 d0 00 00 00 nal.......).....\n0060: 00 00 00 ... kind = dns peer_addr = [::1]:57513 req_id = 78d5db2e-219c-4c80-9d46-b54163bd17ab
17742026-01-27T01:13:58.873ZDEBGtest_vpcs (dns): message_request kind = dns mr = MessageRequest {\n header: Header {\n id: 57387,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n queries: Queries {\n queries: [\n LowerQuery {\n name: LowerName(\n Name("b6d65341-167c-41df-9b5c-41cded99c229.sled.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("b6d65341-167c-41df-9b5c-41cded99c229.sled.control-plane.oxide.internal."),\n query_type: AAAA,\n query_class: IN,\n },\n },\n ],\n original: [\n 36,\n 98,\n 54,\n 100,\n 54,\n 53,\n 51,\n 52,\n 49,\n 45,\n 49,\n 54,\n 55,\n 99,\n 45,\n 52,\n 49,\n 100,\n 102,\n 45,\n 57,\n 98,\n 53,\n 99,\n 45,\n 52,\n 49,\n 99,\n 100,\n 101,\n 100,\n 57,\n 57,\n 99,\n 50,\n 50,\n 57,\n 4,\n 115,\n 108,\n 101,\n 100,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 28,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n flags: EdnsFlags {\n dnssec_ok: false,\n z: 0,\n },\n max_payload: 1232,\n options: OPT {\n options: [],\n },\n },\n ),\n} peer_addr = [::1]:57513 req_id = 78d5db2e-219c-4c80-9d46-b54163bd17ab
17752026-01-27T01:13:58.874ZDEBGtest_vpcs (store): query key key = b6d65341-167c-41df-9b5c-41cded99c229.sled
17762026-01-27T01:13:58.874ZDEBGtest_vpcs (dns): dns response additional_records = [] kind = dns peer_addr = [::1]:57513 query = LowerQuery { name: LowerName(Name("b6d65341-167c-41df-9b5c-41cded99c229.sled.control-plane.oxide.internal.")), original: Query { name: Name("b6d65341-167c-41df-9b5c-41cded99c229.sled.control-plane.oxide.internal."), query_type: AAAA, query_class: IN } } records = [Record { name_labels: Name("b6d65341-167c-41df-9b5c-41cded99c229.sled.control-plane.oxide.internal."), dns_class: IN, ttl: 0, rdata: AAAA(AAAA(::1)) }] req_id = 78d5db2e-219c-4c80-9d46-b54163bd17ab
17772026-01-27T01:13:58.874ZTRACtest_vpcs (dns): buffer buffer = Length: 99 (0x63) bytes\n0000: c5 39 01 00 00 01 00 00 00 00 00 01 24 65 32 38 .9..........$e28\n0010: 65 38 62 35 32 2d 66 39 33 63 2d 34 64 31 37 2d e8b52-f93c-4d17-\n0020: 38 34 33 34 2d 62 65 35 34 32 66 30 38 65 38 34 8434-be542f08e84\n0030: 39 04 68 6f 73 74 0d 63 6f 6e 74 72 6f 6c 2d 70 9.host.control-p\n0040: 6c 61 6e 65 05 6f 78 69 64 65 08 69 6e 74 65 72 lane.oxide.inter\n0050: 6e 61 6c 00 00 1c 00 01 00 00 29 04 d0 00 00 00 nal.......).....\n0060: 00 00 00 ... kind = dns peer_addr = [::1]:60277 req_id = 4c3ef69e-8efd-4939-8a10-e9ce5598193f
17782026-01-27T01:13:58.874ZDEBGtest_vpcs (dns): message_request kind = dns mr = MessageRequest {\n header: Header {\n id: 50489,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n queries: Queries {\n queries: [\n LowerQuery {\n name: LowerName(\n Name("e28e8b52-f93c-4d17-8434-be542f08e849.host.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("e28e8b52-f93c-4d17-8434-be542f08e849.host.control-plane.oxide.internal."),\n query_type: AAAA,\n query_class: IN,\n },\n },\n ],\n original: [\n 36,\n 101,\n 50,\n 56,\n 101,\n 56,\n 98,\n 53,\n 50,\n 45,\n 102,\n 57,\n 51,\n 99,\n 45,\n 52,\n 100,\n 49,\n 55,\n 45,\n 56,\n 52,\n 51,\n 52,\n 45,\n 98,\n 101,\n 53,\n 52,\n 50,\n 102,\n 48,\n 56,\n 101,\n 56,\n 52,\n 57,\n 4,\n 104,\n 111,\n 115,\n 116,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 28,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n flags: EdnsFlags {\n dnssec_ok: false,\n z: 0,\n },\n max_payload: 1232,\n options: OPT {\n options: [],\n },\n },\n ),\n} peer_addr = [::1]:60277 req_id = 4c3ef69e-8efd-4939-8a10-e9ce5598193f
17792026-01-27T01:13:58.874ZDEBGtest_vpcs (store): query key key = e28e8b52-f93c-4d17-8434-be542f08e849.host
17802026-01-27T01:13:58.874ZDEBGtest_vpcs (dns): dns response additional_records = [] kind = dns peer_addr = [::1]:60277 query = LowerQuery { name: LowerName(Name("e28e8b52-f93c-4d17-8434-be542f08e849.host.control-plane.oxide.internal.")), original: Query { name: Name("e28e8b52-f93c-4d17-8434-be542f08e849.host.control-plane.oxide.internal."), query_type: AAAA, query_class: IN } } records = [Record { name_labels: Name("e28e8b52-f93c-4d17-8434-be542f08e849.host.control-plane.oxide.internal."), dns_class: IN, ttl: 0, rdata: AAAA(AAAA(::1)) }] req_id = 4c3ef69e-8efd-4939-8a10-e9ce5598193f
17812026-01-27T01:13:58.939ZINFOtest_vpcs (dropshot): accepted connection kind = pantry local_addr = [::1]:35761 remote_addr = [::1]:33012 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
17822026-01-27T01:13:58.940ZDEBGtest_vpcs (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
17832026-01-27T01:13:58.946ZDEBGtest_vpcs (InternalApi): authorize result action = ModifyPolicy actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Fleet result = Ok(())
17842026-01-27T01:13:58.947ZTRACtest_vpcs (dropshot): incoming request kind = pantry local_addr = [::1]:35761 method = GET remote_addr = [::1]:33012 req_id = 158098b1-130c-419c-9eba-45a638a3f9bc sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/pantry/0
17852026-01-27T01:13:58.948ZINFOtest_vpcs (dropshot): request completed kind = pantry latency_us = 793 local_addr = [::1]:35761 method = GET remote_addr = [::1]:33012 req_id = 158098b1-130c-419c-9eba-45a638a3f9bc response_code = 200 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/pantry/0
17862026-01-27T01:13:59.567ZINFOtest_vpcs (dropshot): accepted connection kind = pantry local_addr = [::1]:35761 remote_addr = [::1]:32980 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
17872026-01-27T01:13:59.569ZINFOtest_vpcs (dropshot): accepted connection kind = pantry local_addr = [::1]:35761 remote_addr = [::1]:59830 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
17882026-01-27T01:13:59.569ZINFOtest_vpcs (dropshot): accepted connection kind = pantry local_addr = [::1]:35761 remote_addr = [::1]:46008 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
17892026-01-27T01:13:59.569ZINFOtest_vpcs (dropshot): accepted connection kind = pantry local_addr = [::1]:35761 remote_addr = [::1]:37906 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
17902026-01-27T01:13:59.569ZINFOtest_vpcs (dropshot): accepted connection kind = pantry local_addr = [::1]:35761 remote_addr = [::1]:42839 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
17912026-01-27T01:13:59.569ZINFOtest_vpcs (dropshot): accepted connection kind = pantry local_addr = [::1]:35761 remote_addr = [::1]:42388 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
17922026-01-27T01:13:59.569ZINFOtest_vpcs (dropshot): accepted connection kind = pantry local_addr = [::1]:35761 remote_addr = [::1]:48802 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
17932026-01-27T01:13:59.578ZTRACtest_vpcs (dropshot): incoming request kind = pantry local_addr = [::1]:35761 method = GET remote_addr = [::1]:32980 req_id = 6b249087-f481-46be-ab69-0f6c2e63ba9e sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/pantry/0
17942026-01-27T01:13:59.579ZTRACtest_vpcs (dropshot): incoming request kind = pantry local_addr = [::1]:35761 method = GET remote_addr = [::1]:59830 req_id = 80bf9197-860e-4a5d-a7dd-e9369281af37 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/pantry/0
17952026-01-27T01:13:59.579ZTRACtest_vpcs (dropshot): incoming request kind = pantry local_addr = [::1]:35761 method = GET remote_addr = [::1]:46008 req_id = 882a76c3-db3b-4b05-a98f-2efe63fa490d sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/pantry/0
17962026-01-27T01:13:59.579ZTRACtest_vpcs (dropshot): incoming request kind = pantry local_addr = [::1]:35761 method = GET remote_addr = [::1]:37906 req_id = 96d78615-ad2d-417a-a3f0-43a0f29c180b sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/pantry/0
17972026-01-27T01:13:59.579ZTRACtest_vpcs (dropshot): incoming request kind = pantry local_addr = [::1]:35761 method = GET remote_addr = [::1]:42839 req_id = 1841b55c-c952-4083-8f9e-0293d06f24b7 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/pantry/0
17982026-01-27T01:13:59.580ZTRACtest_vpcs (dropshot): incoming request kind = pantry local_addr = [::1]:35761 method = GET remote_addr = [::1]:42388 req_id = 8f5b38f3-340b-4594-84e0-1b7339bdb5cc sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/pantry/0
17992026-01-27T01:13:59.582ZTRACtest_vpcs (dropshot): incoming request kind = pantry local_addr = [::1]:35761 method = GET remote_addr = [::1]:48802 req_id = 957b4603-2e20-4316-90dc-9dce784ae0ae sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/pantry/0
18002026-01-27T01:13:59.582ZINFOtest_vpcs (dropshot): request completed kind = pantry latency_us = 4225 local_addr = [::1]:35761 method = GET remote_addr = [::1]:32980 req_id = 6b249087-f481-46be-ab69-0f6c2e63ba9e response_code = 200 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/pantry/0
18012026-01-27T01:13:59.582ZINFOtest_vpcs (dropshot): request completed kind = pantry latency_us = 3688 local_addr = [::1]:35761 method = GET remote_addr = [::1]:59830 req_id = 80bf9197-860e-4a5d-a7dd-e9369281af37 response_code = 200 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/pantry/0
18022026-01-27T01:13:59.582ZINFOtest_vpcs (dropshot): request completed kind = pantry latency_us = 3635 local_addr = [::1]:35761 method = GET remote_addr = [::1]:46008 req_id = 882a76c3-db3b-4b05-a98f-2efe63fa490d response_code = 200 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/pantry/0
18032026-01-27T01:13:59.582ZINFOtest_vpcs (dropshot): request completed kind = pantry latency_us = 3522 local_addr = [::1]:35761 method = GET remote_addr = [::1]:37906 req_id = 96d78615-ad2d-417a-a3f0-43a0f29c180b response_code = 200 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/pantry/0
18042026-01-27T01:13:59.583ZINFOtest_vpcs (dropshot): request completed kind = pantry latency_us = 3458 local_addr = [::1]:35761 method = GET remote_addr = [::1]:42839 req_id = 1841b55c-c952-4083-8f9e-0293d06f24b7 response_code = 200 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/pantry/0
18052026-01-27T01:13:59.583ZINFOtest_vpcs (dropshot): request completed kind = pantry latency_us = 2422 local_addr = [::1]:35761 method = GET remote_addr = [::1]:42388 req_id = 8f5b38f3-340b-4594-84e0-1b7339bdb5cc response_code = 200 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/pantry/0
18062026-01-27T01:13:59.583ZINFOtest_vpcs (dropshot): request completed kind = pantry latency_us = 1064 local_addr = [::1]:35761 method = GET remote_addr = [::1]:48802 req_id = 957b4603-2e20-4316-90dc-9dce784ae0ae response_code = 200 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/pantry/0
18072026-01-27T01:13:59.583ZTRACtest_vpcs (InternalApi): authorize begin action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = DnsConfig
18082026-01-27T01:13:59.584ZTRACtest_vpcs (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
18092026-01-27T01:13:59.584ZTRACtest_vpcs (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database
18102026-01-27T01:13:59.584ZDEBGtest_vpcs (InternalApi): roles roles = RoleSet { roles: {} }
18112026-01-27T01:13:59.585ZDEBGtest_vpcs (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database result = Ok(())
18122026-01-27T01:13:59.600ZDEBGtest_vpcs (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
18132026-01-27T01:13:59.610ZDEBGtest_vpcs (InternalApi): authorize result action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = DnsConfig result = Ok(())
18142026-01-27T01:13:59.610ZTRACtest_vpcs (InternalApi): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = DnsConfig
18152026-01-27T01:13:59.610ZTRACtest_vpcs (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
18162026-01-27T01:13:59.610ZTRACtest_vpcs (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database
18172026-01-27T01:13:59.610ZDEBGtest_vpcs (InternalApi): roles roles = RoleSet { roles: {} }
18182026-01-27T01:13:59.611ZDEBGtest_vpcs (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database result = Ok(())
18192026-01-27T01:13:59.626ZDEBGtest_vpcs (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
18202026-01-27T01:13:59.637ZDEBGtest_vpcs (InternalApi): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = DnsConfig result = Ok(())
18212026-01-27T01:13:59.644ZTRACtest_vpcs (InternalApi): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = DnsConfig
18222026-01-27T01:13:59.644ZTRACtest_vpcs (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
18232026-01-27T01:13:59.644ZTRACtest_vpcs (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database
18242026-01-27T01:13:59.644ZDEBGtest_vpcs (InternalApi): roles roles = RoleSet { roles: {} }
18252026-01-27T01:13:59.645ZDEBGtest_vpcs (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database result = Ok(())
18262026-01-27T01:13:59.654ZDEBGtest_vpcs (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
18272026-01-27T01:13:59.662ZDEBGtest_vpcs (InternalApi): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = DnsConfig result = Ok(())
18282026-01-27T01:13:59.681ZINFOtest_vpcs (InternalApi): Created recovery silo
18292026-01-27T01:13:59.684ZINFOtest_vpcs (InternalApi): Created recovery user
18302026-01-27T01:13:59.693ZINFOtest_vpcs (InternalApi): Created recovery user's password
18312026-01-27T01:13:59.693ZTRACtest_vpcs (InternalApi): authorize begin action = ModifyPolicy actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Silo { parent: Fleet, key: e5399c73-ca5a-4504-b823-4770433f29da, lookup_type: ById(e5399c73-ca5a-4504-b823-4770433f29da) }
18322026-01-27T01:13:59.694ZTRACtest_vpcs (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } resource_id = e5399c73-ca5a-4504-b823-4770433f29da resource_type = Silo
18332026-01-27T01:13:59.694ZTRACtest_vpcs (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database
18342026-01-27T01:13:59.694ZDEBGtest_vpcs (InternalApi): roles roles = RoleSet { roles: {} }
18352026-01-27T01:13:59.695ZDEBGtest_vpcs (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database result = Ok(())
18362026-01-27T01:13:59.701ZTRACtest_vpcs (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
18372026-01-27T01:13:59.701ZTRACtest_vpcs (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database
18382026-01-27T01:13:59.701ZDEBGtest_vpcs (InternalApi): roles roles = RoleSet { roles: {} }
18392026-01-27T01:13:59.703ZDEBGtest_vpcs (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database result = Ok(())
18402026-01-27T01:13:59.706ZDEBGtest_vpcs (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
18412026-01-27T01:13:59.710ZDEBGtest_vpcs (InternalApi): authorize result action = ModifyPolicy actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Silo { parent: Fleet, key: e5399c73-ca5a-4504-b823-4770433f29da, lookup_type: ById(e5399c73-ca5a-4504-b823-4770433f29da) } result = Ok(())
18422026-01-27T01:13:59.710ZDEBGtest_vpcs (InternalApi): Generated role assignment queries
18432026-01-27T01:13:59.715ZINFOtest_vpcs (InternalApi): Granted Silo privileges
18442026-01-27T01:13:59.715ZTRACtest_vpcs (InternalApi): authorize begin action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Fleet
18452026-01-27T01:13:59.715ZTRACtest_vpcs (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
18462026-01-27T01:13:59.715ZTRACtest_vpcs (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database
18472026-01-27T01:13:59.715ZDEBGtest_vpcs (InternalApi): roles roles = RoleSet { roles: {} }
18482026-01-27T01:13:59.716ZDEBGtest_vpcs (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database result = Ok(())
18492026-01-27T01:13:59.720ZDEBGtest_vpcs (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
18502026-01-27T01:13:59.725ZDEBGtest_vpcs (InternalApi): authorize result action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Fleet result = Ok(())
18512026-01-27T01:13:59.740ZTRACtest_vpcs (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database
18522026-01-27T01:13:59.740ZDEBGtest_vpcs (InternalApi): roles roles = RoleSet { roles: {} }
18532026-01-27T01:13:59.741ZDEBGtest_vpcs (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database result = Ok(())
18542026-01-27T01:13:59.745ZTRACtest_vpcs (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database
18552026-01-27T01:13:59.745ZDEBGtest_vpcs (InternalApi): roles roles = RoleSet { roles: {} }
18562026-01-27T01:13:59.747ZDEBGtest_vpcs (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database result = Ok(())
18572026-01-27T01:13:59.770ZTRACtest_vpcs (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database
18582026-01-27T01:13:59.770ZDEBGtest_vpcs (InternalApi): roles roles = RoleSet { roles: {} }
18592026-01-27T01:13:59.781ZDEBGtest_vpcs (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database result = Ok(())
18602026-01-27T01:13:59.788ZTRACtest_vpcs (InternalApi): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
18612026-01-27T01:13:59.788ZTRACtest_vpcs (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
18622026-01-27T01:13:59.788ZTRACtest_vpcs (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database
18632026-01-27T01:13:59.788ZDEBGtest_vpcs (InternalApi): roles roles = RoleSet { roles: {} }
18642026-01-27T01:13:59.789ZDEBGtest_vpcs (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database result = Ok(())
18652026-01-27T01:13:59.794ZTRACtest_vpcs (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
18662026-01-27T01:13:59.794ZTRACtest_vpcs (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database
18672026-01-27T01:13:59.794ZDEBGtest_vpcs (InternalApi): roles roles = RoleSet { roles: {} }
18682026-01-27T01:13:59.795ZDEBGtest_vpcs (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database result = Ok(())
18692026-01-27T01:13:59.803ZTRACtest_vpcs (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
18702026-01-27T01:13:59.804ZTRACtest_vpcs (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database
18712026-01-27T01:13:59.804ZDEBGtest_vpcs (InternalApi): roles roles = RoleSet { roles: {} }
18722026-01-27T01:13:59.805ZDEBGtest_vpcs (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database result = Ok(())
18732026-01-27T01:13:59.812ZDEBGtest_vpcs (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
18742026-01-27T01:13:59.824ZDEBGtest_vpcs (InternalApi): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) } result = Ok(())
18752026-01-27T01:13:59.825ZTRACtest_vpcs (InternalApi): successful lookup of siloed resource "Vpc" using built-in user
18762026-01-27T01:13:59.825ZTRACtest_vpcs (InternalApi): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
18772026-01-27T01:13:59.825ZTRACtest_vpcs (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
18782026-01-27T01:13:59.825ZTRACtest_vpcs (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database
18792026-01-27T01:13:59.825ZDEBGtest_vpcs (InternalApi): roles roles = RoleSet { roles: {} }
18802026-01-27T01:13:59.827ZDEBGtest_vpcs (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database result = Ok(())
18812026-01-27T01:13:59.831ZTRACtest_vpcs (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
18822026-01-27T01:13:59.831ZTRACtest_vpcs (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database
18832026-01-27T01:13:59.831ZDEBGtest_vpcs (InternalApi): roles roles = RoleSet { roles: {} }
18842026-01-27T01:13:59.832ZDEBGtest_vpcs (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database result = Ok(())
18852026-01-27T01:13:59.837ZTRACtest_vpcs (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
18862026-01-27T01:13:59.837ZTRACtest_vpcs (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database
18872026-01-27T01:13:59.837ZDEBGtest_vpcs (InternalApi): roles roles = RoleSet { roles: {} }
18882026-01-27T01:13:59.838ZDEBGtest_vpcs (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database result = Ok(())
18892026-01-27T01:13:59.845ZDEBGtest_vpcs (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
18902026-01-27T01:13:59.857ZDEBGtest_vpcs (InternalApi): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) } result = Ok(())
18912026-01-27T01:13:59.857ZTRACtest_vpcs (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database
18922026-01-27T01:13:59.857ZDEBGtest_vpcs (InternalApi): roles roles = RoleSet { roles: {} }
18932026-01-27T01:13:59.858ZDEBGtest_vpcs (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database result = Ok(())
18942026-01-27T01:13:59.864ZTRACtest_vpcs (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database
18952026-01-27T01:13:59.864ZDEBGtest_vpcs (InternalApi): roles roles = RoleSet { roles: {} }
18962026-01-27T01:13:59.865ZDEBGtest_vpcs (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database result = Ok(())
18972026-01-27T01:13:59.870ZTRACtest_vpcs (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database
18982026-01-27T01:13:59.870ZDEBGtest_vpcs (InternalApi): roles roles = RoleSet { roles: {} }
18992026-01-27T01:13:59.871ZDEBGtest_vpcs (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database result = Ok(())
19002026-01-27T01:13:59.877ZTRACtest_vpcs (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database
19012026-01-27T01:13:59.877ZDEBGtest_vpcs (InternalApi): roles roles = RoleSet { roles: {} }
19022026-01-27T01:13:59.878ZDEBGtest_vpcs (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database result = Ok(())
19032026-01-27T01:13:59.882ZTRACtest_vpcs (InternalApi): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
19042026-01-27T01:13:59.882ZTRACtest_vpcs (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
19052026-01-27T01:13:59.882ZTRACtest_vpcs (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database
19062026-01-27T01:13:59.882ZDEBGtest_vpcs (InternalApi): roles roles = RoleSet { roles: {} }
19072026-01-27T01:13:59.883ZDEBGtest_vpcs (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database result = Ok(())
19082026-01-27T01:13:59.887ZTRACtest_vpcs (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
19092026-01-27T01:13:59.887ZTRACtest_vpcs (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database
19102026-01-27T01:13:59.887ZDEBGtest_vpcs (InternalApi): roles roles = RoleSet { roles: {} }
19112026-01-27T01:13:59.888ZDEBGtest_vpcs (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database result = Ok(())
19122026-01-27T01:13:59.891ZTRACtest_vpcs (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
19132026-01-27T01:13:59.892ZTRACtest_vpcs (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database
19142026-01-27T01:13:59.892ZDEBGtest_vpcs (InternalApi): roles roles = RoleSet { roles: {} }
19152026-01-27T01:13:59.893ZDEBGtest_vpcs (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database result = Ok(())
19162026-01-27T01:13:59.898ZDEBGtest_vpcs (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
19172026-01-27T01:13:59.908ZDEBGtest_vpcs (InternalApi): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) } result = Ok(())
19182026-01-27T01:13:59.908ZTRACtest_vpcs (InternalApi): successful lookup of siloed resource "Vpc" using built-in user
19192026-01-27T01:13:59.909ZTRACtest_vpcs (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database
19202026-01-27T01:13:59.909ZDEBGtest_vpcs (InternalApi): roles roles = RoleSet { roles: {} }
19212026-01-27T01:13:59.911ZDEBGtest_vpcs (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database result = Ok(())
19222026-01-27T01:13:59.916ZTRACtest_vpcs (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database
19232026-01-27T01:13:59.916ZDEBGtest_vpcs (InternalApi): roles roles = RoleSet { roles: {} }
19242026-01-27T01:13:59.917ZDEBGtest_vpcs (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database result = Ok(())
19252026-01-27T01:13:59.921ZTRACtest_vpcs (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database
19262026-01-27T01:13:59.921ZDEBGtest_vpcs (InternalApi): roles roles = RoleSet { roles: {} }
19272026-01-27T01:13:59.922ZDEBGtest_vpcs (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database result = Ok(())
19282026-01-27T01:13:59.927ZTRACtest_vpcs (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database
19292026-01-27T01:13:59.927ZDEBGtest_vpcs (InternalApi): roles roles = RoleSet { roles: {} }
19302026-01-27T01:13:59.928ZDEBGtest_vpcs (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database result = Ok(())
19312026-01-27T01:13:59.937ZTRACtest_vpcs (InternalApi): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000001, lookup_type: ByName("external-dns") }
19322026-01-27T01:13:59.937ZTRACtest_vpcs (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
19332026-01-27T01:13:59.937ZTRACtest_vpcs (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database
19342026-01-27T01:13:59.938ZDEBGtest_vpcs (InternalApi): roles roles = RoleSet { roles: {} }
19352026-01-27T01:13:59.938ZDEBGtest_vpcs (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database result = Ok(())
19362026-01-27T01:13:59.944ZTRACtest_vpcs (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
19372026-01-27T01:13:59.944ZTRACtest_vpcs (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database
19382026-01-27T01:13:59.944ZDEBGtest_vpcs (InternalApi): roles roles = RoleSet { roles: {} }
19392026-01-27T01:13:59.944ZDEBGtest_vpcs (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database result = Ok(())
19402026-01-27T01:13:59.949ZTRACtest_vpcs (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
19412026-01-27T01:13:59.949ZTRACtest_vpcs (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database
19422026-01-27T01:13:59.949ZDEBGtest_vpcs (InternalApi): roles roles = RoleSet { roles: {} }
19432026-01-27T01:13:59.950ZDEBGtest_vpcs (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database result = Ok(())
19442026-01-27T01:13:59.954ZDEBGtest_vpcs (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
19452026-01-27T01:13:59.971ZDEBGtest_vpcs (InternalApi): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000001, lookup_type: ByName("external-dns") } result = Ok(())
19462026-01-27T01:13:59.971ZTRACtest_vpcs (InternalApi): successful lookup of siloed resource "VpcSubnet" using built-in user
19472026-01-27T01:13:59.971ZTRACtest_vpcs (InternalApi): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000001, lookup_type: ByName("external-dns") }
19482026-01-27T01:13:59.971ZTRACtest_vpcs (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
19492026-01-27T01:13:59.971ZTRACtest_vpcs (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database
19502026-01-27T01:13:59.971ZDEBGtest_vpcs (InternalApi): roles roles = RoleSet { roles: {} }
19512026-01-27T01:13:59.972ZDEBGtest_vpcs (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database result = Ok(())
19522026-01-27T01:13:59.977ZTRACtest_vpcs (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
19532026-01-27T01:13:59.977ZTRACtest_vpcs (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database
19542026-01-27T01:13:59.977ZDEBGtest_vpcs (InternalApi): roles roles = RoleSet { roles: {} }
19552026-01-27T01:13:59.979ZDEBGtest_vpcs (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database result = Ok(())
19562026-01-27T01:13:59.984ZTRACtest_vpcs (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
19572026-01-27T01:13:59.984ZTRACtest_vpcs (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database
19582026-01-27T01:13:59.984ZDEBGtest_vpcs (InternalApi): roles roles = RoleSet { roles: {} }
19592026-01-27T01:13:59.986ZDEBGtest_vpcs (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database result = Ok(())
19602026-01-27T01:13:59.992ZDEBGtest_vpcs (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
19612026-01-27T01:14:00.006ZDEBGtest_vpcs (InternalApi): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000001, lookup_type: ByName("external-dns") } result = Ok(())
19622026-01-27T01:14:00.006ZTRACtest_vpcs (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database
19632026-01-27T01:14:00.006ZDEBGtest_vpcs (InternalApi): roles roles = RoleSet { roles: {} }
19642026-01-27T01:14:00.008ZDEBGtest_vpcs (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database result = Ok(())
19652026-01-27T01:14:00.018ZTRACtest_vpcs (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database
19662026-01-27T01:14:00.018ZDEBGtest_vpcs (InternalApi): roles roles = RoleSet { roles: {} }
19672026-01-27T01:14:00.019ZDEBGtest_vpcs (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database result = Ok(())
19682026-01-27T01:14:00.023ZTRACtest_vpcs (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database
19692026-01-27T01:14:00.023ZDEBGtest_vpcs (InternalApi): roles roles = RoleSet { roles: {} }
19702026-01-27T01:14:00.024ZDEBGtest_vpcs (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database result = Ok(())
19712026-01-27T01:14:00.028ZTRACtest_vpcs (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database
19722026-01-27T01:14:00.028ZDEBGtest_vpcs (InternalApi): roles roles = RoleSet { roles: {} }
19732026-01-27T01:14:00.029ZDEBGtest_vpcs (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database result = Ok(())
19742026-01-27T01:14:00.033ZTRACtest_vpcs (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database
19752026-01-27T01:14:00.034ZDEBGtest_vpcs (InternalApi): roles roles = RoleSet { roles: {} }
19762026-01-27T01:14:00.034ZDEBGtest_vpcs (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database result = Ok(())
19772026-01-27T01:14:00.038ZTRACtest_vpcs (InternalApi): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000002, lookup_type: ByName("nexus") }
19782026-01-27T01:14:00.038ZTRACtest_vpcs (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
19792026-01-27T01:14:00.038ZTRACtest_vpcs (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database
19802026-01-27T01:14:00.038ZDEBGtest_vpcs (InternalApi): roles roles = RoleSet { roles: {} }
19812026-01-27T01:14:00.039ZDEBGtest_vpcs (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database result = Ok(())
19822026-01-27T01:14:00.042ZTRACtest_vpcs (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
19832026-01-27T01:14:00.042ZTRACtest_vpcs (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database
19842026-01-27T01:14:00.042ZDEBGtest_vpcs (InternalApi): roles roles = RoleSet { roles: {} }
19852026-01-27T01:14:00.043ZDEBGtest_vpcs (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database result = Ok(())
19862026-01-27T01:14:00.046ZTRACtest_vpcs (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
19872026-01-27T01:14:00.046ZTRACtest_vpcs (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database
19882026-01-27T01:14:00.047ZDEBGtest_vpcs (InternalApi): roles roles = RoleSet { roles: {} }
19892026-01-27T01:14:00.047ZDEBGtest_vpcs (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database result = Ok(())
19902026-01-27T01:14:00.052ZDEBGtest_vpcs (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
19912026-01-27T01:14:00.065ZDEBGtest_vpcs (InternalApi): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000002, lookup_type: ByName("nexus") } result = Ok(())
19922026-01-27T01:14:00.065ZTRACtest_vpcs (InternalApi): successful lookup of siloed resource "VpcSubnet" using built-in user
19932026-01-27T01:14:00.065ZTRACtest_vpcs (InternalApi): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000002, lookup_type: ByName("nexus") }
19942026-01-27T01:14:00.065ZTRACtest_vpcs (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
19952026-01-27T01:14:00.065ZTRACtest_vpcs (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database
19962026-01-27T01:14:00.065ZDEBGtest_vpcs (InternalApi): roles roles = RoleSet { roles: {} }
19972026-01-27T01:14:00.066ZDEBGtest_vpcs (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database result = Ok(())
19982026-01-27T01:14:00.070ZTRACtest_vpcs (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
19992026-01-27T01:14:00.070ZTRACtest_vpcs (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database
20002026-01-27T01:14:00.070ZDEBGtest_vpcs (InternalApi): roles roles = RoleSet { roles: {} }
20012026-01-27T01:14:00.071ZDEBGtest_vpcs (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database result = Ok(())
20022026-01-27T01:14:00.075ZTRACtest_vpcs (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
20032026-01-27T01:14:00.075ZTRACtest_vpcs (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database
20042026-01-27T01:14:00.075ZDEBGtest_vpcs (InternalApi): roles roles = RoleSet { roles: {} }
20052026-01-27T01:14:00.076ZDEBGtest_vpcs (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database result = Ok(())
20062026-01-27T01:14:00.080ZDEBGtest_vpcs (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
20072026-01-27T01:14:00.097ZDEBGtest_vpcs (InternalApi): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000002, lookup_type: ByName("nexus") } result = Ok(())
20082026-01-27T01:14:00.097ZTRACtest_vpcs (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database
20092026-01-27T01:14:00.097ZDEBGtest_vpcs (InternalApi): roles roles = RoleSet { roles: {} }
20102026-01-27T01:14:00.098ZDEBGtest_vpcs (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database result = Ok(())
20112026-01-27T01:14:00.107ZDEBGtest_vpcs (nexus): resolved names for firewall rules instance_interfaces = {} subnet_interfaces = {Name("external-dns"): [NetworkInterface { id: 47a89b77-3b91-469f-95b1-f4d29dbf1a52, kind: Service { id: 326b5e01-f8e6-4763-80e1-2d51b531f7e2 }, name: Name("external-dns-326b5e01-f8e6-4763-80e1-2d51b531f7e2"), ip_config: V6(PrivateIpv6Config { ip: fd77:e9d2:9cd9:1::6, subnet: Ipv6Net { addr: fd77:e9d2:9cd9:1::, width: 64 }, transit_ips: [] }), mac: MacAddr(MacAddr6([168, 64, 37, 255, 128, 0])), vni: Vni(100), primary: true, slot: 0 }], Name("nexus"): [NetworkInterface { id: 82c3c615-0929-4977-b0aa-1e7826847b55, kind: Service { id: 913233fe-92a8-4635-9572-183f495429c4 }, name: Name("nexus-913233fe-92a8-4635-9572-183f495429c4"), ip_config: V4(PrivateIpv4Config { ip: 172.30.2.6, subnet: Ipv4Net { addr: 172.30.2.0, width: 24 }, transit_ips: [] }), mac: MacAddr(MacAddr6([168, 64, 37, 255, 128, 1])), vni: Vni(100), primary: true, slot: 0 }]} subnet_networks = {Name("external-dns"): [V4(Ipv4Network { addr: 172.30.1.0, prefix: 24 }), V6(Ipv6Network { addr: fd77:e9d2:9cd9:1::, prefix: 64 })], Name("nexus"): [V4(Ipv4Network { addr: 172.30.2.0, prefix: 24 }), V6(Ipv6Network { addr: fd77:e9d2:9cd9:2::, prefix: 64 })]} vpc_interfaces = {}
20122026-01-27T01:14:00.107ZTRACtest_vpcs (InternalApi): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Fleet
20132026-01-27T01:14:00.107ZTRACtest_vpcs (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
20142026-01-27T01:14:00.107ZTRACtest_vpcs (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database
20152026-01-27T01:14:00.107ZDEBGtest_vpcs (InternalApi): roles roles = RoleSet { roles: {} }
20162026-01-27T01:14:00.108ZDEBGtest_vpcs (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database result = Ok(())
20172026-01-27T01:14:00.112ZDEBGtest_vpcs (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
20182026-01-27T01:14:00.118ZDEBGtest_vpcs (InternalApi): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Fleet result = Ok(())
20192026-01-27T01:14:00.119ZTRACtest_vpcs (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database
20202026-01-27T01:14:00.119ZDEBGtest_vpcs (InternalApi): roles roles = RoleSet { roles: {} }
20212026-01-27T01:14:00.119ZDEBGtest_vpcs (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database result = Ok(())
20222026-01-27T01:14:00.123ZTRACtest_vpcs (nexus): fetched allowlist from DB allowed = AllowList { id: 001de000-a110-4000-8000-000000000000, time_created: 2026-01-26T23:16:37.697587Z, time_modified: 2026-01-27T01:13:59.725232Z, allowed_ips: None }
20232026-01-27T01:14:00.123ZDEBGtest_vpcs (nexus): Allowlist for user-facing services is set to allow any inbound traffic. Existing VPC firewall rules will not be modified.
20242026-01-27T01:14:00.123ZDEBGtest_vpcs (nexus): resolved firewall rules for sled agents sled_agent_rules = [ResolvedVpcFirewallRule { status: Enabled, direction: Inbound, targets: [NetworkInterface { id: 47a89b77-3b91-469f-95b1-f4d29dbf1a52, kind: Service { id: 326b5e01-f8e6-4763-80e1-2d51b531f7e2 }, name: Name("external-dns-326b5e01-f8e6-4763-80e1-2d51b531f7e2"), ip_config: V6(PrivateIpv6Config { ip: fd77:e9d2:9cd9:1::6, subnet: Ipv6Net { addr: fd77:e9d2:9cd9:1::, width: 64 }, transit_ips: [] }), mac: MacAddr(MacAddr6([168, 64, 37, 255, 128, 0])), vni: Vni(100), primary: true, slot: 0 }], filter_hosts: None, filter_ports: Some([L4PortRange { first: L4Port(53), last: L4Port(53) }]), filter_protocols: Some([Udp]), action: Allow, priority: VpcFirewallRulePriority(65534) }, ResolvedVpcFirewallRule { status: Enabled, direction: Inbound, targets: [NetworkInterface { id: 82c3c615-0929-4977-b0aa-1e7826847b55, kind: Service { id: 913233fe-92a8-4635-9572-183f495429c4 }, name: Name("nexus-913233fe-92a8-4635-9572-183f495429c4"), ip_config: V4(PrivateIpv4Config { ip: 172.30.2.6, subnet: Ipv4Net { addr: 172.30.2.0, width: 24 }, transit_ips: [] }), mac: MacAddr(MacAddr6([168, 64, 37, 255, 128, 1])), vni: Vni(100), primary: true, slot: 0 }, NetworkInterface { id: 47a89b77-3b91-469f-95b1-f4d29dbf1a52, kind: Service { id: 326b5e01-f8e6-4763-80e1-2d51b531f7e2 }, name: Name("external-dns-326b5e01-f8e6-4763-80e1-2d51b531f7e2"), ip_config: V6(PrivateIpv6Config { ip: fd77:e9d2:9cd9:1::6, subnet: Ipv6Net { addr: fd77:e9d2:9cd9:1::, width: 64 }, transit_ips: [] }), mac: MacAddr(MacAddr6([168, 64, 37, 255, 128, 0])), vni: Vni(100), primary: true, slot: 0 }], filter_hosts: None, filter_ports: None, filter_protocols: Some([Icmp(Some(VpcFirewallIcmpFilter { icmp_type: 3, code: Some(IcmpParamRange { first: 3, last: 4 }) })), Icmp(Some(VpcFirewallIcmpFilter { icmp_type: 5, code: None })), Icmp(Some(VpcFirewallIcmpFilter { icmp_type: 11, code: None }))]), action: Allow, priority: VpcFirewallRulePriority(65534) }, ResolvedVpcFirewallRule { status: Enabled, direction: Inbound, targets: [NetworkInterface { id: 82c3c615-0929-4977-b0aa-1e7826847b55, kind: Service { id: 913233fe-92a8-4635-9572-183f495429c4 }, name: Name("nexus-913233fe-92a8-4635-9572-183f495429c4"), ip_config: V4(PrivateIpv4Config { ip: 172.30.2.6, subnet: Ipv4Net { addr: 172.30.2.0, width: 24 }, transit_ips: [] }), mac: MacAddr(MacAddr6([168, 64, 37, 255, 128, 1])), vni: Vni(100), primary: true, slot: 0 }], filter_hosts: None, filter_ports: Some([L4PortRange { first: L4Port(80), last: L4Port(80) }, L4PortRange { first: L4Port(443), last: L4Port(443) }]), filter_protocols: Some([Tcp]), action: Allow, priority: VpcFirewallRulePriority(65534) }]
20252026-01-27T01:14:00.123ZDEBGtest_vpcs (nexus): resolved 3 rules for sleds
20262026-01-27T01:14:00.147ZDEBGtest_vpcs (nexus): resolved sleds for vpc oxide-services vpc_to_sled = [Sled { identity: SledIdentity { id: b6d65341-167c-41df-9b5c-41cded99c229 (sled), time_created: 2026-01-27T01:13:52.435851Z, time_modified: 2026-01-27T01:13:52.435851Z }, time_deleted: None, rcgen: Generation(Generation(1)), rack_id: c19a698f-c6f9-4a17-ae30-20d711b8f7dc, is_scrimlet: true, serial_number: "SimGimlet00", part_number: "i86pc", revision: SqlU32(3), usable_hardware_threads: SqlU32(16), usable_physical_ram: ByteCount(ByteCount(34359738368)), reservoir_size: ByteCount(ByteCount(17179869184)), ip: ::1, port: SqlU16(59842), last_used_address: ::ffff, policy: InService, state: Active, sled_agent_gen: Generation(Generation(1)), repo_depot_port: SqlU16(50229), cpu_family: AmdMilan }]
20272026-01-27T01:14:00.147ZDEBGtest_vpcs (nexus): sending firewall rules to sled agents
20282026-01-27T01:14:00.217ZTRACtest_vpcs (InstanceAllocator): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead (built_in_user), .. }) resource = Database
20292026-01-27T01:14:00.217ZDEBGtest_vpcs (InstanceAllocator): roles roles = RoleSet { roles: {} }
20302026-01-27T01:14:00.218ZDEBGtest_vpcs (InstanceAllocator): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead (built_in_user), .. }) resource = Database result = Ok(())
20312026-01-27T01:14:00.225ZTRACtest_vpcs (InstanceAllocator): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead (built_in_user), .. }) resource = Sled { parent: Fleet, key: b6d65341-167c-41df-9b5c-41cded99c229 (sled), lookup_type: ById(b6d65341-167c-41df-9b5c-41cded99c229) }
20322026-01-27T01:14:00.225ZTRACtest_vpcs (InstanceAllocator): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead (built_in_user), .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
20332026-01-27T01:14:00.225ZTRACtest_vpcs (InstanceAllocator): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead (built_in_user), .. }) resource = Database
20342026-01-27T01:14:00.225ZDEBGtest_vpcs (InstanceAllocator): roles roles = RoleSet { roles: {} }
20352026-01-27T01:14:00.227ZDEBGtest_vpcs (InstanceAllocator): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead (built_in_user), .. }) resource = Database result = Ok(())
20362026-01-27T01:14:00.230ZDEBGtest_vpcs (InstanceAllocator): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "viewer")} }
20372026-01-27T01:14:00.236ZDEBGtest_vpcs (InstanceAllocator): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead (built_in_user), .. }) resource = Sled { parent: Fleet, key: b6d65341-167c-41df-9b5c-41cded99c229 (sled), lookup_type: ById(b6d65341-167c-41df-9b5c-41cded99c229) } result = Ok(())
20382026-01-27T01:14:00.236ZDEBGtest_vpcs (nexus): client request SledAgent = b6d65341-167c-41df-9b5c-41cded99c229 body = Some(Body) method = PUT uri = http://[::1]:59842/vpc/001de000-074c-4000-8000-000000000000/firewall/rules
20392026-01-27T01:14:00.238ZINFOtest_vpcs (dropshot): accepted connection local_addr = [::1]:59842 remote_addr = [::1]:60896 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
20402026-01-27T01:14:00.240ZTRACtest_vpcs (dropshot): incoming request local_addr = [::1]:59842 method = PUT remote_addr = [::1]:60896 req_id = f04f8a7c-111d-4aa3-9f54-437280c4a4b8 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /vpc/001de000-074c-4000-8000-000000000000/firewall/rules
20412026-01-27T01:14:00.240ZDEBGtest_vpcs (dropshot): determined request API version local_addr = [::1]:59842 method = PUT remote_addr = [::1]:60896 req_id = f04f8a7c-111d-4aa3-9f54-437280c4a4b8 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /vpc/001de000-074c-4000-8000-000000000000/firewall/rules version = 15.0.0
20422026-01-27T01:14:00.243ZINFOtest_vpcs (dropshot): request completed latency_us = 3304 local_addr = [::1]:59842 method = PUT remote_addr = [::1]:60896 req_id = f04f8a7c-111d-4aa3-9f54-437280c4a4b8 response_code = 204 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /vpc/001de000-074c-4000-8000-000000000000/firewall/rules
20432026-01-27T01:14:00.243ZDEBGtest_vpcs (nexus): client response SledAgent = b6d65341-167c-41df-9b5c-41cded99c229 result = Ok(Response { url: "http://[::1]:59842/vpc/001de000-074c-4000-8000-000000000000/firewall/rules", status: 204, headers: {"x-request-id": "f04f8a7c-111d-4aa3-9f54-437280c4a4b8", "date": "Tue, 27 Jan 2026 01:14:00 GMT"} })
20442026-01-27T01:14:00.246ZINFOtest_vpcs (nexus): updated firewall rules on 1 sleds
20452026-01-27T01:14:00.246ZDEBGtest_vpcs (BackgroundTasks): activating background_task = dns_config_internal dns_group = internal iteration = 2 reason = Signaled
20462026-01-27T01:14:00.246ZDEBGtest_vpcs (BackgroundTasks): reading DNS version background_task = dns_config_internal dns_group = internal
20472026-01-27T01:14:00.246ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = dns_config_internal dns_group = internal resource = Database
20482026-01-27T01:14:00.246ZDEBGtest_vpcs (BackgroundTasks): roles background_task = dns_config_internal dns_group = internal roles = RoleSet { roles: {} }
20492026-01-27T01:14:00.247ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = dns_config_internal dns_group = internal resource = Database result = Ok(())
20502026-01-27T01:14:00.248ZDEBGtest_vpcs (BackgroundTasks): activating background_task = dns_servers_internal dns_group = internal iteration = 2 reason = Signaled
20512026-01-27T01:14:00.248ZTRACtest_vpcs (DnsResolver): lookup_all_socket_v6 srv dns_name = _nameservice._tcp.control-plane.oxide.internal
20522026-01-27T01:14:00.249ZDEBGtest_vpcs (BackgroundTasks): activating background_task = dns_config_external dns_group = external iteration = 2 reason = Signaled
20532026-01-27T01:14:00.249ZDEBGtest_vpcs (BackgroundTasks): reading DNS version background_task = dns_config_external dns_group = external
20542026-01-27T01:14:00.249ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = dns_config_external dns_group = external resource = Database
20552026-01-27T01:14:00.249ZDEBGtest_vpcs (BackgroundTasks): roles background_task = dns_config_external dns_group = external roles = RoleSet { roles: {} }
20562026-01-27T01:14:00.250ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = dns_config_external dns_group = external resource = Database result = Ok(())
20572026-01-27T01:14:00.251ZDEBGtest_vpcs (BackgroundTasks): activating background_task = dns_servers_external dns_group = external iteration = 2 reason = Signaled
20582026-01-27T01:14:00.251ZTRACtest_vpcs (DnsResolver): lookup_all_socket_v6 srv dns_name = _external-dns._tcp.control-plane.oxide.internal
20592026-01-27T01:14:00.251ZDEBGtest_vpcs (BackgroundTasks): activating background_task = external_endpoints iteration = 2 reason = Signaled
20602026-01-27T01:14:00.252ZTRACtest_vpcs (BackgroundTasks): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = external_endpoints resource = Fleet
20612026-01-27T01:14:00.252ZTRACtest_vpcs (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } background_task = external_endpoints resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
20622026-01-27T01:14:00.252ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = external_endpoints resource = Database
20632026-01-27T01:14:00.252ZDEBGtest_vpcs (BackgroundTasks): roles background_task = external_endpoints roles = RoleSet { roles: {} }
20642026-01-27T01:14:00.253ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = external_endpoints resource = Database result = Ok(())
20652026-01-27T01:14:00.254ZDEBGtest_vpcs (BackgroundTasks): activating background_task = inventory_collection iteration = 3 reason = Signaled
20662026-01-27T01:14:00.254ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = inventory_collection resource = Inventory
20672026-01-27T01:14:00.254ZTRACtest_vpcs (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } background_task = inventory_collection resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
20682026-01-27T01:14:00.254ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = inventory_collection resource = Database
20692026-01-27T01:14:00.254ZDEBGtest_vpcs (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {} }
20702026-01-27T01:14:00.255ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = inventory_collection resource = Database result = Ok(())
20712026-01-27T01:14:00.256ZDEBGtest_vpcs (BackgroundTasks): activating background_task = blueprint_loader iteration = 2 reason = Signaled
20722026-01-27T01:14:00.256ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = blueprint_loader resource = BlueprintConfig
20732026-01-27T01:14:00.256ZTRACtest_vpcs (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } background_task = blueprint_loader resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
20742026-01-27T01:14:00.257ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = blueprint_loader resource = Database
20752026-01-27T01:14:00.257ZDEBGtest_vpcs (BackgroundTasks): roles background_task = blueprint_loader roles = RoleSet { roles: {} }
20762026-01-27T01:14:00.257ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = blueprint_loader resource = Database result = Ok(())
20772026-01-27T01:14:00.259ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = dns_config_internal dns_group = internal resource = DnsConfig
20782026-01-27T01:14:00.260ZTRACtest_vpcs (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } background_task = dns_config_internal dns_group = internal resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
20792026-01-27T01:14:00.260ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = dns_config_internal dns_group = internal resource = Database
20802026-01-27T01:14:00.261ZDEBGtest_vpcs (BackgroundTasks): roles background_task = dns_config_internal dns_group = internal roles = RoleSet { roles: {} }
20812026-01-27T01:14:00.262ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = dns_config_internal dns_group = internal resource = Database result = Ok(())
20822026-01-27T01:14:00.264ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = dns_config_external dns_group = external resource = DnsConfig
20832026-01-27T01:14:00.264ZTRACtest_vpcs (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } background_task = dns_config_external dns_group = external resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
20842026-01-27T01:14:00.264ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = dns_config_external dns_group = external resource = Database
20852026-01-27T01:14:00.264ZDEBGtest_vpcs (BackgroundTasks): roles background_task = dns_config_external dns_group = external roles = RoleSet { roles: {} }
20862026-01-27T01:14:00.265ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = dns_config_external dns_group = external resource = Database result = Ok(())
20872026-01-27T01:14:00.269ZDEBGtest_vpcs (BackgroundTasks): roles background_task = external_endpoints roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
20882026-01-27T01:14:00.275ZDEBGtest_vpcs (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = external_endpoints resource = Fleet result = Ok(())
20892026-01-27T01:14:00.275ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = external_endpoints resource = Database
20902026-01-27T01:14:00.275ZDEBGtest_vpcs (BackgroundTasks): roles background_task = external_endpoints roles = RoleSet { roles: {} }
20912026-01-27T01:14:00.276ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = external_endpoints resource = Database result = Ok(())
20922026-01-27T01:14:00.277ZDEBGtest_vpcs (BackgroundTasks): roles background_task = blueprint_loader roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
20932026-01-27T01:14:00.283ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = blueprint_loader resource = BlueprintConfig result = Ok(())
20942026-01-27T01:14:00.284ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = blueprint_loader resource = Database
20952026-01-27T01:14:00.284ZDEBGtest_vpcs (BackgroundTasks): roles background_task = blueprint_loader roles = RoleSet { roles: {} }
20962026-01-27T01:14:00.284ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = blueprint_loader resource = Database result = Ok(())
20972026-01-27T01:14:00.286ZDEBGtest_vpcs (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
20982026-01-27T01:14:00.291ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = inventory_collection resource = Inventory result = Ok(())
20992026-01-27T01:14:00.291ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = inventory_collection resource = Database
21002026-01-27T01:14:00.291ZDEBGtest_vpcs (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {} }
21012026-01-27T01:14:00.291ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = inventory_collection resource = Database result = Ok(())
21022026-01-27T01:14:00.292ZDEBGtest_vpcs (BackgroundTasks): roles background_task = dns_config_external dns_group = external roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
21032026-01-27T01:14:00.300ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = dns_config_external dns_group = external resource = DnsConfig result = Ok(())
21042026-01-27T01:14:00.301ZDEBGtest_vpcs (BackgroundTasks): roles background_task = dns_config_internal dns_group = internal roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
21052026-01-27T01:14:00.314ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = dns_config_internal dns_group = internal resource = DnsConfig result = Ok(())
21062026-01-27T01:14:00.320ZDEBGtest_vpcs (BackgroundTasks): found DNS version background_task = dns_config_external dns_group = external version = 2
21072026-01-27T01:14:00.321ZDEBGtest_vpcs (BackgroundTasks): reading DNS config background_task = dns_config_external dns_group = external
21082026-01-27T01:14:00.321ZDEBGtest_vpcs (BackgroundTasks): reading DNS zones background_task = dns_config_external dns_group = external
21092026-01-27T01:14:00.321ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = dns_config_external dns_group = external resource = DnsConfig
21102026-01-27T01:14:00.321ZTRACtest_vpcs (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } background_task = dns_config_external dns_group = external resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
21112026-01-27T01:14:00.322ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = dns_config_external dns_group = external resource = Database
21122026-01-27T01:14:00.322ZDEBGtest_vpcs (BackgroundTasks): roles background_task = dns_config_external dns_group = external roles = RoleSet { roles: {} }
21132026-01-27T01:14:00.323ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = dns_config_external dns_group = external resource = Database result = Ok(())
21142026-01-27T01:14:00.328ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = blueprint_loader resource = Blueprint { parent: Fleet, key: c01a6e26-b5bc-40f6-ba41-c1d23b303d2d, lookup_type: ById(c01a6e26-b5bc-40f6-ba41-c1d23b303d2d) }
21152026-01-27T01:14:00.328ZTRACtest_vpcs (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } background_task = blueprint_loader resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
21162026-01-27T01:14:00.330ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = blueprint_loader resource = Database
21172026-01-27T01:14:00.330ZDEBGtest_vpcs (BackgroundTasks): roles background_task = blueprint_loader roles = RoleSet { roles: {} }
21182026-01-27T01:14:00.331ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = blueprint_loader resource = Database result = Ok(())
21192026-01-27T01:14:00.339ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = external_endpoints resource = DnsConfig
21202026-01-27T01:14:00.339ZTRACtest_vpcs (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } background_task = external_endpoints resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
21212026-01-27T01:14:00.339ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = external_endpoints resource = Database
21222026-01-27T01:14:00.340ZDEBGtest_vpcs (BackgroundTasks): roles background_task = external_endpoints roles = RoleSet { roles: {} }
21232026-01-27T01:14:00.341ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = external_endpoints resource = Database result = Ok(())
21242026-01-27T01:14:00.342ZDEBGtest_vpcs (BackgroundTasks): inventory_prune_one: nothing eligible for removal (too few) background_task = inventory_collection candidates = []
21252026-01-27T01:14:00.343ZTRACtest_vpcs (DnsResolver): lookup_all_socket_v6 srv dns_name = _mgs._tcp.control-plane.oxide.internal
21262026-01-27T01:14:00.344ZTRACtest_vpcs (dns): buffer buffer = Length: 75 (0x4b) bytes\n0000: ba df 01 00 00 01 00 00 00 00 00 01 0c 5f 6e 61 ............._na\n0010: 6d 65 73 65 72 76 69 63 65 04 5f 74 63 70 0d 63 meservice._tcp.c\n0020: 6f 6e 74 72 6f 6c 2d 70 6c 61 6e 65 05 6f 78 69 ontrol-plane.oxi\n0030: 64 65 08 69 6e 74 65 72 6e 61 6c 00 00 21 00 01 de.internal..!..\n0040: 00 00 29 04 d0 00 00 00 00 00 00 ..)........ kind = dns peer_addr = [::1]:51089 req_id = b4e04ac7-ed38-4f27-aadf-bd0a2cc6eb85
21272026-01-27T01:14:00.344ZDEBGtest_vpcs (dns): message_request kind = dns mr = MessageRequest {\n header: Header {\n id: 47839,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n queries: Queries {\n queries: [\n LowerQuery {\n name: LowerName(\n Name("_nameservice._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_nameservice._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n ],\n original: [\n 12,\n 95,\n 110,\n 97,\n 109,\n 101,\n 115,\n 101,\n 114,\n 118,\n 105,\n 99,\n 101,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n flags: EdnsFlags {\n dnssec_ok: false,\n z: 0,\n },\n max_payload: 1232,\n options: OPT {\n options: [],\n },\n },\n ),\n} peer_addr = [::1]:51089 req_id = b4e04ac7-ed38-4f27-aadf-bd0a2cc6eb85
21282026-01-27T01:14:00.346ZDEBGtest_vpcs (store): query key key = _nameservice._tcp
21292026-01-27T01:14:00.346ZDEBGtest_vpcs (store): query key key = fb7e8b12-2b9b-4970-85ca-299c62844890.host
21302026-01-27T01:14:00.346ZDEBGtest_vpcs (dns): dns response additional_records = [Record { name_labels: Name("fb7e8b12-2b9b-4970-85ca-299c62844890.host.control-plane.oxide.internal"), dns_class: IN, ttl: 0, rdata: AAAA(AAAA(::1)) }] kind = dns peer_addr = [::1]:51089 query = LowerQuery { name: LowerName(Name("_nameservice._tcp.control-plane.oxide.internal.")), original: Query { name: Name("_nameservice._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN } } records = [Record { name_labels: Name("_nameservice._tcp.control-plane.oxide.internal."), dns_class: IN, ttl: 0, rdata: SRV(SRV { priority: 0, weight: 0, port: 65457, target: Name("fb7e8b12-2b9b-4970-85ca-299c62844890.host.control-plane.oxide.internal") }) }] req_id = b4e04ac7-ed38-4f27-aadf-bd0a2cc6eb85
21312026-01-27T01:14:00.346ZTRACtest_vpcs (dns): buffer buffer = Length: 76 (0x4c) bytes\n0000: 14 3a 01 00 00 01 00 00 00 00 00 01 0d 5f 65 78 .:..........._ex\n0010: 74 65 72 6e 61 6c 2d 64 6e 73 04 5f 74 63 70 0d ternal-dns._tcp.\n0020: 63 6f 6e 74 72 6f 6c 2d 70 6c 61 6e 65 05 6f 78 control-plane.ox\n0030: 69 64 65 08 69 6e 74 65 72 6e 61 6c 00 00 21 00 ide.internal..!.\n0040: 01 00 00 29 04 d0 00 00 00 00 00 00 ...)........ kind = dns peer_addr = [::1]:33484 req_id = 28edd0f7-eaaf-4a58-b70b-10607697fe07
21322026-01-27T01:14:00.346ZDEBGtest_vpcs (dns): message_request kind = dns mr = MessageRequest {\n header: Header {\n id: 5178,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n queries: Queries {\n queries: [\n LowerQuery {\n name: LowerName(\n Name("_external-dns._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_external-dns._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n ],\n original: [\n 13,\n 95,\n 101,\n 120,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 45,\n 100,\n 110,\n 115,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n flags: EdnsFlags {\n dnssec_ok: false,\n z: 0,\n },\n max_payload: 1232,\n options: OPT {\n options: [],\n },\n },\n ),\n} peer_addr = [::1]:33484 req_id = 28edd0f7-eaaf-4a58-b70b-10607697fe07
21332026-01-27T01:14:00.346ZDEBGtest_vpcs (store): query key key = _external-dns._tcp
21342026-01-27T01:14:00.346ZDEBGtest_vpcs (store): query key key = 326b5e01-f8e6-4763-80e1-2d51b531f7e2.host
21352026-01-27T01:14:00.346ZDEBGtest_vpcs (dns): dns response additional_records = [Record { name_labels: Name("326b5e01-f8e6-4763-80e1-2d51b531f7e2.host.control-plane.oxide.internal"), dns_class: IN, ttl: 0, rdata: AAAA(AAAA(::1)) }] kind = dns peer_addr = [::1]:33484 query = LowerQuery { name: LowerName(Name("_external-dns._tcp.control-plane.oxide.internal.")), original: Query { name: Name("_external-dns._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN } } records = [Record { name_labels: Name("_external-dns._tcp.control-plane.oxide.internal."), dns_class: IN, ttl: 0, rdata: SRV(SRV { priority: 0, weight: 0, port: 53796, target: Name("326b5e01-f8e6-4763-80e1-2d51b531f7e2.host.control-plane.oxide.internal") }) }] req_id = 28edd0f7-eaaf-4a58-b70b-10607697fe07
21362026-01-27T01:14:00.346ZDEBGtest_vpcs (BackgroundTasks): roles background_task = dns_config_external dns_group = external roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
21372026-01-27T01:14:00.370ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = dns_config_external dns_group = external resource = DnsConfig result = Ok(())
21382026-01-27T01:14:00.370ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = dns_config_external dns_group = external resource = Database
21392026-01-27T01:14:00.371ZDEBGtest_vpcs (BackgroundTasks): roles background_task = dns_config_external dns_group = external roles = RoleSet { roles: {} }
21402026-01-27T01:14:00.372ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = dns_config_external dns_group = external resource = Database result = Ok(())
21412026-01-27T01:14:00.374ZDEBGtest_vpcs (BackgroundTasks): roles background_task = blueprint_loader roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
21422026-01-27T01:14:00.382ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = blueprint_loader resource = Blueprint { parent: Fleet, key: c01a6e26-b5bc-40f6-ba41-c1d23b303d2d, lookup_type: ById(c01a6e26-b5bc-40f6-ba41-c1d23b303d2d) } result = Ok(())
21432026-01-27T01:14:00.382ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = blueprint_loader resource = Database
21442026-01-27T01:14:00.382ZDEBGtest_vpcs (BackgroundTasks): roles background_task = blueprint_loader roles = RoleSet { roles: {} }
21452026-01-27T01:14:00.383ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = blueprint_loader resource = Database result = Ok(())
21462026-01-27T01:14:00.385ZDEBGtest_vpcs (BackgroundTasks): roles background_task = external_endpoints roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
21472026-01-27T01:14:00.393ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = external_endpoints resource = DnsConfig result = Ok(())
21482026-01-27T01:14:00.393ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = external_endpoints resource = Database
21492026-01-27T01:14:00.393ZDEBGtest_vpcs (BackgroundTasks): roles background_task = external_endpoints roles = RoleSet { roles: {} }
21502026-01-27T01:14:00.394ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = external_endpoints resource = Database result = Ok(())
21512026-01-27T01:14:00.396ZDEBGtest_vpcs (BackgroundTasks): found DNS version background_task = dns_config_internal dns_group = internal version = 1
21522026-01-27T01:14:00.396ZDEBGtest_vpcs (BackgroundTasks): reading DNS config background_task = dns_config_internal dns_group = internal
21532026-01-27T01:14:00.396ZDEBGtest_vpcs (BackgroundTasks): reading DNS zones background_task = dns_config_internal dns_group = internal
21542026-01-27T01:14:00.396ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = dns_config_internal dns_group = internal resource = DnsConfig
21552026-01-27T01:14:00.396ZTRACtest_vpcs (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } background_task = dns_config_internal dns_group = internal resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
21562026-01-27T01:14:00.396ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = dns_config_internal dns_group = internal resource = Database
21572026-01-27T01:14:00.396ZDEBGtest_vpcs (BackgroundTasks): roles background_task = dns_config_internal dns_group = internal roles = RoleSet { roles: {} }
21582026-01-27T01:14:00.397ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = dns_config_internal dns_group = internal resource = Database result = Ok(())
21592026-01-27T01:14:00.400ZDEBGtest_vpcs (BackgroundTasks): found zones background_task = dns_config_external count = 1 dns_group = external
21602026-01-27T01:14:00.401ZDEBGtest_vpcs (BackgroundTasks): listing DNS names for zone background_task = dns_config_external batch_size = 100 dns_group = external dns_zone_id = caa7f690-ad7f-43a1-8d87-36366c8aac91 dns_zone_name = oxide-dev.test found_so_far = 0 version = 2
21612026-01-27T01:14:00.401ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = dns_config_external dns_group = external resource = DnsConfig
21622026-01-27T01:14:00.401ZTRACtest_vpcs (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } background_task = dns_config_external dns_group = external resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
21632026-01-27T01:14:00.402ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = dns_config_external dns_group = external resource = Database
21642026-01-27T01:14:00.402ZDEBGtest_vpcs (BackgroundTasks): roles background_task = dns_config_external dns_group = external roles = RoleSet { roles: {} }
21652026-01-27T01:14:00.402ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = dns_config_external dns_group = external resource = Database result = Ok(())
21662026-01-27T01:14:00.406ZDEBGtest_vpcs (DnsResolver): lookup_all_socket_v6 srv dns_name = _nameservice._tcp.control-plane.oxide.internal response = SrvLookup(Lookup { query: Query { name: Name("_nameservice._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN }, records: [Record { name_labels: Name("_nameservice._tcp.control-plane.oxide.internal."), dns_class: IN, ttl: 0, rdata: SRV(SRV { priority: 0, weight: 0, port: 65457, target: Name("fb7e8b12-2b9b-4970-85ca-299c62844890.host.control-plane.oxide.internal.") }) }, Record { name_labels: Name("fb7e8b12-2b9b-4970-85ca-299c62844890.host.control-plane.oxide.internal."), dns_class: IN, ttl: 0, rdata: AAAA(AAAA(::1)) }], valid_until: Instant { tv_sec: 10282, tv_nsec: 216276734 } })
21672026-01-27T01:14:00.406ZTRACtest_vpcs (DnsResolver): lookup_service_targets: looking up SRV target
21682026-01-27T01:14:00.407ZDEBGtest_vpcs (DnsResolver): lookup_all_socket_v6 srv dns_name = _external-dns._tcp.control-plane.oxide.internal response = SrvLookup(Lookup { query: Query { name: Name("_external-dns._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN }, records: [Record { name_labels: Name("_external-dns._tcp.control-plane.oxide.internal."), dns_class: IN, ttl: 0, rdata: SRV(SRV { priority: 0, weight: 0, port: 53796, target: Name("326b5e01-f8e6-4763-80e1-2d51b531f7e2.host.control-plane.oxide.internal.") }) }, Record { name_labels: Name("326b5e01-f8e6-4763-80e1-2d51b531f7e2.host.control-plane.oxide.internal."), dns_class: IN, ttl: 0, rdata: AAAA(AAAA(::1)) }], valid_until: Instant { tv_sec: 10282, tv_nsec: 217195108 } })
21692026-01-27T01:14:00.407ZTRACtest_vpcs (DnsResolver): lookup_service_targets: looking up SRV target
21702026-01-27T01:14:00.407ZTRACtest_vpcs (dns): buffer buffer = Length: 67 (0x43) bytes\n0000: 5d f6 01 00 00 01 00 00 00 00 00 01 04 5f 6d 67 ]............_mg\n0010: 73 04 5f 74 63 70 0d 63 6f 6e 74 72 6f 6c 2d 70 s._tcp.control-p\n0020: 6c 61 6e 65 05 6f 78 69 64 65 08 69 6e 74 65 72 lane.oxide.inter\n0030: 6e 61 6c 00 00 21 00 01 00 00 29 04 d0 00 00 00 nal..!....).....\n0040: 00 00 00 ... kind = dns peer_addr = [::1]:33899 req_id = 2d3eb5e9-1d25-4bba-bb57-50f7ef4edbd1
21712026-01-27T01:14:00.408ZDEBGtest_vpcs (dns): message_request kind = dns mr = MessageRequest {\n header: Header {\n id: 24054,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n queries: Queries {\n queries: [\n LowerQuery {\n name: LowerName(\n Name("_mgs._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_mgs._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n ],\n original: [\n 4,\n 95,\n 109,\n 103,\n 115,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n flags: EdnsFlags {\n dnssec_ok: false,\n z: 0,\n },\n max_payload: 1232,\n options: OPT {\n options: [],\n },\n },\n ),\n} peer_addr = [::1]:33899 req_id = 2d3eb5e9-1d25-4bba-bb57-50f7ef4edbd1
21722026-01-27T01:14:00.408ZDEBGtest_vpcs (store): query key key = _mgs._tcp
21732026-01-27T01:14:00.408ZDEBGtest_vpcs (store): query key key = dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host
21742026-01-27T01:14:00.408ZDEBGtest_vpcs (dns): dns response additional_records = [Record { name_labels: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal"), dns_class: IN, ttl: 0, rdata: AAAA(AAAA(::1)) }] kind = dns peer_addr = [::1]:33899 query = LowerQuery { name: LowerName(Name("_mgs._tcp.control-plane.oxide.internal.")), original: Query { name: Name("_mgs._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN } } records = [Record { name_labels: Name("_mgs._tcp.control-plane.oxide.internal."), dns_class: IN, ttl: 0, rdata: SRV(SRV { priority: 0, weight: 0, port: 52572, target: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal") }) }] req_id = 2d3eb5e9-1d25-4bba-bb57-50f7ef4edbd1
21752026-01-27T01:14:00.409ZDEBGtest_vpcs (BackgroundTasks): roles background_task = dns_config_internal dns_group = internal roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
21762026-01-27T01:14:00.421ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = dns_config_internal dns_group = internal resource = DnsConfig result = Ok(())
21772026-01-27T01:14:00.421ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = dns_config_internal dns_group = internal resource = Database
21782026-01-27T01:14:00.421ZDEBGtest_vpcs (BackgroundTasks): roles background_task = dns_config_internal dns_group = internal roles = RoleSet { roles: {} }
21792026-01-27T01:14:00.421ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = dns_config_internal dns_group = internal resource = Database result = Ok(())
21802026-01-27T01:14:00.427ZDEBGtest_vpcs (DnsResolver): lookup_all_socket_v6 srv dns_name = _mgs._tcp.control-plane.oxide.internal response = SrvLookup(Lookup { query: Query { name: Name("_mgs._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN }, records: [Record { name_labels: Name("_mgs._tcp.control-plane.oxide.internal."), dns_class: IN, ttl: 0, rdata: SRV(SRV { priority: 0, weight: 0, port: 52572, target: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal.") }) }, Record { name_labels: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."), dns_class: IN, ttl: 0, rdata: AAAA(AAAA(::1)) }], valid_until: Instant { tv_sec: 10282, tv_nsec: 237668165 } })
21812026-01-27T01:14:00.428ZTRACtest_vpcs (DnsResolver): lookup_service_targets: looking up SRV target
21822026-01-27T01:14:00.430ZDEBGtest_vpcs (BackgroundTasks): roles background_task = dns_config_external dns_group = external roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
21832026-01-27T01:14:00.443ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = dns_config_external dns_group = external resource = DnsConfig result = Ok(())
21842026-01-27T01:14:00.443ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = dns_config_external dns_group = external resource = Database
21852026-01-27T01:14:00.443ZDEBGtest_vpcs (BackgroundTasks): roles background_task = dns_config_external dns_group = external roles = RoleSet { roles: {} }
21862026-01-27T01:14:00.444ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = dns_config_external dns_group = external resource = Database result = Ok(())
21872026-01-27T01:14:00.450ZDEBGtest_vpcs (BackgroundTasks): found zones background_task = dns_config_internal count = 1 dns_group = internal
21882026-01-27T01:14:00.450ZDEBGtest_vpcs (BackgroundTasks): listing DNS names for zone background_task = dns_config_internal batch_size = 100 dns_group = internal dns_zone_id = 591858b1-b2c8-411c-bb48-12ff5a469cf6 dns_zone_name = control-plane.oxide.internal found_so_far = 0 version = 1
21892026-01-27T01:14:00.450ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = dns_config_internal dns_group = internal resource = DnsConfig
21902026-01-27T01:14:00.459ZTRACtest_vpcs (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } background_task = dns_config_internal dns_group = internal resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
21912026-01-27T01:14:00.459ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = dns_config_internal dns_group = internal resource = Database
21922026-01-27T01:14:00.459ZDEBGtest_vpcs (BackgroundTasks): roles background_task = dns_config_internal dns_group = internal roles = RoleSet { roles: {} }
21932026-01-27T01:14:00.460ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = dns_config_internal dns_group = internal resource = Database result = Ok(())
21942026-01-27T01:14:00.480ZTRACtest_vpcs (BackgroundTasks): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = external_endpoints resource = Fleet
21952026-01-27T01:14:00.481ZTRACtest_vpcs (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } background_task = external_endpoints resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
21962026-01-27T01:14:00.481ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = external_endpoints resource = Database
21972026-01-27T01:14:00.481ZDEBGtest_vpcs (BackgroundTasks): roles background_task = external_endpoints roles = RoleSet { roles: {} }
21982026-01-27T01:14:00.481ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = external_endpoints resource = Database result = Ok(())
21992026-01-27T01:14:00.481ZDEBGtest_vpcs (BackgroundTasks): found all DNS names for zone background_task = dns_config_external dns_group = external dns_zone_id = caa7f690-ad7f-43a1-8d87-36366c8aac91 dns_zone_name = oxide-dev.test found_so_far = 3 version = 2
22002026-01-27T01:14:00.481ZDEBGtest_vpcs (BackgroundTasks): read DNS config background_task = dns_config_external dns_group = external nzones = 1 version = 2
22012026-01-27T01:14:00.481ZINFOtest_vpcs (BackgroundTasks): found latest generation (first find) background_task = dns_config_external dns_group = external generation = 2
22022026-01-27T01:14:00.481ZDEBGtest_vpcs (BackgroundTasks): activation complete background_task = dns_config_external dns_group = external elapsed = 230.055457ms iteration = 2 status = {"generation":2}
22032026-01-27T01:14:00.481ZDEBGtest_vpcs (BackgroundTasks): activating background_task = dns_propagation_external dns_group = external iteration = 2 reason = Dependency
22042026-01-27T01:14:00.481ZWARNtest_vpcs (BackgroundTasks): DNS propagation: skipped background_task = dns_propagation_external dns_group = external reason = no servers
22052026-01-27T01:14:00.481ZDEBGtest_vpcs (BackgroundTasks): activation complete background_task = dns_propagation_external dns_group = external elapsed = 58.555\u{b5}s iteration = 2 status = {"error":"no servers"}
22062026-01-27T01:14:00.483ZDEBGtest_vpcs (BackgroundTasks): roles background_task = dns_config_internal dns_group = internal roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
22072026-01-27T01:14:00.491ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = dns_config_internal dns_group = internal resource = DnsConfig result = Ok(())
22082026-01-27T01:14:00.491ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = dns_config_internal dns_group = internal resource = Database
22092026-01-27T01:14:00.491ZDEBGtest_vpcs (BackgroundTasks): roles background_task = dns_config_internal dns_group = internal roles = RoleSet { roles: {} }
22102026-01-27T01:14:00.492ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = dns_config_internal dns_group = internal resource = Database result = Ok(())
22112026-01-27T01:14:00.502ZTRACtest_vpcs (dns): buffer buffer = Length: 99 (0x63) bytes\n0000: 14 e5 01 00 00 01 00 00 00 00 00 01 24 66 62 37 ............$fb7\n0010: 65 38 62 31 32 2d 32 62 39 62 2d 34 39 37 30 2d e8b12-2b9b-4970-\n0020: 38 35 63 61 2d 32 39 39 63 36 32 38 34 34 38 39 85ca-299c6284489\n0030: 30 04 68 6f 73 74 0d 63 6f 6e 74 72 6f 6c 2d 70 0.host.control-p\n0040: 6c 61 6e 65 05 6f 78 69 64 65 08 69 6e 74 65 72 lane.oxide.inter\n0050: 6e 61 6c 00 00 1c 00 01 00 00 29 04 d0 00 00 00 nal.......).....\n0060: 00 00 00 ... kind = dns peer_addr = [::1]:40626 req_id = 4012e00a-d7d0-4ffa-bc6f-2dcd9ebf2474
22122026-01-27T01:14:00.502ZDEBGtest_vpcs (dns): message_request kind = dns mr = MessageRequest {\n header: Header {\n id: 5349,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n queries: Queries {\n queries: [\n LowerQuery {\n name: LowerName(\n Name("fb7e8b12-2b9b-4970-85ca-299c62844890.host.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("fb7e8b12-2b9b-4970-85ca-299c62844890.host.control-plane.oxide.internal."),\n query_type: AAAA,\n query_class: IN,\n },\n },\n ],\n original: [\n 36,\n 102,\n 98,\n 55,\n 101,\n 56,\n 98,\n 49,\n 50,\n 45,\n 50,\n 98,\n 57,\n 98,\n 45,\n 52,\n 57,\n 55,\n 48,\n 45,\n 56,\n 53,\n 99,\n 97,\n 45,\n 50,\n 57,\n 57,\n 99,\n 54,\n 50,\n 56,\n 52,\n 52,\n 56,\n 57,\n 48,\n 4,\n 104,\n 111,\n 115,\n 116,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 28,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n flags: EdnsFlags {\n dnssec_ok: false,\n z: 0,\n },\n max_payload: 1232,\n options: OPT {\n options: [],\n },\n },\n ),\n} peer_addr = [::1]:40626 req_id = 4012e00a-d7d0-4ffa-bc6f-2dcd9ebf2474
22132026-01-27T01:14:00.503ZDEBGtest_vpcs (store): query key key = fb7e8b12-2b9b-4970-85ca-299c62844890.host
22142026-01-27T01:14:00.503ZDEBGtest_vpcs (dns): dns response additional_records = [] kind = dns peer_addr = [::1]:40626 query = LowerQuery { name: LowerName(Name("fb7e8b12-2b9b-4970-85ca-299c62844890.host.control-plane.oxide.internal.")), original: Query { name: Name("fb7e8b12-2b9b-4970-85ca-299c62844890.host.control-plane.oxide.internal."), query_type: AAAA, query_class: IN } } records = [Record { name_labels: Name("fb7e8b12-2b9b-4970-85ca-299c62844890.host.control-plane.oxide.internal."), dns_class: IN, ttl: 0, rdata: AAAA(AAAA(::1)) }] req_id = 4012e00a-d7d0-4ffa-bc6f-2dcd9ebf2474
22152026-01-27T01:14:00.503ZTRACtest_vpcs (dns): buffer buffer = Length: 99 (0x63) bytes\n0000: 27 f2 01 00 00 01 00 00 00 00 00 01 24 33 32 36 '...........$326\n0010: 62 35 65 30 31 2d 66 38 65 36 2d 34 37 36 33 2d b5e01-f8e6-4763-\n0020: 38 30 65 31 2d 32 64 35 31 62 35 33 31 66 37 65 80e1-2d51b531f7e\n0030: 32 04 68 6f 73 74 0d 63 6f 6e 74 72 6f 6c 2d 70 2.host.control-p\n0040: 6c 61 6e 65 05 6f 78 69 64 65 08 69 6e 74 65 72 lane.oxide.inter\n0050: 6e 61 6c 00 00 1c 00 01 00 00 29 04 d0 00 00 00 nal.......).....\n0060: 00 00 00 ... kind = dns peer_addr = [::1]:24110 req_id = 6aa226f9-d432-401c-a641-3b5c5f622b2a
22162026-01-27T01:14:00.504ZDEBGtest_vpcs (dns): message_request kind = dns mr = MessageRequest {\n header: Header {\n id: 10226,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n queries: Queries {\n queries: [\n LowerQuery {\n name: LowerName(\n Name("326b5e01-f8e6-4763-80e1-2d51b531f7e2.host.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("326b5e01-f8e6-4763-80e1-2d51b531f7e2.host.control-plane.oxide.internal."),\n query_type: AAAA,\n query_class: IN,\n },\n },\n ],\n original: [\n 36,\n 51,\n 50,\n 54,\n 98,\n 53,\n 101,\n 48,\n 49,\n 45,\n 102,\n 56,\n 101,\n 54,\n 45,\n 52,\n 55,\n 54,\n 51,\n 45,\n 56,\n 48,\n 101,\n 49,\n 45,\n 50,\n 100,\n 53,\n 49,\n 98,\n 53,\n 51,\n 49,\n 102,\n 55,\n 101,\n 50,\n 4,\n 104,\n 111,\n 115,\n 116,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 28,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n flags: EdnsFlags {\n dnssec_ok: false,\n z: 0,\n },\n max_payload: 1232,\n options: OPT {\n options: [],\n },\n },\n ),\n} peer_addr = [::1]:24110 req_id = 6aa226f9-d432-401c-a641-3b5c5f622b2a
22172026-01-27T01:14:00.504ZDEBGtest_vpcs (store): query key key = 326b5e01-f8e6-4763-80e1-2d51b531f7e2.host
22182026-01-27T01:14:00.504ZDEBGtest_vpcs (dns): dns response additional_records = [] kind = dns peer_addr = [::1]:24110 query = LowerQuery { name: LowerName(Name("326b5e01-f8e6-4763-80e1-2d51b531f7e2.host.control-plane.oxide.internal.")), original: Query { name: Name("326b5e01-f8e6-4763-80e1-2d51b531f7e2.host.control-plane.oxide.internal."), query_type: AAAA, query_class: IN } } records = [Record { name_labels: Name("326b5e01-f8e6-4763-80e1-2d51b531f7e2.host.control-plane.oxide.internal."), dns_class: IN, ttl: 0, rdata: AAAA(AAAA(::1)) }] req_id = 6aa226f9-d432-401c-a641-3b5c5f622b2a
22192026-01-27T01:14:00.504ZDEBGtest_vpcs (BackgroundTasks): roles background_task = external_endpoints roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
22202026-01-27T01:14:00.508ZDEBGtest_vpcs (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = external_endpoints resource = Fleet result = Ok(())
22212026-01-27T01:14:00.509ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = external_endpoints resource = Database
22222026-01-27T01:14:00.509ZDEBGtest_vpcs (BackgroundTasks): roles background_task = external_endpoints roles = RoleSet { roles: {} }
22232026-01-27T01:14:00.509ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = external_endpoints resource = Database result = Ok(())
22242026-01-27T01:14:00.512ZDEBGtest_vpcs (BackgroundTasks): found all DNS names for zone background_task = dns_config_internal dns_group = internal dns_zone_id = 591858b1-b2c8-411c-bb48-12ff5a469cf6 dns_zone_name = control-plane.oxide.internal found_so_far = 27 version = 1
22252026-01-27T01:14:00.514ZDEBGtest_vpcs (BackgroundTasks): read DNS config background_task = dns_config_internal dns_group = internal nzones = 1 version = 1
22262026-01-27T01:14:00.514ZINFOtest_vpcs (BackgroundTasks): found latest generation (first find) background_task = dns_config_internal dns_group = internal generation = 1
22272026-01-27T01:14:00.514ZDEBGtest_vpcs (BackgroundTasks): activation complete background_task = dns_config_internal dns_group = internal elapsed = 266.196081ms iteration = 2 status = {"generation":1}
22282026-01-27T01:14:00.514ZDEBGtest_vpcs (BackgroundTasks): activating background_task = dns_propagation_internal dns_group = internal iteration = 2 reason = Dependency
22292026-01-27T01:14:00.514ZWARNtest_vpcs (BackgroundTasks): DNS propagation: skipped background_task = dns_propagation_internal dns_group = internal reason = no servers
22302026-01-27T01:14:00.514ZDEBGtest_vpcs (BackgroundTasks): activation complete background_task = dns_propagation_internal dns_group = internal elapsed = 60.149\u{b5}s iteration = 2 status = {"error":"no servers"}
22312026-01-27T01:14:00.514ZINFOtest_vpcs (BackgroundTasks): found DNS servers (initial) addresses = DnsServersList { addresses: [[::1]:65457] } background_task = dns_servers_internal dns_group = internal
22322026-01-27T01:14:00.515ZDEBGtest_vpcs (BackgroundTasks): activation complete background_task = dns_servers_internal dns_group = internal elapsed = 265.094087ms iteration = 2 status = {"addresses":["[::1]:65457"]}
22332026-01-27T01:14:00.515ZINFOtest_vpcs (BackgroundTasks): found DNS servers (initial) addresses = DnsServersList { addresses: [[::1]:53796] } background_task = dns_servers_external dns_group = external
22342026-01-27T01:14:00.515ZDEBGtest_vpcs (BackgroundTasks): activation complete background_task = dns_servers_external dns_group = external elapsed = 263.03929ms iteration = 2 status = {"addresses":["[::1]:53796"]}
22352026-01-27T01:14:00.515ZTRACtest_vpcs (dns): buffer buffer = Length: 108 (0x6c) bytes\n0000: 86 e2 01 00 00 01 00 00 00 00 00 01 2d 64 65 6e ............-den\n0010: 64 72 69 74 65 2d 62 36 64 36 35 33 34 31 2d 31 drite-b6d65341-1\n0020: 36 37 63 2d 34 31 64 66 2d 39 62 35 63 2d 34 31 67c-41df-9b5c-41\n0030: 63 64 65 64 39 39 63 32 32 39 04 68 6f 73 74 0d cded99c229.host.\n0040: 63 6f 6e 74 72 6f 6c 2d 70 6c 61 6e 65 05 6f 78 control-plane.ox\n0050: 69 64 65 08 69 6e 74 65 72 6e 61 6c 00 00 1c 00 ide.internal....\n0060: 01 00 00 29 04 d0 00 00 00 00 00 00 ...)........ kind = dns peer_addr = [::1]:21596 req_id = 5092958d-d546-4961-91bf-ada45d1a40d0
22362026-01-27T01:14:00.515ZDEBGtest_vpcs (dns): message_request kind = dns mr = MessageRequest {\n header: Header {\n id: 34530,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n queries: Queries {\n queries: [\n LowerQuery {\n name: LowerName(\n Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."),\n query_type: AAAA,\n query_class: IN,\n },\n },\n ],\n original: [\n 45,\n 100,\n 101,\n 110,\n 100,\n 114,\n 105,\n 116,\n 101,\n 45,\n 98,\n 54,\n 100,\n 54,\n 53,\n 51,\n 52,\n 49,\n 45,\n 49,\n 54,\n 55,\n 99,\n 45,\n 52,\n 49,\n 100,\n 102,\n 45,\n 57,\n 98,\n 53,\n 99,\n 45,\n 52,\n 49,\n 99,\n 100,\n 101,\n 100,\n 57,\n 57,\n 99,\n 50,\n 50,\n 57,\n 4,\n 104,\n 111,\n 115,\n 116,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 28,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n flags: EdnsFlags {\n dnssec_ok: false,\n z: 0,\n },\n max_payload: 1232,\n options: OPT {\n options: [],\n },\n },\n ),\n} peer_addr = [::1]:21596 req_id = 5092958d-d546-4961-91bf-ada45d1a40d0
22372026-01-27T01:14:00.515ZDEBGtest_vpcs (store): query key key = dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host
22382026-01-27T01:14:00.515ZDEBGtest_vpcs (dns): dns response additional_records = [] kind = dns peer_addr = [::1]:21596 query = LowerQuery { name: LowerName(Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal.")), original: Query { name: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."), query_type: AAAA, query_class: IN } } records = [Record { name_labels: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."), dns_class: IN, ttl: 0, rdata: AAAA(AAAA(::1)) }] req_id = 5092958d-d546-4961-91bf-ada45d1a40d0
22392026-01-27T01:14:00.516ZDEBGtest_vpcs (BackgroundTasks): activating background_task = dns_propagation_internal dns_group = internal iteration = 3 reason = Dependency
22402026-01-27T01:14:00.597ZDEBGtest_vpcs (BackgroundTasks): client request background_task = dns_propagation_internal body = Some(Body) dns_group = internal dns_server_url = http://[::1]:65457 generation = 1 method = PUT servers = DnsServersList { addresses: [[::1]:65457] } uri = http://[::1]:65457/config
22412026-01-27T01:14:00.597ZDEBGtest_vpcs (BackgroundTasks): activating background_task = dns_propagation_external dns_group = external iteration = 3 reason = Dependency
22422026-01-27T01:14:00.693ZDEBGtest_vpcs (BackgroundTasks): client request background_task = dns_propagation_external body = Some(Body) dns_group = external dns_server_url = http://[::1]:53796 generation = 2 method = PUT servers = DnsServersList { addresses: [[::1]:53796] } uri = http://[::1]:53796/config
22432026-01-27T01:14:00.696ZINFOtest_vpcs (BackgroundTasks): found Silo/DNS/TLS config (initial) background_task = external_endpoints config = ExternalEndpoints { by_dns_name: {"default-silo.sys.oxide-dev.test": ExternalEndpoint { silo_id: 001de000-5110-4000-8000-000000000000, db_silo: Silo { identity: SiloIdentity { id: 001de000-5110-4000-8000-000000000000, name: Name(Name("default-silo")), description: "default silo", time_created: 2026-01-27T01:13:49.283636Z, time_modified: 2026-01-27T01:13:49.283636Z, time_deleted: None }, discoverable: false, authentication_mode: Local, user_provision_type: ApiOnly, mapped_fleet_roles: Object {}, rcgen: Generation(Generation(1)), admin_group_name: None }, tls_certs: [] }, "test-suite-silo.sys.oxide-dev.test": ExternalEndpoint { silo_id: e5399c73-ca5a-4504-b823-4770433f29da, db_silo: Silo { identity: SiloIdentity { id: e5399c73-ca5a-4504-b823-4770433f29da, name: Name(Name("test-suite-silo")), description: "built-in recovery Silo", time_created: 2026-01-27T01:13:58.855038Z, time_modified: 2026-01-27T01:13:58.855038Z, time_deleted: None }, discoverable: false, authentication_mode: Local, user_provision_type: ApiOnly, mapped_fleet_roles: Object {"admin": Array [String("admin")]}, rcgen: Generation(Generation(1)), admin_group_name: None }, tls_certs: [] }}, warnings: [NoSiloCerts { silo_id: 001de000-5110-4000-8000-000000000000, dns_name: "default-silo.sys.oxide-dev.test" }, NoSiloCerts { silo_id: e5399c73-ca5a-4504-b823-4770433f29da, dns_name: "test-suite-silo.sys.oxide-dev.test" }], default_endpoint: Some(ExternalEndpoint { silo_id: e5399c73-ca5a-4504-b823-4770433f29da, db_silo: Silo { identity: SiloIdentity { id: e5399c73-ca5a-4504-b823-4770433f29da, name: Name(Name("test-suite-silo")), description: "built-in recovery Silo", time_created: 2026-01-27T01:13:58.855038Z, time_modified: 2026-01-27T01:13:58.855038Z, time_deleted: None }, discoverable: false, authentication_mode: Local, user_provision_type: ApiOnly, mapped_fleet_roles: Object {"admin": Array [String("admin")]}, rcgen: Generation(Generation(1)), admin_group_name: None }, tls_certs: [] }) }
22442026-01-27T01:14:00.696ZDEBGtest_vpcs (BackgroundTasks): activation complete background_task = external_endpoints elapsed = 442.849526ms iteration = 2 status = {"by_dns_name":{"default-silo.sys.oxide-dev.test":{"silo_id":"001de000-5110-4000-8000-000000000000","tls_certs":[]},"test-suite-silo.sys.oxide-dev.test":{"silo_id":"e5399c73-ca5a-4504-b823-4770433f29da","tls_certs":[]}},"default_endpoint":{"silo_id":"e5399c73-ca5a-4504-b823-4770433f29da","tls_certs":[]},"warnings":["silo 001de000-5110-4000-8000-000000000000 with DNS name \\"default-silo.sys.oxide-dev.test\\" has no usable certificates","silo e5399c73-ca5a-4504-b823-4770433f29da with DNS name \\"test-suite-silo.sys.oxide-dev.test\\" has no usable certificates"]}
22452026-01-27T01:14:00.696ZINFOtest_vpcs (http): accepted connection kind = dns local_addr = [::1]:65457 remote_addr = [::1]:42532
22462026-01-27T01:14:00.696ZINFOtest_vpcs (http): accepted connection kind = dns local_addr = [::1]:53796 remote_addr = [::1]:32952
22472026-01-27T01:14:00.762ZTRACtest_vpcs (DnsResolver): lookup_all_socket_v6 srv dns_name = _clickhouse-admin-keeper._tcp.control-plane.oxide.internal
22482026-01-27T01:14:00.766ZTRACtest_vpcs (http): incoming request kind = dns local_addr = [::1]:65457 method = PUT remote_addr = [::1]:42532 req_id = 4c4b0dab-37de-4acd-9450-8d2de3d6fd5a uri = /config
22492026-01-27T01:14:00.766ZDEBGtest_vpcs (http): determined request API version kind = dns local_addr = [::1]:65457 method = PUT remote_addr = [::1]:42532 req_id = 4c4b0dab-37de-4acd-9450-8d2de3d6fd5a uri = /config version = 2.0.0
22502026-01-27T01:14:00.766ZTRACtest_vpcs (http): incoming request kind = dns local_addr = [::1]:53796 method = PUT remote_addr = [::1]:32952 req_id = 0e34a334-7092-4759-85fa-5c146d2016cf uri = /config
22512026-01-27T01:14:00.766ZDEBGtest_vpcs (http): determined request API version kind = dns local_addr = [::1]:53796 method = PUT remote_addr = [::1]:32952 req_id = 0e34a334-7092-4759-85fa-5c146d2016cf uri = /config version = 2.0.0
22522026-01-27T01:14:00.766ZINFOtest_vpcs (store): attempting generation update new_generation = 1 req_id = 4c4b0dab-37de-4acd-9450-8d2de3d6fd5a
22532026-01-27T01:14:00.766ZINFOtest_vpcs (store): updated generation new_generation = 1 req_id = 4c4b0dab-37de-4acd-9450-8d2de3d6fd5a
22542026-01-27T01:14:00.766ZINFOtest_vpcs (store): attempting generation update new_generation = 2 req_id = 0e34a334-7092-4759-85fa-5c146d2016cf
22552026-01-27T01:14:00.767ZINFOtest_vpcs (store): pruning trees for generations newer than 0
22562026-01-27T01:14:00.767ZDEBGtest_vpcs (store): creating tree tree_name = generation_2_zone_oxide-dev.test
22572026-01-27T01:14:00.767ZDEBGtest_vpcs (store): updating current config
22582026-01-27T01:14:00.767ZDEBGtest_vpcs (store): flushing default tree
22592026-01-27T01:14:00.767ZINFOtest_vpcs (store): pruning trees for generations older than 2 keep = 3
22602026-01-27T01:14:00.767ZINFOtest_vpcs (store): updated generation new_generation = 2 req_id = 0e34a334-7092-4759-85fa-5c146d2016cf
22612026-01-27T01:14:00.772ZINFOtest_vpcs (http): request completed kind = dns latency_us = 6751 local_addr = [::1]:65457 method = PUT remote_addr = [::1]:42532 req_id = 4c4b0dab-37de-4acd-9450-8d2de3d6fd5a response_code = 204 uri = /config
22622026-01-27T01:14:00.772ZINFOtest_vpcs (http): request completed kind = dns latency_us = 6361 local_addr = [::1]:53796 method = PUT remote_addr = [::1]:32952 req_id = 0e34a334-7092-4759-85fa-5c146d2016cf response_code = 204 uri = /config
22632026-01-27T01:14:00.782ZTRACtest_vpcs (dns): buffer buffer = Length: 87 (0x57) bytes\n0000: 0c fd 01 00 00 01 00 00 00 00 00 01 18 5f 63 6c ............._cl\n0010: 69 63 6b 68 6f 75 73 65 2d 61 64 6d 69 6e 2d 6b ickhouse-admin-k\n0020: 65 65 70 65 72 04 5f 74 63 70 0d 63 6f 6e 74 72 eeper._tcp.contr\n0030: 6f 6c 2d 70 6c 61 6e 65 05 6f 78 69 64 65 08 69 ol-plane.oxide.i\n0040: 6e 74 65 72 6e 61 6c 00 00 21 00 01 00 00 29 04 nternal..!....).\n0050: d0 00 00 00 00 00 00 ....... kind = dns peer_addr = [::1]:15840 req_id = d75b7527-e22a-4b61-a0a9-35ea243b8a23
22642026-01-27T01:14:00.782ZDEBGtest_vpcs (dns): message_request kind = dns mr = MessageRequest {\n header: Header {\n id: 3325,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n queries: Queries {\n queries: [\n LowerQuery {\n name: LowerName(\n Name("_clickhouse-admin-keeper._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_clickhouse-admin-keeper._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n ],\n original: [\n 24,\n 95,\n 99,\n 108,\n 105,\n 99,\n 107,\n 104,\n 111,\n 117,\n 115,\n 101,\n 45,\n 97,\n 100,\n 109,\n 105,\n 110,\n 45,\n 107,\n 101,\n 101,\n 112,\n 101,\n 114,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n flags: EdnsFlags {\n dnssec_ok: false,\n z: 0,\n },\n max_payload: 1232,\n options: OPT {\n options: [],\n },\n },\n ),\n} peer_addr = [::1]:15840 req_id = d75b7527-e22a-4b61-a0a9-35ea243b8a23
22652026-01-27T01:14:00.782ZDEBGtest_vpcs (store): query key key = _clickhouse-admin-keeper._tcp
22662026-01-27T01:14:00.782ZERROtest_vpcs (dns): failed to handle incoming DNS message: MessageRequest { header: Header { id: 3325, message_type: Query, op_code: Query, authoritative: false, truncation: false, recursion_desired: true, recursion_available: false, authentic_data: false, checking_disabled: false, response_code: NoError, query_count: 1, answer_count: 0, name_server_count: 0, additional_count: 1, }, queries: Queries { queries: [ LowerQuery { name: LowerName( Name("_clickhouse-admin-keeper._tcp.control-plane.oxide.internal."), ), original: Query { name: Name("_clickhouse-admin-keeper._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN, }, }, ], original: [ 24, 95, 99, 108, 105, 99, 107, 104, 111, 117, 115, 101, 45, 97, 100, 109, 105, 110, 45, 107, 101, 101, 112, 101, 114, 4, 95, 116, 99, 112, 13, 99, 111, 110, 116, 114, 111, 108, 45, 112, 108, 97, 110, 101, 5, 111, 120, 105, 100, 101, 8, 105, 110, 116, 101, 114, 110, 97, 108, 0, 0, 33, 0, 1, ], }, answers: [], name_servers: [], additionals: [], sig0: [], edns: Some( Edns { rcode_high: 0, version: 0, flags: EdnsFlags { dnssec_ok: false, z: 0, }, max_payload: 1232, options: OPT { options: [], }, }, ), } NXDOMAIN: _clickhouse-admin-keeper._tcp.control-plane.oxide.internal kind = dns peer_addr = [::1]:15840 req_id = d75b7527-e22a-4b61-a0a9-35ea243b8a23
22672026-01-27T01:14:00.782ZDEBGtest_vpcs (BackgroundTasks): client response background_task = dns_propagation_internal dns_group = internal dns_server_url = http://[::1]:65457 generation = 1 result = Ok(Response { url: "http://[::1]:65457/config", status: 204, headers: {"x-request-id": "4c4b0dab-37de-4acd-9450-8d2de3d6fd5a", "date": "Tue, 27 Jan 2026 01:14:00 GMT"} }) servers = DnsServersList { addresses: [[::1]:65457] }
22682026-01-27T01:14:00.782ZINFOtest_vpcs (BackgroundTasks): DNS server now at generation 1 background_task = dns_propagation_internal dns_group = internal dns_server_url = http://[::1]:65457 generation = 1 servers = DnsServersList { addresses: [[::1]:65457] }
22692026-01-27T01:14:00.782ZINFOtest_vpcs (BackgroundTasks): DNS propagation: done background_task = dns_propagation_internal dns_group = internal generation = 1 servers = DnsServersList { addresses: [[::1]:65457] }
22702026-01-27T01:14:00.782ZDEBGtest_vpcs (BackgroundTasks): activation complete background_task = dns_propagation_internal dns_group = internal elapsed = 263.808801ms iteration = 3 status = {"generation":1,"server_results":{"[::1]:65457":{"Ok":null}}}
22712026-01-27T01:14:00.782ZDEBGtest_vpcs (BackgroundTasks): client response background_task = dns_propagation_external dns_group = external dns_server_url = http://[::1]:53796 generation = 2 result = Ok(Response { url: "http://[::1]:53796/config", status: 204, headers: {"x-request-id": "0e34a334-7092-4759-85fa-5c146d2016cf", "date": "Tue, 27 Jan 2026 01:14:00 GMT"} }) servers = DnsServersList { addresses: [[::1]:53796] }
22722026-01-27T01:14:00.782ZINFOtest_vpcs (BackgroundTasks): DNS server now at generation 2 background_task = dns_propagation_external dns_group = external dns_server_url = http://[::1]:53796 generation = 2 servers = DnsServersList { addresses: [[::1]:53796] }
22732026-01-27T01:14:00.783ZINFOtest_vpcs (BackgroundTasks): DNS propagation: done background_task = dns_propagation_external dns_group = external generation = 2 servers = DnsServersList { addresses: [[::1]:53796] }
22742026-01-27T01:14:00.783ZDEBGtest_vpcs (BackgroundTasks): activation complete background_task = dns_propagation_external dns_group = external elapsed = 183.9614ms iteration = 3 status = {"generation":2,"server_results":{"[::1]:53796":{"Ok":null}}}
22752026-01-27T01:14:00.784ZTRACtest_vpcs (DnsResolver): lookup_all_socket_v6 srv dns_name = _cockroach._tcp.control-plane.oxide.internal
22762026-01-27T01:14:00.792ZTRACtest_vpcs (dns): buffer buffer = Length: 73 (0x49) bytes\n0000: 94 2c 01 00 00 01 00 00 00 00 00 01 0a 5f 63 6f .,..........._co\n0010: 63 6b 72 6f 61 63 68 04 5f 74 63 70 0d 63 6f 6e ckroach._tcp.con\n0020: 74 72 6f 6c 2d 70 6c 61 6e 65 05 6f 78 69 64 65 trol-plane.oxide\n0030: 08 69 6e 74 65 72 6e 61 6c 00 00 21 00 01 00 00 .internal..!....\n0040: 29 04 d0 00 00 00 00 00 00 )........ kind = dns peer_addr = [::1]:1077 req_id = 7dcaa442-5c18-4532-8fa1-43de7b52d50c
22772026-01-27T01:14:00.792ZDEBGtest_vpcs (dns): message_request kind = dns mr = MessageRequest {\n header: Header {\n id: 37932,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n queries: Queries {\n queries: [\n LowerQuery {\n name: LowerName(\n Name("_cockroach._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_cockroach._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n ],\n original: [\n 10,\n 95,\n 99,\n 111,\n 99,\n 107,\n 114,\n 111,\n 97,\n 99,\n 104,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n flags: EdnsFlags {\n dnssec_ok: false,\n z: 0,\n },\n max_payload: 1232,\n options: OPT {\n options: [],\n },\n },\n ),\n} peer_addr = [::1]:1077 req_id = 7dcaa442-5c18-4532-8fa1-43de7b52d50c
22782026-01-27T01:14:00.792ZDEBGtest_vpcs (store): query key key = _cockroach._tcp
22792026-01-27T01:14:00.793ZDEBGtest_vpcs (store): query key key = 13c52f51-e716-421b-8ceb-7f8d0fb2e5a3.host
22802026-01-27T01:14:00.793ZDEBGtest_vpcs (dns): dns response additional_records = [Record { name_labels: Name("13c52f51-e716-421b-8ceb-7f8d0fb2e5a3.host.control-plane.oxide.internal"), dns_class: IN, ttl: 0, rdata: AAAA(AAAA(::1)) }] kind = dns peer_addr = [::1]:1077 query = LowerQuery { name: LowerName(Name("_cockroach._tcp.control-plane.oxide.internal.")), original: Query { name: Name("_cockroach._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN } } records = [Record { name_labels: Name("_cockroach._tcp.control-plane.oxide.internal."), dns_class: IN, ttl: 0, rdata: SRV(SRV { priority: 0, weight: 0, port: 42398, target: Name("13c52f51-e716-421b-8ceb-7f8d0fb2e5a3.host.control-plane.oxide.internal") }) }] req_id = 7dcaa442-5c18-4532-8fa1-43de7b52d50c
22812026-01-27T01:14:00.802ZDEBGtest_vpcs (DnsResolver): lookup_all_socket_v6 srv dns_name = _cockroach._tcp.control-plane.oxide.internal response = SrvLookup(Lookup { query: Query { name: Name("_cockroach._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN }, records: [Record { name_labels: Name("_cockroach._tcp.control-plane.oxide.internal."), dns_class: IN, ttl: 0, rdata: SRV(SRV { priority: 0, weight: 0, port: 42398, target: Name("13c52f51-e716-421b-8ceb-7f8d0fb2e5a3.host.control-plane.oxide.internal.") }) }, Record { name_labels: Name("13c52f51-e716-421b-8ceb-7f8d0fb2e5a3.host.control-plane.oxide.internal."), dns_class: IN, ttl: 0, rdata: AAAA(AAAA(::1)) }], valid_until: Instant { tv_sec: 10282, tv_nsec: 612070213 } })
22822026-01-27T01:14:00.802ZTRACtest_vpcs (DnsResolver): lookup_service_targets: looking up SRV target
22832026-01-27T01:14:00.811ZTRACtest_vpcs (dns): buffer buffer = Length: 99 (0x63) bytes\n0000: 4c 2a 01 00 00 01 00 00 00 00 00 01 24 31 33 63 L*..........$13c\n0010: 35 32 66 35 31 2d 65 37 31 36 2d 34 32 31 62 2d 52f51-e716-421b-\n0020: 38 63 65 62 2d 37 66 38 64 30 66 62 32 65 35 61 8ceb-7f8d0fb2e5a\n0030: 33 04 68 6f 73 74 0d 63 6f 6e 74 72 6f 6c 2d 70 3.host.control-p\n0040: 6c 61 6e 65 05 6f 78 69 64 65 08 69 6e 74 65 72 lane.oxide.inter\n0050: 6e 61 6c 00 00 1c 00 01 00 00 29 04 d0 00 00 00 nal.......).....\n0060: 00 00 00 ... kind = dns peer_addr = [::1]:48708 req_id = 8cf6b4c6-8f3f-4518-9680-158f16773779
22842026-01-27T01:14:00.812ZDEBGtest_vpcs (dns): message_request kind = dns mr = MessageRequest {\n header: Header {\n id: 19498,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n queries: Queries {\n queries: [\n LowerQuery {\n name: LowerName(\n Name("13c52f51-e716-421b-8ceb-7f8d0fb2e5a3.host.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("13c52f51-e716-421b-8ceb-7f8d0fb2e5a3.host.control-plane.oxide.internal."),\n query_type: AAAA,\n query_class: IN,\n },\n },\n ],\n original: [\n 36,\n 49,\n 51,\n 99,\n 53,\n 50,\n 102,\n 53,\n 49,\n 45,\n 101,\n 55,\n 49,\n 54,\n 45,\n 52,\n 50,\n 49,\n 98,\n 45,\n 56,\n 99,\n 101,\n 98,\n 45,\n 55,\n 102,\n 56,\n 100,\n 48,\n 102,\n 98,\n 50,\n 101,\n 53,\n 97,\n 51,\n 4,\n 104,\n 111,\n 115,\n 116,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 28,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n flags: EdnsFlags {\n dnssec_ok: false,\n z: 0,\n },\n max_payload: 1232,\n options: OPT {\n options: [],\n },\n },\n ),\n} peer_addr = [::1]:48708 req_id = 8cf6b4c6-8f3f-4518-9680-158f16773779
22852026-01-27T01:14:00.812ZDEBGtest_vpcs (store): query key key = 13c52f51-e716-421b-8ceb-7f8d0fb2e5a3.host
22862026-01-27T01:14:00.812ZDEBGtest_vpcs (dns): dns response additional_records = [] kind = dns peer_addr = [::1]:48708 query = LowerQuery { name: LowerName(Name("13c52f51-e716-421b-8ceb-7f8d0fb2e5a3.host.control-plane.oxide.internal.")), original: Query { name: Name("13c52f51-e716-421b-8ceb-7f8d0fb2e5a3.host.control-plane.oxide.internal."), query_type: AAAA, query_class: IN } } records = [Record { name_labels: Name("13c52f51-e716-421b-8ceb-7f8d0fb2e5a3.host.control-plane.oxide.internal."), dns_class: IN, ttl: 0, rdata: AAAA(AAAA(::1)) }] req_id = 8cf6b4c6-8f3f-4518-9680-158f16773779
22872026-01-27T01:14:00.926ZDEBGtest_vpcs (CockroachClusterAdminClient): Updated CockroachDB cluster backends added = 1 addresses = [[::1]:32222] removed = 0 total = 1
22882026-01-27T01:14:00.926ZDEBGtest_vpcs (BackgroundTasks): begin collection background_task = inventory_collection
22892026-01-27T01:14:00.926ZDEBGtest_vpcs (BackgroundTasks): begin collection from MGS background_task = inventory_collection mgs_url = http://[::1]:52572
22902026-01-27T01:14:00.926ZDEBGtest_vpcs (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:52572 method = GET uri = http://[::1]:52572/ignition
22912026-01-27T01:14:00.950ZDEBGtest_vpcs (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:52572 result = Ok(Response { url: "http://[::1]:52572/ignition", status: 200, headers: {"content-type": "application/json", "x-request-id": "32b2f703-9a10-47db-9b0b-e229e77074f1", "content-length": "835", "date": "Tue, 27 Jan 2026 01:14:00 GMT"} })
22922026-01-27T01:14:00.950ZDEBGtest_vpcs (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:52572 method = GET uri = http://[::1]:52572/sp/switch/0
22932026-01-27T01:14:00.967ZDEBGtest_vpcs (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:52572 result = Ok(Response { url: "http://[::1]:52572/sp/switch/0", status: 200, headers: {"content-type": "application/json", "x-request-id": "bcdb8963-665c-45be-aab4-1fcda5f369b4", "content-length": "734", "date": "Tue, 27 Jan 2026 01:14:00 GMT"} })
22942026-01-27T01:14:00.969ZDEBGtest_vpcs (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:52572 method = GET uri = http://[::1]:52572/sp/switch/0/component/sp/caboose?firmware_slot=0
22952026-01-27T01:14:00.969ZDEBGtest_vpcs (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:52572 result = Ok(Response { url: "http://[::1]:52572/sp/switch/0/component/sp/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "ea423d97-cf06-4b01-8f29-d64ad3f2f931", "content-length": "111", "date": "Tue, 27 Jan 2026 01:14:00 GMT"} })
22962026-01-27T01:14:00.969ZDEBGtest_vpcs (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:52572 method = GET uri = http://[::1]:52572/sp/switch/0/component/sp/caboose?firmware_slot=1
22972026-01-27T01:14:00.972ZDEBGtest_vpcs (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:52572 result = Ok(Response { url: "http://[::1]:52572/sp/switch/0/component/sp/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "6bed5d59-3060-4d44-af68-80595ba423fc", "content-length": "111", "date": "Tue, 27 Jan 2026 01:14:00 GMT"} })
22982026-01-27T01:14:00.979ZDEBGtest_vpcs (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:52572 method = GET uri = http://[::1]:52572/sp/switch/0/component/rot/caboose?firmware_slot=0
22992026-01-27T01:14:00.979ZINFOtest_vpcs (BackgroundTasks): found new target blueprint (first find) background_task = blueprint_loader target_id = c01a6e26-b5bc-40f6-ba41-c1d23b303d2d time_created = 2026-01-27 01:13:57.137859 UTC
23002026-01-27T01:14:00.979ZDEBGtest_vpcs (BackgroundTasks): activation complete background_task = blueprint_loader elapsed = 722.207702ms iteration = 2 status = {"enabled":false,"status":"first target blueprint","target_id":"c01a6e26-b5bc-40f6-ba41-c1d23b303d2d","time_created":"2026-01-27T01:13:57.137859Z","time_found":"2026-01-27T01:14:00.978821849Z"}
23012026-01-27T01:14:00.986ZDEBGtest_vpcs (BackgroundTasks): activating background_task = crdb_node_id_collector iteration = 2 reason = Dependency
23022026-01-27T01:14:00.987ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = crdb_node_id_collector resource = Fleet
23032026-01-27T01:14:00.987ZTRACtest_vpcs (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } background_task = crdb_node_id_collector resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
23042026-01-27T01:14:00.987ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = crdb_node_id_collector resource = Database
23052026-01-27T01:14:00.987ZDEBGtest_vpcs (BackgroundTasks): roles background_task = crdb_node_id_collector roles = RoleSet { roles: {} }
23062026-01-27T01:14:00.987ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = crdb_node_id_collector resource = Database result = Ok(())
23072026-01-27T01:14:00.998ZDEBGtest_vpcs (BackgroundTasks): activating background_task = blueprint_executor iteration = 2 reason = Dependency
23082026-01-27T01:14:00.998ZDEBGtest_vpcs (BackgroundTasks): blueprint execution: quiesce check background_task = blueprint_executor quiescing = false
23092026-01-27T01:14:00.998ZINFOtest_vpcs (NexusQuiesceHandle): initial state state = Running
23102026-01-27T01:14:00.999ZINFOtest_vpcs (SagaQuiesceHandle): initial quiesce state initial_state = Allowed
23112026-01-27T01:14:00.999ZWARNtest_vpcs (BackgroundTasks): Blueprint execution: skipped background_task = blueprint_executor reason = blueprint disabled target_id = c01a6e26-b5bc-40f6-ba41-c1d23b303d2d
23122026-01-27T01:14:00.999ZDEBGtest_vpcs (BackgroundTasks): activation complete background_task = blueprint_executor elapsed = 146.427\u{b5}s iteration = 2 status = {"enabled":false,"target_id":"c01a6e26-b5bc-40f6-ba41-c1d23b303d2d"}
23132026-01-27T01:14:00.999ZDEBGtest_vpcs (BackgroundTasks): activating background_task = blueprint_planner iteration = 3 reason = Dependency
23142026-01-27T01:14:00.999ZDEBGtest_vpcs (BackgroundTasks): blueprint planning disabled, doing nothing background_task = blueprint_planner
23152026-01-27T01:14:00.999ZDEBGtest_vpcs (BackgroundTasks): activation complete background_task = blueprint_planner elapsed = 22.344\u{b5}s iteration = 3 status = "Disabled"
23162026-01-27T01:14:00.999ZTRACtest_vpcs (ServiceBalancer): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-00000000bac3 (built_in_user), .. }) resource = Database
23172026-01-27T01:14:00.999ZDEBGtest_vpcs (ServiceBalancer): roles roles = RoleSet { roles: {} }
23182026-01-27T01:14:00.999ZDEBGtest_vpcs (ServiceBalancer): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-00000000bac3 (built_in_user), .. }) resource = Database result = Ok(())
23192026-01-27T01:14:00.999ZDEBGtest_vpcs (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:52572 result = Ok(Response { url: "http://[::1]:52572/sp/switch/0/component/rot/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "50a128a2-2fbf-4d3d-ac9e-5f6d946d009b", "content-length": "163", "date": "Tue, 27 Jan 2026 01:14:00 GMT"} })
23202026-01-27T01:14:00.999ZDEBGtest_vpcs (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:52572 method = GET uri = http://[::1]:52572/sp/switch/0/component/rot/caboose?firmware_slot=1
23212026-01-27T01:14:00.999ZDEBGtest_vpcs (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:52572 result = Ok(Response { url: "http://[::1]:52572/sp/switch/0/component/rot/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "162d6665-7ae3-4331-8a8b-f5dee9ea1a36", "content-length": "163", "date": "Tue, 27 Jan 2026 01:14:00 GMT"} })
23222026-01-27T01:14:00.999ZDEBGtest_vpcs (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:52572 method = GET uri = http://[::1]:52572/sp/switch/0/component/stage0/caboose?firmware_slot=0
23232026-01-27T01:14:01.005ZDEBGtest_vpcs (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:52572 result = Ok(Response { url: "http://[::1]:52572/sp/switch/0/component/stage0/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "940b7dff-0a30-491c-b1a9-d43fa817df90", "content-length": "166", "date": "Tue, 27 Jan 2026 01:14:01 GMT"} })
23242026-01-27T01:14:01.005ZDEBGtest_vpcs (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:52572 method = GET uri = http://[::1]:52572/sp/switch/0/component/stage0/caboose?firmware_slot=1
23252026-01-27T01:14:01.005ZTRACtest_vpcs (ServiceBalancer): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-00000000bac3 (built_in_user), .. }) resource = Rack { parent: Fleet, key: c19a698f-c6f9-4a17-ae30-20d711b8f7dc, lookup_type: ById(c19a698f-c6f9-4a17-ae30-20d711b8f7dc) }
23262026-01-27T01:14:01.005ZTRACtest_vpcs (ServiceBalancer): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-00000000bac3 (built_in_user), .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
23272026-01-27T01:14:01.005ZTRACtest_vpcs (ServiceBalancer): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-00000000bac3 (built_in_user), .. }) resource = Database
23282026-01-27T01:14:01.005ZDEBGtest_vpcs (ServiceBalancer): roles roles = RoleSet { roles: {} }
23292026-01-27T01:14:01.005ZDEBGtest_vpcs (ServiceBalancer): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-00000000bac3 (built_in_user), .. }) resource = Database result = Ok(())
23302026-01-27T01:14:01.008ZDEBGtest_vpcs (BackgroundTasks): roles background_task = crdb_node_id_collector roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
23312026-01-27T01:14:01.015ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = crdb_node_id_collector resource = Fleet result = Ok(())
23322026-01-27T01:14:01.016ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = crdb_node_id_collector resource = Database
23332026-01-27T01:14:01.016ZDEBGtest_vpcs (BackgroundTasks): roles background_task = crdb_node_id_collector roles = RoleSet { roles: {} }
23342026-01-27T01:14:01.016ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = crdb_node_id_collector resource = Database result = Ok(())
23352026-01-27T01:14:01.020ZDEBGtest_vpcs (ServiceBalancer): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
23362026-01-27T01:14:01.033ZDEBGtest_vpcs (ServiceBalancer): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-00000000bac3 (built_in_user), .. }) resource = Rack { parent: Fleet, key: c19a698f-c6f9-4a17-ae30-20d711b8f7dc, lookup_type: ById(c19a698f-c6f9-4a17-ae30-20d711b8f7dc) } result = Ok(())
23372026-01-27T01:14:01.033ZINFOtest_vpcs (nexus): Rack initialized
23382026-01-27T01:14:01.033ZTRACtest_vpcs (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database
23392026-01-27T01:14:01.034ZDEBGtest_vpcs (InternalApi): roles roles = RoleSet { roles: {} }
23402026-01-27T01:14:01.035ZDEBGtest_vpcs (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database result = Ok(())
23412026-01-27T01:14:01.190ZDEBGtest_vpcs (BackgroundTasks): client request background_task = crdb_node_id_collector body = None method = GET uri = http://[::1]:32222/node/id
23422026-01-27T01:14:01.191ZDEBGtest_vpcs (BackgroundTasks): client response background_task = crdb_node_id_collector result = Err(reqwest::Error { kind: Request, url: "http://[::1]:32222/node/id", source: hyper_util::client::legacy::Error(Connect, ConnectError("tcp connect error", [::1]:32222, Os { code: 146, kind: ConnectionRefused, message: "Connection refused" })) })
23432026-01-27T01:14:01.194ZDEBGtest_vpcs (BackgroundTasks): activation complete background_task = crdb_node_id_collector elapsed = 210.916501ms iteration = 2 status = {"errors":[{"err":"failed to fetch node ID for zone 13c52f51-e716-421b-8ceb-7f8d0fb2e5a3 at http://[::1]:32222: Communication Error: error sending request for url (http://[::1]:32222/node/id): error sending request for url (http://[::1]:32222/node/id): client error (Connect): tcp connect error: Connection refused (os error 146)","zone_id":"13c52f51-e716-421b-8ceb-7f8d0fb2e5a3"}],"nsuccess":0}
23442026-01-27T01:14:01.198ZDEBGtest_vpcs (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:52572 result = Ok(Response { url: "http://[::1]:52572/sp/switch/0/component/stage0/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "857bbd2b-55d9-4271-85fd-25c15e68cb1e", "content-length": "166", "date": "Tue, 27 Jan 2026 01:14:01 GMT"} })
23452026-01-27T01:14:01.198ZDEBGtest_vpcs (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:52572 method = GET uri = http://[::1]:52572/sp/switch/0/component/rot/cmpa
23462026-01-27T01:14:01.198ZTRACtest_vpcs (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database
23472026-01-27T01:14:01.198ZDEBGtest_vpcs (InternalApi): roles roles = RoleSet { roles: {} }
23482026-01-27T01:14:01.199ZDEBGtest_vpcs (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database result = Ok(())
23492026-01-27T01:14:01.210ZTRACtest_vpcs (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database
23502026-01-27T01:14:01.210ZDEBGtest_vpcs (InternalApi): roles roles = RoleSet { roles: {} }
23512026-01-27T01:14:01.211ZDEBGtest_vpcs (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database result = Ok(())
23522026-01-27T01:14:01.212ZDEBGtest_vpcs (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:52572 result = Ok(Response { url: "http://[::1]:52572/sp/switch/0/component/rot/cmpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "899890da-f4ba-4ca1-8278-93fed5e2a286", "content-length": "702", "date": "Tue, 27 Jan 2026 01:14:01 GMT"} })
23532026-01-27T01:14:01.213ZDEBGtest_vpcs (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:52572 method = GET uri = http://[::1]:52572/sp/switch/0/component/rot/cfpa
23542026-01-27T01:14:01.216ZDEBGtest_vpcs (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:52572 result = Ok(Response { url: "http://[::1]:52572/sp/switch/0/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "b797c870-2e60-46ef-b60c-a310b372b16b", "content-length": "727", "date": "Tue, 27 Jan 2026 01:14:01 GMT"} })
23552026-01-27T01:14:01.216ZDEBGtest_vpcs (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:52572 method = GET uri = http://[::1]:52572/sp/switch/0/component/rot/cfpa
23562026-01-27T01:14:01.218ZTRACtest_vpcs (InternalApi): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
23572026-01-27T01:14:01.218ZTRACtest_vpcs (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
23582026-01-27T01:14:01.218ZTRACtest_vpcs (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database
23592026-01-27T01:14:01.218ZDEBGtest_vpcs (InternalApi): roles roles = RoleSet { roles: {} }
23602026-01-27T01:14:01.219ZDEBGtest_vpcs (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database result = Ok(())
23612026-01-27T01:14:01.220ZDEBGtest_vpcs (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:52572 result = Ok(Response { url: "http://[::1]:52572/sp/switch/0/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "b3a95b53-496b-4453-8c48-acbbfbdd3833", "content-length": "729", "date": "Tue, 27 Jan 2026 01:14:01 GMT"} })
23622026-01-27T01:14:01.220ZDEBGtest_vpcs (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:52572 method = GET uri = http://[::1]:52572/sp/switch/0/component/rot/cfpa
23632026-01-27T01:14:01.223ZDEBGtest_vpcs (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:52572 result = Ok(Response { url: "http://[::1]:52572/sp/switch/0/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "77d3a020-3838-4347-a083-f926f168e72b", "content-length": "728", "date": "Tue, 27 Jan 2026 01:14:01 GMT"} })
23642026-01-27T01:14:01.223ZDEBGtest_vpcs (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:52572 method = GET uri = http://[::1]:52572/sp/switch/1
23652026-01-27T01:14:01.224ZTRACtest_vpcs (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
23662026-01-27T01:14:01.224ZTRACtest_vpcs (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database
23672026-01-27T01:14:01.224ZDEBGtest_vpcs (InternalApi): roles roles = RoleSet { roles: {} }
23682026-01-27T01:14:01.225ZDEBGtest_vpcs (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database result = Ok(())
23692026-01-27T01:14:01.229ZDEBGtest_vpcs (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:52572 result = Ok(Response { url: "http://[::1]:52572/sp/switch/1", status: 200, headers: {"content-type": "application/json", "x-request-id": "5f1ecd95-c80c-4921-be98-4b7a0a2a3f91", "content-length": "734", "date": "Tue, 27 Jan 2026 01:14:01 GMT"} })
23702026-01-27T01:14:01.231ZDEBGtest_vpcs (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:52572 method = GET uri = http://[::1]:52572/sp/switch/1/component/sp/caboose?firmware_slot=0
23712026-01-27T01:14:01.232ZTRACtest_vpcs (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
23722026-01-27T01:14:01.232ZTRACtest_vpcs (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database
23732026-01-27T01:14:01.232ZDEBGtest_vpcs (InternalApi): roles roles = RoleSet { roles: {} }
23742026-01-27T01:14:01.232ZDEBGtest_vpcs (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database result = Ok(())
23752026-01-27T01:14:01.237ZDEBGtest_vpcs (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
23762026-01-27T01:14:01.251ZDEBGtest_vpcs (InternalApi): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) } result = Ok(())
23772026-01-27T01:14:01.251ZTRACtest_vpcs (InternalApi): successful lookup of siloed resource "Vpc" using built-in user
23782026-01-27T01:14:01.251ZTRACtest_vpcs (InternalApi): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
23792026-01-27T01:14:01.251ZTRACtest_vpcs (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
23802026-01-27T01:14:01.251ZTRACtest_vpcs (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database
23812026-01-27T01:14:01.252ZDEBGtest_vpcs (InternalApi): roles roles = RoleSet { roles: {} }
23822026-01-27T01:14:01.254ZDEBGtest_vpcs (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database result = Ok(())
23832026-01-27T01:14:01.258ZTRACtest_vpcs (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
23842026-01-27T01:14:01.259ZTRACtest_vpcs (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database
23852026-01-27T01:14:01.259ZDEBGtest_vpcs (InternalApi): roles roles = RoleSet { roles: {} }
23862026-01-27T01:14:01.262ZDEBGtest_vpcs (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database result = Ok(())
23872026-01-27T01:14:01.263ZDEBGtest_vpcs (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:52572 result = Ok(Response { url: "http://[::1]:52572/sp/switch/1/component/sp/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "cd639024-6196-42eb-a734-485e16741473", "content-length": "111", "date": "Tue, 27 Jan 2026 01:14:01 GMT"} })
23882026-01-27T01:14:01.263ZDEBGtest_vpcs (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:52572 method = GET uri = http://[::1]:52572/sp/switch/1/component/sp/caboose?firmware_slot=1
23892026-01-27T01:14:01.268ZTRACtest_vpcs (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
23902026-01-27T01:14:01.268ZTRACtest_vpcs (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database
23912026-01-27T01:14:01.268ZDEBGtest_vpcs (InternalApi): roles roles = RoleSet { roles: {} }
23922026-01-27T01:14:01.269ZDEBGtest_vpcs (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database result = Ok(())
23932026-01-27T01:14:01.273ZDEBGtest_vpcs (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:52572 result = Ok(Response { url: "http://[::1]:52572/sp/switch/1/component/sp/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "e7bf1b2a-07c2-4d58-bf80-0c5c474e03ae", "content-length": "111", "date": "Tue, 27 Jan 2026 01:14:01 GMT"} })
23942026-01-27T01:14:01.273ZDEBGtest_vpcs (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:52572 method = GET uri = http://[::1]:52572/sp/switch/1/component/rot/caboose?firmware_slot=0
23952026-01-27T01:14:01.274ZDEBGtest_vpcs (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
23962026-01-27T01:14:01.299ZDEBGtest_vpcs (InternalApi): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) } result = Ok(())
23972026-01-27T01:14:01.299ZTRACtest_vpcs (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database
23982026-01-27T01:14:01.299ZDEBGtest_vpcs (InternalApi): roles roles = RoleSet { roles: {} }
23992026-01-27T01:14:01.300ZDEBGtest_vpcs (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database result = Ok(())
24002026-01-27T01:14:01.307ZTRACtest_vpcs (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database
24012026-01-27T01:14:01.307ZDEBGtest_vpcs (InternalApi): roles roles = RoleSet { roles: {} }
24022026-01-27T01:14:01.310ZDEBGtest_vpcs (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database result = Ok(())
24032026-01-27T01:14:01.312ZDEBGtest_vpcs (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:52572 result = Ok(Response { url: "http://[::1]:52572/sp/switch/1/component/rot/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "9bbcda39-4c5f-4ce5-97ac-9cc3dad40211", "content-length": "163", "date": "Tue, 27 Jan 2026 01:14:01 GMT"} })
24042026-01-27T01:14:01.312ZDEBGtest_vpcs (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:52572 method = GET uri = http://[::1]:52572/sp/switch/1/component/rot/caboose?firmware_slot=1
24052026-01-27T01:14:01.317ZTRACtest_vpcs (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database
24062026-01-27T01:14:01.317ZDEBGtest_vpcs (InternalApi): roles roles = RoleSet { roles: {} }
24072026-01-27T01:14:01.318ZDEBGtest_vpcs (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database result = Ok(())
24082026-01-27T01:14:01.323ZDEBGtest_vpcs (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:52572 result = Ok(Response { url: "http://[::1]:52572/sp/switch/1/component/rot/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "1697ad72-e5a4-4da5-8ac1-764eecd727af", "content-length": "163", "date": "Tue, 27 Jan 2026 01:14:01 GMT"} })
24092026-01-27T01:14:01.323ZDEBGtest_vpcs (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:52572 method = GET uri = http://[::1]:52572/sp/switch/1/component/stage0/caboose?firmware_slot=0
24102026-01-27T01:14:01.327ZTRACtest_vpcs (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database
24112026-01-27T01:14:01.327ZDEBGtest_vpcs (InternalApi): roles roles = RoleSet { roles: {} }
24122026-01-27T01:14:01.340ZDEBGtest_vpcs (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database result = Ok(())
24132026-01-27T01:14:01.342ZDEBGtest_vpcs (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:52572 result = Ok(Response { url: "http://[::1]:52572/sp/switch/1/component/stage0/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "d99b5184-cd20-4f02-b8e7-1d3b0032ac3c", "content-length": "166", "date": "Tue, 27 Jan 2026 01:14:01 GMT"} })
24142026-01-27T01:14:01.342ZDEBGtest_vpcs (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:52572 method = GET uri = http://[::1]:52572/sp/switch/1/component/stage0/caboose?firmware_slot=1
24152026-01-27T01:14:01.346ZTRACtest_vpcs (InternalApi): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
24162026-01-27T01:14:01.346ZTRACtest_vpcs (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
24172026-01-27T01:14:01.346ZTRACtest_vpcs (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database
24182026-01-27T01:14:01.346ZDEBGtest_vpcs (InternalApi): roles roles = RoleSet { roles: {} }
24192026-01-27T01:14:01.347ZDEBGtest_vpcs (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database result = Ok(())
24202026-01-27T01:14:01.350ZDEBGtest_vpcs (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:52572 result = Ok(Response { url: "http://[::1]:52572/sp/switch/1/component/stage0/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "7c2ce644-e9c2-4e67-bded-bc86dd361c19", "content-length": "166", "date": "Tue, 27 Jan 2026 01:14:01 GMT"} })
24212026-01-27T01:14:01.351ZDEBGtest_vpcs (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:52572 method = GET uri = http://[::1]:52572/sp/switch/1/component/rot/cmpa
24222026-01-27T01:14:01.354ZTRACtest_vpcs (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
24232026-01-27T01:14:01.354ZTRACtest_vpcs (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database
24242026-01-27T01:14:01.354ZDEBGtest_vpcs (InternalApi): roles roles = RoleSet { roles: {} }
24252026-01-27T01:14:01.354ZDEBGtest_vpcs (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database result = Ok(())
24262026-01-27T01:14:01.356ZDEBGtest_vpcs (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:52572 result = Ok(Response { url: "http://[::1]:52572/sp/switch/1/component/rot/cmpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "2782b546-29cb-4ba1-b386-ed9a02227b22", "content-length": "702", "date": "Tue, 27 Jan 2026 01:14:01 GMT"} })
24272026-01-27T01:14:01.356ZDEBGtest_vpcs (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:52572 method = GET uri = http://[::1]:52572/sp/switch/1/component/rot/cfpa
24282026-01-27T01:14:01.361ZTRACtest_vpcs (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
24292026-01-27T01:14:01.361ZTRACtest_vpcs (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database
24302026-01-27T01:14:01.361ZDEBGtest_vpcs (InternalApi): roles roles = RoleSet { roles: {} }
24312026-01-27T01:14:01.362ZDEBGtest_vpcs (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database result = Ok(())
24322026-01-27T01:14:01.365ZDEBGtest_vpcs (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:52572 result = Ok(Response { url: "http://[::1]:52572/sp/switch/1/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "6e07b50f-b502-4aa4-bbaa-3d526c77c03e", "content-length": "727", "date": "Tue, 27 Jan 2026 01:14:01 GMT"} })
24332026-01-27T01:14:01.365ZDEBGtest_vpcs (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:52572 method = GET uri = http://[::1]:52572/sp/switch/1/component/rot/cfpa
24342026-01-27T01:14:01.368ZDEBGtest_vpcs (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
24352026-01-27T01:14:01.386ZDEBGtest_vpcs (InternalApi): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) } result = Ok(())
24362026-01-27T01:14:01.386ZTRACtest_vpcs (InternalApi): successful lookup of siloed resource "Vpc" using built-in user
24372026-01-27T01:14:01.386ZTRACtest_vpcs (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database
24382026-01-27T01:14:01.386ZDEBGtest_vpcs (InternalApi): roles roles = RoleSet { roles: {} }
24392026-01-27T01:14:01.387ZDEBGtest_vpcs (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database result = Ok(())
24402026-01-27T01:14:01.391ZDEBGtest_vpcs (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:52572 result = Ok(Response { url: "http://[::1]:52572/sp/switch/1/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "3eef23cf-a329-48d2-bf62-a170416aaaf7", "content-length": "729", "date": "Tue, 27 Jan 2026 01:14:01 GMT"} })
24412026-01-27T01:14:01.391ZDEBGtest_vpcs (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:52572 method = GET uri = http://[::1]:52572/sp/switch/1/component/rot/cfpa
24422026-01-27T01:14:01.392ZTRACtest_vpcs (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database
24432026-01-27T01:14:01.392ZDEBGtest_vpcs (InternalApi): roles roles = RoleSet { roles: {} }
24442026-01-27T01:14:01.393ZDEBGtest_vpcs (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database result = Ok(())
24452026-01-27T01:14:01.398ZDEBGtest_vpcs (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:52572 result = Ok(Response { url: "http://[::1]:52572/sp/switch/1/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "376d5600-5fdf-4945-90db-a47757d74ad7", "content-length": "728", "date": "Tue, 27 Jan 2026 01:14:01 GMT"} })
24462026-01-27T01:14:01.398ZDEBGtest_vpcs (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:52572 method = GET uri = http://[::1]:52572/sp/sled/0
24472026-01-27T01:14:01.398ZTRACtest_vpcs (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database
24482026-01-27T01:14:01.398ZDEBGtest_vpcs (InternalApi): roles roles = RoleSet { roles: {} }
24492026-01-27T01:14:01.399ZDEBGtest_vpcs (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database result = Ok(())
24502026-01-27T01:14:01.407ZTRACtest_vpcs (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database
24512026-01-27T01:14:01.407ZDEBGtest_vpcs (InternalApi): roles roles = RoleSet { roles: {} }
24522026-01-27T01:14:01.409ZDEBGtest_vpcs (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database result = Ok(())
24532026-01-27T01:14:01.412ZDEBGtest_vpcs (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:52572 result = Ok(Response { url: "http://[::1]:52572/sp/sled/0", status: 200, headers: {"content-type": "application/json", "x-request-id": "47383de0-6c0f-4673-a1fd-f98b57d86536", "content-length": "723", "date": "Tue, 27 Jan 2026 01:14:01 GMT"} })
24542026-01-27T01:14:01.412ZDEBGtest_vpcs (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:52572 method = GET uri = http://[::1]:52572/sp/sled/0/component/host-boot-flash/active-slot
24552026-01-27T01:14:01.414ZDEBGtest_vpcs (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:52572 result = Ok(Response { url: "http://[::1]:52572/sp/sled/0/component/host-boot-flash/active-slot", status: 200, headers: {"content-type": "application/json", "x-request-id": "81cf3226-e6b8-4866-af97-847a8b77586a", "content-length": "10", "date": "Tue, 27 Jan 2026 01:14:01 GMT"} })
24562026-01-27T01:14:01.414ZDEBGtest_vpcs (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:52572 method = GET uri = http://[::1]:52572/sp/sled/0/component/host-boot-flash/hash/0
24572026-01-27T01:14:01.415ZTRACtest_vpcs (InternalApi): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000002, lookup_type: ByName("nexus") }
24582026-01-27T01:14:01.415ZTRACtest_vpcs (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
24592026-01-27T01:14:01.415ZTRACtest_vpcs (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database
24602026-01-27T01:14:01.415ZDEBGtest_vpcs (InternalApi): roles roles = RoleSet { roles: {} }
24612026-01-27T01:14:01.421ZDEBGtest_vpcs (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database result = Ok(())
24622026-01-27T01:14:01.433ZDEBGtest_vpcs (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:52572 result = Ok(Response { url: "http://[::1]:52572/sp/sled/0/component/host-boot-flash/hash/0", status: 200, headers: {"content-type": "application/json", "x-request-id": "1221163b-44d4-4d15-86ba-acfcb196837d", "content-length": "144", "date": "Tue, 27 Jan 2026 01:14:01 GMT"} })
24632026-01-27T01:14:01.433ZDEBGtest_vpcs (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:52572 method = GET uri = http://[::1]:52572/sp/sled/0/component/host-boot-flash/hash/1
24642026-01-27T01:14:01.434ZTRACtest_vpcs (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
24652026-01-27T01:14:01.434ZTRACtest_vpcs (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database
24662026-01-27T01:14:01.434ZDEBGtest_vpcs (InternalApi): roles roles = RoleSet { roles: {} }
24672026-01-27T01:14:01.436ZDEBGtest_vpcs (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database result = Ok(())
24682026-01-27T01:14:01.441ZDEBGtest_vpcs (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:52572 result = Ok(Response { url: "http://[::1]:52572/sp/sled/0/component/host-boot-flash/hash/1", status: 200, headers: {"content-type": "application/json", "x-request-id": "cb4e027f-52e4-4212-a997-63fc98fd54c9", "content-length": "147", "date": "Tue, 27 Jan 2026 01:14:01 GMT"} })
24692026-01-27T01:14:01.442ZDEBGtest_vpcs (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:52572 method = GET uri = http://[::1]:52572/sp/sled/0/component/sp/caboose?firmware_slot=0
24702026-01-27T01:14:01.443ZTRACtest_vpcs (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
24712026-01-27T01:14:01.443ZTRACtest_vpcs (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database
24722026-01-27T01:14:01.443ZDEBGtest_vpcs (InternalApi): roles roles = RoleSet { roles: {} }
24732026-01-27T01:14:01.445ZDEBGtest_vpcs (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database result = Ok(())
24742026-01-27T01:14:01.452ZDEBGtest_vpcs (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
24752026-01-27T01:14:01.471ZDEBGtest_vpcs (InternalApi): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000002, lookup_type: ByName("nexus") } result = Ok(())
24762026-01-27T01:14:01.471ZTRACtest_vpcs (InternalApi): successful lookup of siloed resource "VpcSubnet" using built-in user
24772026-01-27T01:14:01.471ZTRACtest_vpcs (InternalApi): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000002, lookup_type: ByName("nexus") }
24782026-01-27T01:14:01.472ZTRACtest_vpcs (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
24792026-01-27T01:14:01.472ZTRACtest_vpcs (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database
24802026-01-27T01:14:01.472ZDEBGtest_vpcs (InternalApi): roles roles = RoleSet { roles: {} }
24812026-01-27T01:14:01.472ZDEBGtest_vpcs (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database result = Ok(())
24822026-01-27T01:14:01.473ZDEBGtest_vpcs (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:52572 result = Ok(Response { url: "http://[::1]:52572/sp/sled/0/component/sp/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "4f1bfeb5-b97f-4566-847c-20d9e37458b9", "content-length": "109", "date": "Tue, 27 Jan 2026 01:14:01 GMT"} })
24832026-01-27T01:14:01.473ZDEBGtest_vpcs (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:52572 method = GET uri = http://[::1]:52572/sp/sled/0/component/sp/caboose?firmware_slot=1
24842026-01-27T01:14:01.477ZDEBGtest_vpcs (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:52572 result = Ok(Response { url: "http://[::1]:52572/sp/sled/0/component/sp/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "62ea5ce0-ffca-4fd6-9e7d-e0d268e0813d", "content-length": "109", "date": "Tue, 27 Jan 2026 01:14:01 GMT"} })
24852026-01-27T01:14:01.477ZDEBGtest_vpcs (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:52572 method = GET uri = http://[::1]:52572/sp/sled/0/component/rot/caboose?firmware_slot=0
24862026-01-27T01:14:01.477ZTRACtest_vpcs (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
24872026-01-27T01:14:01.477ZTRACtest_vpcs (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database
24882026-01-27T01:14:01.477ZDEBGtest_vpcs (InternalApi): roles roles = RoleSet { roles: {} }
24892026-01-27T01:14:01.479ZDEBGtest_vpcs (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database result = Ok(())
24902026-01-27T01:14:01.491ZTRACtest_vpcs (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
24912026-01-27T01:14:01.491ZTRACtest_vpcs (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database
24922026-01-27T01:14:01.491ZDEBGtest_vpcs (InternalApi): roles roles = RoleSet { roles: {} }
24932026-01-27T01:14:01.492ZDEBGtest_vpcs (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database result = Ok(())
24942026-01-27T01:14:01.505ZDEBGtest_vpcs (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:52572 result = Ok(Response { url: "http://[::1]:52572/sp/sled/0/component/rot/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "05581b9e-09ab-4391-9e44-c471d7d57948", "content-length": "163", "date": "Tue, 27 Jan 2026 01:14:01 GMT"} })
24952026-01-27T01:14:01.505ZDEBGtest_vpcs (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:52572 method = GET uri = http://[::1]:52572/sp/sled/0/component/rot/caboose?firmware_slot=1
24962026-01-27T01:14:01.507ZDEBGtest_vpcs (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:52572 result = Ok(Response { url: "http://[::1]:52572/sp/sled/0/component/rot/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "07ad828a-8f82-4c34-a97d-c86d02cd4666", "content-length": "163", "date": "Tue, 27 Jan 2026 01:14:01 GMT"} })
24972026-01-27T01:14:01.508ZDEBGtest_vpcs (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:52572 method = GET uri = http://[::1]:52572/sp/sled/0/component/stage0/caboose?firmware_slot=0
24982026-01-27T01:14:01.513ZDEBGtest_vpcs (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
24992026-01-27T01:14:01.524ZDEBGtest_vpcs (InternalApi): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000002, lookup_type: ByName("nexus") } result = Ok(())
25002026-01-27T01:14:01.524ZTRACtest_vpcs (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database
25012026-01-27T01:14:01.524ZDEBGtest_vpcs (InternalApi): roles roles = RoleSet { roles: {} }
25022026-01-27T01:14:01.524ZDEBGtest_vpcs (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database result = Ok(())
25032026-01-27T01:14:01.526ZDEBGtest_vpcs (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:52572 result = Ok(Response { url: "http://[::1]:52572/sp/sled/0/component/stage0/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "ad4ef54f-f11a-4b72-8a85-b1d5c5a800de", "content-length": "166", "date": "Tue, 27 Jan 2026 01:14:01 GMT"} })
25042026-01-27T01:14:01.526ZDEBGtest_vpcs (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:52572 method = GET uri = http://[::1]:52572/sp/sled/0/component/stage0/caboose?firmware_slot=1
25052026-01-27T01:14:01.551ZTRACtest_vpcs (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database
25062026-01-27T01:14:01.551ZDEBGtest_vpcs (InternalApi): roles roles = RoleSet { roles: {} }
25072026-01-27T01:14:01.553ZDEBGtest_vpcs (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database result = Ok(())
25082026-01-27T01:14:01.569ZTRACtest_vpcs (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database
25092026-01-27T01:14:01.569ZDEBGtest_vpcs (InternalApi): roles roles = RoleSet { roles: {} }
25102026-01-27T01:14:01.570ZDEBGtest_vpcs (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database result = Ok(())
25112026-01-27T01:14:01.595ZTRACtest_vpcs (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database
25122026-01-27T01:14:01.595ZDEBGtest_vpcs (InternalApi): roles roles = RoleSet { roles: {} }
25132026-01-27T01:14:01.596ZDEBGtest_vpcs (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database result = Ok(())
25142026-01-27T01:14:01.609ZTRACtest_vpcs (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database
25152026-01-27T01:14:01.609ZDEBGtest_vpcs (InternalApi): roles roles = RoleSet { roles: {} }
25162026-01-27T01:14:01.610ZDEBGtest_vpcs (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database result = Ok(())
25172026-01-27T01:14:01.617ZTRACtest_vpcs (InternalApi): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000001, lookup_type: ByName("external-dns") }
25182026-01-27T01:14:01.617ZTRACtest_vpcs (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
25192026-01-27T01:14:01.617ZTRACtest_vpcs (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database
25202026-01-27T01:14:01.617ZDEBGtest_vpcs (InternalApi): roles roles = RoleSet { roles: {} }
25212026-01-27T01:14:01.618ZDEBGtest_vpcs (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database result = Ok(())
25222026-01-27T01:14:01.625ZDEBGtest_vpcs (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:52572 result = Ok(Response { url: "http://[::1]:52572/sp/sled/0/component/stage0/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "d48b3353-2bad-43f0-8f5e-6e763b382763", "content-length": "166", "date": "Tue, 27 Jan 2026 01:14:01 GMT"} })
25232026-01-27T01:14:01.625ZDEBGtest_vpcs (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:52572 method = GET uri = http://[::1]:52572/sp/sled/0/component/rot/cmpa
25242026-01-27T01:14:01.626ZTRACtest_vpcs (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
25252026-01-27T01:14:01.626ZTRACtest_vpcs (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database
25262026-01-27T01:14:01.626ZDEBGtest_vpcs (InternalApi): roles roles = RoleSet { roles: {} }
25272026-01-27T01:14:01.628ZDEBGtest_vpcs (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database result = Ok(())
25282026-01-27T01:14:01.646ZDEBGtest_vpcs (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:52572 result = Ok(Response { url: "http://[::1]:52572/sp/sled/0/component/rot/cmpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "0a9b6486-cd97-4db6-8c60-414e2226d5c3", "content-length": "702", "date": "Tue, 27 Jan 2026 01:14:01 GMT"} })
25292026-01-27T01:14:01.646ZDEBGtest_vpcs (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:52572 method = GET uri = http://[::1]:52572/sp/sled/0/component/rot/cfpa
25302026-01-27T01:14:01.647ZTRACtest_vpcs (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
25312026-01-27T01:14:01.647ZTRACtest_vpcs (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database
25322026-01-27T01:14:01.647ZDEBGtest_vpcs (InternalApi): roles roles = RoleSet { roles: {} }
25332026-01-27T01:14:01.648ZDEBGtest_vpcs (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database result = Ok(())
25342026-01-27T01:14:01.657ZDEBGtest_vpcs (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:52572 result = Ok(Response { url: "http://[::1]:52572/sp/sled/0/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "3735ca3e-e3a5-4611-a5f5-c84a65d2fb73", "content-length": "727", "date": "Tue, 27 Jan 2026 01:14:01 GMT"} })
25352026-01-27T01:14:01.657ZDEBGtest_vpcs (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:52572 method = GET uri = http://[::1]:52572/sp/sled/0/component/rot/cfpa
25362026-01-27T01:14:01.658ZDEBGtest_vpcs (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
25372026-01-27T01:14:01.691ZDEBGtest_vpcs (InternalApi): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000001, lookup_type: ByName("external-dns") } result = Ok(())
25382026-01-27T01:14:01.691ZTRACtest_vpcs (InternalApi): successful lookup of siloed resource "VpcSubnet" using built-in user
25392026-01-27T01:14:01.691ZTRACtest_vpcs (InternalApi): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000001, lookup_type: ByName("external-dns") }
25402026-01-27T01:14:01.691ZTRACtest_vpcs (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
25412026-01-27T01:14:01.691ZTRACtest_vpcs (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database
25422026-01-27T01:14:01.691ZDEBGtest_vpcs (InternalApi): roles roles = RoleSet { roles: {} }
25432026-01-27T01:14:01.692ZDEBGtest_vpcs (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database result = Ok(())
25442026-01-27T01:14:01.699ZDEBGtest_vpcs (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:52572 result = Ok(Response { url: "http://[::1]:52572/sp/sled/0/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "db888561-7ab0-4ea9-b991-105f2fd60e23", "content-length": "729", "date": "Tue, 27 Jan 2026 01:14:01 GMT"} })
25452026-01-27T01:14:01.699ZDEBGtest_vpcs (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:52572 method = GET uri = http://[::1]:52572/sp/sled/0/component/rot/cfpa
25462026-01-27T01:14:01.701ZTRACtest_vpcs (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
25472026-01-27T01:14:01.701ZTRACtest_vpcs (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database
25482026-01-27T01:14:01.701ZDEBGtest_vpcs (InternalApi): roles roles = RoleSet { roles: {} }
25492026-01-27T01:14:01.702ZDEBGtest_vpcs (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database result = Ok(())
25502026-01-27T01:14:01.709ZDEBGtest_vpcs (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:52572 result = Ok(Response { url: "http://[::1]:52572/sp/sled/0/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "ea375a39-f8c9-4356-8a0b-93719331d73e", "content-length": "728", "date": "Tue, 27 Jan 2026 01:14:01 GMT"} })
25512026-01-27T01:14:01.709ZDEBGtest_vpcs (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:52572 method = GET uri = http://[::1]:52572/sp/sled/1
25522026-01-27T01:14:01.710ZTRACtest_vpcs (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
25532026-01-27T01:14:01.710ZTRACtest_vpcs (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database
25542026-01-27T01:14:01.710ZDEBGtest_vpcs (InternalApi): roles roles = RoleSet { roles: {} }
25552026-01-27T01:14:01.712ZDEBGtest_vpcs (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database result = Ok(())
25562026-01-27T01:14:01.718ZDEBGtest_vpcs (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:52572 result = Ok(Response { url: "http://[::1]:52572/sp/sled/1", status: 200, headers: {"content-type": "application/json", "x-request-id": "017cf433-128d-4c9f-a044-5ee1153e4999", "content-length": "723", "date": "Tue, 27 Jan 2026 01:14:01 GMT"} })
25572026-01-27T01:14:01.719ZDEBGtest_vpcs (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:52572 method = GET uri = http://[::1]:52572/sp/sled/1/component/host-boot-flash/active-slot
25582026-01-27T01:14:01.719ZDEBGtest_vpcs (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
25592026-01-27T01:14:01.743ZDEBGtest_vpcs (InternalApi): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000001, lookup_type: ByName("external-dns") } result = Ok(())
25602026-01-27T01:14:01.743ZTRACtest_vpcs (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database
25612026-01-27T01:14:01.743ZDEBGtest_vpcs (InternalApi): roles roles = RoleSet { roles: {} }
25622026-01-27T01:14:01.744ZDEBGtest_vpcs (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database result = Ok(())
25632026-01-27T01:14:01.748ZDEBGtest_vpcs (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:52572 result = Ok(Response { url: "http://[::1]:52572/sp/sled/1/component/host-boot-flash/active-slot", status: 200, headers: {"content-type": "application/json", "x-request-id": "29d7722a-21da-477d-9d9b-b45d575dde75", "content-length": "10", "date": "Tue, 27 Jan 2026 01:14:01 GMT"} })
25642026-01-27T01:14:01.749ZDEBGtest_vpcs (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:52572 method = GET uri = http://[::1]:52572/sp/sled/1/component/host-boot-flash/hash/0
25652026-01-27T01:14:01.757ZDEBGtest_vpcs (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:52572 result = Ok(Response { url: "http://[::1]:52572/sp/sled/1/component/host-boot-flash/hash/0", status: 200, headers: {"content-type": "application/json", "x-request-id": "8b6b3310-d00a-438b-add8-7e6019572b07", "content-length": "144", "date": "Tue, 27 Jan 2026 01:14:01 GMT"} })
25662026-01-27T01:14:01.758ZDEBGtest_vpcs (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:52572 method = GET uri = http://[::1]:52572/sp/sled/1/component/host-boot-flash/hash/1
25672026-01-27T01:14:01.760ZDEBGtest_vpcs (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:52572 result = Ok(Response { url: "http://[::1]:52572/sp/sled/1/component/host-boot-flash/hash/1", status: 200, headers: {"content-type": "application/json", "x-request-id": "fe93e46a-8319-4bf7-862f-a986a1a3cc57", "content-length": "147", "date": "Tue, 27 Jan 2026 01:14:01 GMT"} })
25682026-01-27T01:14:01.760ZDEBGtest_vpcs (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:52572 method = GET uri = http://[::1]:52572/sp/sled/1/component/sp/caboose?firmware_slot=0
25692026-01-27T01:14:01.760ZDEBGtest_vpcs (InternalApi): resolved names for firewall rules instance_interfaces = {} subnet_interfaces = {Name("nexus"): [NetworkInterface { id: 82c3c615-0929-4977-b0aa-1e7826847b55, kind: Service { id: 913233fe-92a8-4635-9572-183f495429c4 }, name: Name("nexus-913233fe-92a8-4635-9572-183f495429c4"), ip_config: V4(PrivateIpv4Config { ip: 172.30.2.6, subnet: Ipv4Net { addr: 172.30.2.0, width: 24 }, transit_ips: [] }), mac: MacAddr(MacAddr6([168, 64, 37, 255, 128, 1])), vni: Vni(100), primary: true, slot: 0 }], Name("external-dns"): [NetworkInterface { id: 47a89b77-3b91-469f-95b1-f4d29dbf1a52, kind: Service { id: 326b5e01-f8e6-4763-80e1-2d51b531f7e2 }, name: Name("external-dns-326b5e01-f8e6-4763-80e1-2d51b531f7e2"), ip_config: V6(PrivateIpv6Config { ip: fd77:e9d2:9cd9:1::6, subnet: Ipv6Net { addr: fd77:e9d2:9cd9:1::, width: 64 }, transit_ips: [] }), mac: MacAddr(MacAddr6([168, 64, 37, 255, 128, 0])), vni: Vni(100), primary: true, slot: 0 }]} subnet_networks = {Name("nexus"): [V4(Ipv4Network { addr: 172.30.2.0, prefix: 24 }), V6(Ipv6Network { addr: fd77:e9d2:9cd9:2::, prefix: 64 })], Name("external-dns"): [V4(Ipv4Network { addr: 172.30.1.0, prefix: 24 }), V6(Ipv6Network { addr: fd77:e9d2:9cd9:1::, prefix: 64 })]} vpc_interfaces = {}
25702026-01-27T01:14:01.761ZTRACtest_vpcs (InternalApi): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Fleet
25712026-01-27T01:14:01.761ZTRACtest_vpcs (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
25722026-01-27T01:14:01.761ZTRACtest_vpcs (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database
25732026-01-27T01:14:01.761ZDEBGtest_vpcs (InternalApi): roles roles = RoleSet { roles: {} }
25742026-01-27T01:14:01.762ZDEBGtest_vpcs (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database result = Ok(())
25752026-01-27T01:14:01.770ZDEBGtest_vpcs (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
25762026-01-27T01:14:01.777ZDEBGtest_vpcs (InternalApi): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Fleet result = Ok(())
25772026-01-27T01:14:01.777ZTRACtest_vpcs (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database
25782026-01-27T01:14:01.777ZDEBGtest_vpcs (InternalApi): roles roles = RoleSet { roles: {} }
25792026-01-27T01:14:01.778ZDEBGtest_vpcs (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database result = Ok(())
25802026-01-27T01:14:01.781ZDEBGtest_vpcs (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:52572 result = Ok(Response { url: "http://[::1]:52572/sp/sled/1/component/sp/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "40f5db10-8659-4ce5-8bab-46968225d984", "content-length": "109", "date": "Tue, 27 Jan 2026 01:14:01 GMT"} })
25812026-01-27T01:14:01.781ZDEBGtest_vpcs (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:52572 method = GET uri = http://[::1]:52572/sp/sled/1/component/sp/caboose?firmware_slot=1
25822026-01-27T01:14:01.783ZTRACtest_vpcs (InternalApi): fetched allowlist from DB allowed = AllowList { id: 001de000-a110-4000-8000-000000000000, time_created: 2026-01-26T23:16:37.697587Z, time_modified: 2026-01-27T01:13:59.725232Z, allowed_ips: None }
25832026-01-27T01:14:01.783ZDEBGtest_vpcs (InternalApi): Allowlist for user-facing services is set to allow any inbound traffic. Existing VPC firewall rules will not be modified.
25842026-01-27T01:14:01.783ZDEBGtest_vpcs (InternalApi): resolved firewall rules for sled agents sled_agent_rules = [ResolvedVpcFirewallRule { status: Enabled, direction: Inbound, targets: [NetworkInterface { id: 47a89b77-3b91-469f-95b1-f4d29dbf1a52, kind: Service { id: 326b5e01-f8e6-4763-80e1-2d51b531f7e2 }, name: Name("external-dns-326b5e01-f8e6-4763-80e1-2d51b531f7e2"), ip_config: V6(PrivateIpv6Config { ip: fd77:e9d2:9cd9:1::6, subnet: Ipv6Net { addr: fd77:e9d2:9cd9:1::, width: 64 }, transit_ips: [] }), mac: MacAddr(MacAddr6([168, 64, 37, 255, 128, 0])), vni: Vni(100), primary: true, slot: 0 }], filter_hosts: None, filter_ports: Some([L4PortRange { first: L4Port(53), last: L4Port(53) }]), filter_protocols: Some([Udp]), action: Allow, priority: VpcFirewallRulePriority(65534) }, ResolvedVpcFirewallRule { status: Enabled, direction: Inbound, targets: [NetworkInterface { id: 82c3c615-0929-4977-b0aa-1e7826847b55, kind: Service { id: 913233fe-92a8-4635-9572-183f495429c4 }, name: Name("nexus-913233fe-92a8-4635-9572-183f495429c4"), ip_config: V4(PrivateIpv4Config { ip: 172.30.2.6, subnet: Ipv4Net { addr: 172.30.2.0, width: 24 }, transit_ips: [] }), mac: MacAddr(MacAddr6([168, 64, 37, 255, 128, 1])), vni: Vni(100), primary: true, slot: 0 }, NetworkInterface { id: 47a89b77-3b91-469f-95b1-f4d29dbf1a52, kind: Service { id: 326b5e01-f8e6-4763-80e1-2d51b531f7e2 }, name: Name("external-dns-326b5e01-f8e6-4763-80e1-2d51b531f7e2"), ip_config: V6(PrivateIpv6Config { ip: fd77:e9d2:9cd9:1::6, subnet: Ipv6Net { addr: fd77:e9d2:9cd9:1::, width: 64 }, transit_ips: [] }), mac: MacAddr(MacAddr6([168, 64, 37, 255, 128, 0])), vni: Vni(100), primary: true, slot: 0 }], filter_hosts: None, filter_ports: None, filter_protocols: Some([Icmp(Some(VpcFirewallIcmpFilter { icmp_type: 3, code: Some(IcmpParamRange { first: 3, last: 4 }) })), Icmp(Some(VpcFirewallIcmpFilter { icmp_type: 5, code: None })), Icmp(Some(VpcFirewallIcmpFilter { icmp_type: 11, code: None }))]), action: Allow, priority: VpcFirewallRulePriority(65534) }, ResolvedVpcFirewallRule { status: Enabled, direction: Inbound, targets: [NetworkInterface { id: 82c3c615-0929-4977-b0aa-1e7826847b55, kind: Service { id: 913233fe-92a8-4635-9572-183f495429c4 }, name: Name("nexus-913233fe-92a8-4635-9572-183f495429c4"), ip_config: V4(PrivateIpv4Config { ip: 172.30.2.6, subnet: Ipv4Net { addr: 172.30.2.0, width: 24 }, transit_ips: [] }), mac: MacAddr(MacAddr6([168, 64, 37, 255, 128, 1])), vni: Vni(100), primary: true, slot: 0 }], filter_hosts: None, filter_ports: Some([L4PortRange { first: L4Port(80), last: L4Port(80) }, L4PortRange { first: L4Port(443), last: L4Port(443) }]), filter_protocols: Some([Tcp]), action: Allow, priority: VpcFirewallRulePriority(65534) }]
25852026-01-27T01:14:01.784ZDEBGtest_vpcs (InternalApi): resolved 3 rules for sleds
25862026-01-27T01:14:01.788ZDEBGtest_vpcs (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:52572 result = Ok(Response { url: "http://[::1]:52572/sp/sled/1/component/sp/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "2a3b1109-7d7f-469b-8f8b-53835c72673d", "content-length": "109", "date": "Tue, 27 Jan 2026 01:14:01 GMT"} })
25872026-01-27T01:14:01.788ZDEBGtest_vpcs (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:52572 method = GET uri = http://[::1]:52572/sp/sled/1/component/rot/caboose?firmware_slot=0
25882026-01-27T01:14:01.794ZDEBGtest_vpcs (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:52572 result = Ok(Response { url: "http://[::1]:52572/sp/sled/1/component/rot/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "9dd62439-a42e-4533-afe3-2bd4253e94f3", "content-length": "163", "date": "Tue, 27 Jan 2026 01:14:01 GMT"} })
25892026-01-27T01:14:01.795ZDEBGtest_vpcs (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:52572 method = GET uri = http://[::1]:52572/sp/sled/1/component/rot/caboose?firmware_slot=1
25902026-01-27T01:14:01.800ZDEBGtest_vpcs (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:52572 result = Ok(Response { url: "http://[::1]:52572/sp/sled/1/component/rot/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "5ff565f6-be1b-46a9-8c9c-a9560efd6dff", "content-length": "163", "date": "Tue, 27 Jan 2026 01:14:01 GMT"} })
25912026-01-27T01:14:01.801ZDEBGtest_vpcs (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:52572 method = GET uri = http://[::1]:52572/sp/sled/1/component/stage0/caboose?firmware_slot=0
25922026-01-27T01:14:01.803ZDEBGtest_vpcs (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:52572 result = Ok(Response { url: "http://[::1]:52572/sp/sled/1/component/stage0/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "137d3815-c54c-4d05-88e7-394b66ee974a", "content-length": "166", "date": "Tue, 27 Jan 2026 01:14:01 GMT"} })
25932026-01-27T01:14:01.804ZDEBGtest_vpcs (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:52572 method = GET uri = http://[::1]:52572/sp/sled/1/component/stage0/caboose?firmware_slot=1
25942026-01-27T01:14:01.812ZDEBGtest_vpcs (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:52572 result = Ok(Response { url: "http://[::1]:52572/sp/sled/1/component/stage0/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "3aa9a25f-c740-47c5-8ec9-d320978576cd", "content-length": "166", "date": "Tue, 27 Jan 2026 01:14:01 GMT"} })
25952026-01-27T01:14:01.812ZDEBGtest_vpcs (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:52572 method = GET uri = http://[::1]:52572/sp/sled/1/component/rot/cmpa
25962026-01-27T01:14:01.819ZDEBGtest_vpcs (InternalApi): resolved sleds for vpc oxide-services vpc_to_sled = [Sled { identity: SledIdentity { id: b6d65341-167c-41df-9b5c-41cded99c229 (sled), time_created: 2026-01-27T01:13:52.435851Z, time_modified: 2026-01-27T01:13:52.435851Z }, time_deleted: None, rcgen: Generation(Generation(1)), rack_id: c19a698f-c6f9-4a17-ae30-20d711b8f7dc, is_scrimlet: true, serial_number: "SimGimlet00", part_number: "i86pc", revision: SqlU32(3), usable_hardware_threads: SqlU32(16), usable_physical_ram: ByteCount(ByteCount(34359738368)), reservoir_size: ByteCount(ByteCount(17179869184)), ip: ::1, port: SqlU16(59842), last_used_address: ::ffff, policy: InService, state: Active, sled_agent_gen: Generation(Generation(1)), repo_depot_port: SqlU16(50229), cpu_family: AmdMilan }]
25972026-01-27T01:14:01.819ZDEBGtest_vpcs (InternalApi): sending firewall rules to sled agents
25982026-01-27T01:14:01.910ZTRACtest_vpcs (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database
25992026-01-27T01:14:01.910ZDEBGtest_vpcs (InternalApi): roles roles = RoleSet { roles: {} }
26002026-01-27T01:14:01.911ZDEBGtest_vpcs (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database result = Ok(())
26012026-01-27T01:14:01.913ZDEBGtest_vpcs (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:52572 result = Ok(Response { url: "http://[::1]:52572/sp/sled/1/component/rot/cmpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "830f2368-1d3d-4517-b024-a19daecfe930", "content-length": "702", "date": "Tue, 27 Jan 2026 01:14:01 GMT"} })
26022026-01-27T01:14:01.913ZDEBGtest_vpcs (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:52572 method = GET uri = http://[::1]:52572/sp/sled/1/component/rot/cfpa
26032026-01-27T01:14:01.917ZDEBGtest_vpcs (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:52572 result = Ok(Response { url: "http://[::1]:52572/sp/sled/1/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "408d7f8a-4494-4d8f-b36f-822691a69eac", "content-length": "727", "date": "Tue, 27 Jan 2026 01:14:01 GMT"} })
26042026-01-27T01:14:01.917ZDEBGtest_vpcs (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:52572 method = GET uri = http://[::1]:52572/sp/sled/1/component/rot/cfpa
26052026-01-27T01:14:01.918ZTRACtest_vpcs (InternalApi): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Sled { parent: Fleet, key: b6d65341-167c-41df-9b5c-41cded99c229 (sled), lookup_type: ById(b6d65341-167c-41df-9b5c-41cded99c229) }
26062026-01-27T01:14:01.919ZTRACtest_vpcs (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
26072026-01-27T01:14:01.919ZTRACtest_vpcs (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database
26082026-01-27T01:14:01.919ZDEBGtest_vpcs (InternalApi): roles roles = RoleSet { roles: {} }
26092026-01-27T01:14:01.920ZDEBGtest_vpcs (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database result = Ok(())
26102026-01-27T01:14:01.925ZDEBGtest_vpcs (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:52572 result = Ok(Response { url: "http://[::1]:52572/sp/sled/1/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "f2f32d1e-a190-49be-ac81-9b77a5bed8f8", "content-length": "729", "date": "Tue, 27 Jan 2026 01:14:01 GMT"} })
26112026-01-27T01:14:01.925ZDEBGtest_vpcs (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:52572 method = GET uri = http://[::1]:52572/sp/sled/1/component/rot/cfpa
26122026-01-27T01:14:01.927ZDEBGtest_vpcs (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:52572 result = Ok(Response { url: "http://[::1]:52572/sp/sled/1/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "9aba4597-de65-46bc-a274-1e9b8bcc5763", "content-length": "728", "date": "Tue, 27 Jan 2026 01:14:01 GMT"} })
26132026-01-27T01:14:01.928ZTRACtest_vpcs (BackgroundTasks): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = inventory_collection resource = Fleet
26142026-01-27T01:14:01.928ZTRACtest_vpcs (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } background_task = inventory_collection resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
26152026-01-27T01:14:01.928ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = inventory_collection resource = Database
26162026-01-27T01:14:01.928ZDEBGtest_vpcs (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {} }
26172026-01-27T01:14:01.930ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = inventory_collection resource = Database result = Ok(())
26182026-01-27T01:14:01.932ZDEBGtest_vpcs (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
26192026-01-27T01:14:01.947ZDEBGtest_vpcs (InternalApi): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Sled { parent: Fleet, key: b6d65341-167c-41df-9b5c-41cded99c229 (sled), lookup_type: ById(b6d65341-167c-41df-9b5c-41cded99c229) } result = Ok(())
26202026-01-27T01:14:01.947ZDEBGtest_vpcs (InternalApi): client request SledAgent = b6d65341-167c-41df-9b5c-41cded99c229 body = Some(Body) method = PUT uri = http://[::1]:59842/vpc/001de000-074c-4000-8000-000000000000/firewall/rules
26212026-01-27T01:14:01.951ZINFOtest_vpcs (dropshot): accepted connection local_addr = [::1]:59842 remote_addr = [::1]:47309 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
26222026-01-27T01:14:01.951ZTRACtest_vpcs (dropshot): incoming request local_addr = [::1]:59842 method = PUT remote_addr = [::1]:47309 req_id = fbb010fe-9bec-4234-9f0f-1274984c9b6f sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /vpc/001de000-074c-4000-8000-000000000000/firewall/rules
26232026-01-27T01:14:01.951ZDEBGtest_vpcs (dropshot): determined request API version local_addr = [::1]:59842 method = PUT remote_addr = [::1]:47309 req_id = fbb010fe-9bec-4234-9f0f-1274984c9b6f sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /vpc/001de000-074c-4000-8000-000000000000/firewall/rules version = 15.0.0
26242026-01-27T01:14:01.953ZINFOtest_vpcs (dropshot): request completed latency_us = 1606 local_addr = [::1]:59842 method = PUT remote_addr = [::1]:47309 req_id = fbb010fe-9bec-4234-9f0f-1274984c9b6f response_code = 204 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /vpc/001de000-074c-4000-8000-000000000000/firewall/rules
26252026-01-27T01:14:01.953ZDEBGtest_vpcs (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
26262026-01-27T01:14:01.960ZDEBGtest_vpcs (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = inventory_collection resource = Fleet result = Ok(())
26272026-01-27T01:14:01.960ZTRACtest_vpcs (BackgroundTasks): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = inventory_collection resource = Fleet
26282026-01-27T01:14:01.960ZTRACtest_vpcs (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } background_task = inventory_collection resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
26292026-01-27T01:14:01.960ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = inventory_collection resource = Database
26302026-01-27T01:14:01.961ZDEBGtest_vpcs (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {} }
26312026-01-27T01:14:01.961ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = inventory_collection resource = Database result = Ok(())
26322026-01-27T01:14:01.964ZDEBGtest_vpcs (InternalApi): client response SledAgent = b6d65341-167c-41df-9b5c-41cded99c229 result = Ok(Response { url: "http://[::1]:59842/vpc/001de000-074c-4000-8000-000000000000/firewall/rules", status: 204, headers: {"x-request-id": "fbb010fe-9bec-4234-9f0f-1274984c9b6f", "date": "Tue, 27 Jan 2026 01:14:01 GMT"} })
26332026-01-27T01:14:01.966ZINFOtest_vpcs (InternalApi): updated firewall rules on 1 sleds
26342026-01-27T01:14:01.966ZINFOtest_vpcs (nexus): plumbed initial IP allowlist
26352026-01-27T01:14:02.124ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = GET path = / versions = all
26362026-01-27T01:14:02.124ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = GET path = /access versions = all
26372026-01-27T01:14:02.124ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = GET path = /assets/{path} versions = all
26382026-01-27T01:14:02.124ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = POST path = /device/auth versions = all
26392026-01-27T01:14:02.124ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = POST path = /device/confirm versions = all
26402026-01-27T01:14:02.124ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = GET path = /device/success versions = all
26412026-01-27T01:14:02.124ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = POST path = /device/token versions = all
26422026-01-27T01:14:02.124ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = GET path = /device/verify versions = all
26432026-01-27T01:14:02.124ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = GET path = /experimental/v1/probes versions = all ending with 2026010300.0.0
26442026-01-27T01:14:02.124ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = GET path = /experimental/v1/probes versions = all starting from 2026010300.0.0
26452026-01-27T01:14:02.125ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = POST path = /experimental/v1/probes versions = all ending with 2026010500.0.0
26462026-01-27T01:14:02.125ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = POST path = /experimental/v1/probes versions = all starting from 2026010500.0.0
26472026-01-27T01:14:02.125ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = DELETE path = /experimental/v1/probes/{probe} versions = all
26482026-01-27T01:14:02.125ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = GET path = /experimental/v1/probes/{probe} versions = all ending with 2026010300.0.0
26492026-01-27T01:14:02.125ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = GET path = /experimental/v1/probes/{probe} versions = all starting from 2026010300.0.0
26502026-01-27T01:14:02.125ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = GET path = /experimental/v1/system/support-bundles versions = all
26512026-01-27T01:14:02.125ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = POST path = /experimental/v1/system/support-bundles versions = all
26522026-01-27T01:14:02.125ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = DELETE path = /experimental/v1/system/support-bundles/{bundle_id} versions = all
26532026-01-27T01:14:02.125ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = GET path = /experimental/v1/system/support-bundles/{bundle_id} versions = all
26542026-01-27T01:14:02.125ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = PUT path = /experimental/v1/system/support-bundles/{bundle_id} versions = all
26552026-01-27T01:14:02.125ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = GET path = /experimental/v1/system/support-bundles/{bundle_id}/download versions = all
26562026-01-27T01:14:02.125ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = HEAD path = /experimental/v1/system/support-bundles/{bundle_id}/download versions = all
26572026-01-27T01:14:02.125ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = GET path = /experimental/v1/system/support-bundles/{bundle_id}/download/{file} versions = all
26582026-01-27T01:14:02.125ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = HEAD path = /experimental/v1/system/support-bundles/{bundle_id}/download/{file} versions = all
26592026-01-27T01:14:02.125ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = GET path = /experimental/v1/system/support-bundles/{bundle_id}/index versions = all
26602026-01-27T01:14:02.126ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = GET path = /images versions = all
26612026-01-27T01:14:02.126ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = GET path = /login versions = all
26622026-01-27T01:14:02.126ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = GET path = /login/{silo_name}/local versions = all
26632026-01-27T01:14:02.126ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = GET path = /login/{silo_name}/saml/{provider_name} versions = all
26642026-01-27T01:14:02.126ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = POST path = /login/{silo_name}/saml/{provider_name} versions = all
26652026-01-27T01:14:02.126ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = GET path = /login/{silo_name}/saml/{provider_name}/redirect versions = all
26662026-01-27T01:14:02.126ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = GET path = /lookup/{path} versions = all
26672026-01-27T01:14:02.126ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = GET path = /projects/{path} versions = all
26682026-01-27T01:14:02.126ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = GET path = /projects-new versions = all
26692026-01-27T01:14:02.126ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = GET path = /scim/v2/Groups versions = all
26702026-01-27T01:14:02.126ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = POST path = /scim/v2/Groups versions = all
26712026-01-27T01:14:02.126ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = DELETE path = /scim/v2/Groups/{group_id} versions = all
26722026-01-27T01:14:02.126ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = GET path = /scim/v2/Groups/{group_id} versions = all
26732026-01-27T01:14:02.126ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = PATCH path = /scim/v2/Groups/{group_id} versions = all
26742026-01-27T01:14:02.126ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = PUT path = /scim/v2/Groups/{group_id} versions = all
26752026-01-27T01:14:02.126ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = GET path = /scim/v2/Users versions = all
26762026-01-27T01:14:02.126ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = POST path = /scim/v2/Users versions = all
26772026-01-27T01:14:02.126ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = DELETE path = /scim/v2/Users/{user_id} versions = all
26782026-01-27T01:14:02.126ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = GET path = /scim/v2/Users/{user_id} versions = all
26792026-01-27T01:14:02.126ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = PATCH path = /scim/v2/Users/{user_id} versions = all
26802026-01-27T01:14:02.126ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = PUT path = /scim/v2/Users/{user_id} versions = all
26812026-01-27T01:14:02.126ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = GET path = /settings/{path} versions = all
26822026-01-27T01:14:02.126ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = GET path = /system/{path} versions = all
26832026-01-27T01:14:02.127ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = GET path = /utilization versions = all
26842026-01-27T01:14:02.127ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = GET path = /v1/affinity-groups versions = all
26852026-01-27T01:14:02.127ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = POST path = /v1/affinity-groups versions = all
26862026-01-27T01:14:02.127ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = DELETE path = /v1/affinity-groups/{affinity_group} versions = all
26872026-01-27T01:14:02.127ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = GET path = /v1/affinity-groups/{affinity_group} versions = all
26882026-01-27T01:14:02.127ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = PUT path = /v1/affinity-groups/{affinity_group} versions = all
26892026-01-27T01:14:02.127ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = GET path = /v1/affinity-groups/{affinity_group}/members versions = all
26902026-01-27T01:14:02.127ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = DELETE path = /v1/affinity-groups/{affinity_group}/members/instance/{instance} versions = all
26912026-01-27T01:14:02.127ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = GET path = /v1/affinity-groups/{affinity_group}/members/instance/{instance} versions = all
26922026-01-27T01:14:02.127ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = POST path = /v1/affinity-groups/{affinity_group}/members/instance/{instance} versions = all
26932026-01-27T01:14:02.127ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = GET path = /v1/alert-classes versions = all
26942026-01-27T01:14:02.127ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = GET path = /v1/alert-receivers versions = all
26952026-01-27T01:14:02.127ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = DELETE path = /v1/alert-receivers/{receiver} versions = all
26962026-01-27T01:14:02.127ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = GET path = /v1/alert-receivers/{receiver} versions = all
26972026-01-27T01:14:02.127ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = GET path = /v1/alert-receivers/{receiver}/deliveries versions = all
26982026-01-27T01:14:02.127ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = POST path = /v1/alert-receivers/{receiver}/probe versions = all
26992026-01-27T01:14:02.127ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = POST path = /v1/alert-receivers/{receiver}/subscriptions versions = all
27002026-01-27T01:14:02.127ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = DELETE path = /v1/alert-receivers/{receiver}/subscriptions/{subscription} versions = all
27012026-01-27T01:14:02.127ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = POST path = /v1/alerts/{alert_id}/resend versions = all
27022026-01-27T01:14:02.127ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = GET path = /v1/anti-affinity-groups versions = all
27032026-01-27T01:14:02.127ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = POST path = /v1/anti-affinity-groups versions = all
27042026-01-27T01:14:02.127ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = DELETE path = /v1/anti-affinity-groups/{anti_affinity_group} versions = all
27052026-01-27T01:14:02.128ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = GET path = /v1/anti-affinity-groups/{anti_affinity_group} versions = all
27062026-01-27T01:14:02.128ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = PUT path = /v1/anti-affinity-groups/{anti_affinity_group} versions = all
27072026-01-27T01:14:02.128ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = GET path = /v1/anti-affinity-groups/{anti_affinity_group}/members versions = all
27082026-01-27T01:14:02.128ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = DELETE path = /v1/anti-affinity-groups/{anti_affinity_group}/members/instance/{instance} versions = all
27092026-01-27T01:14:02.128ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = GET path = /v1/anti-affinity-groups/{anti_affinity_group}/members/instance/{instance} versions = all
27102026-01-27T01:14:02.128ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = POST path = /v1/anti-affinity-groups/{anti_affinity_group}/members/instance/{instance} versions = all
27112026-01-27T01:14:02.128ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = GET path = /v1/auth-settings versions = all
27122026-01-27T01:14:02.128ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = PUT path = /v1/auth-settings versions = all
27132026-01-27T01:14:02.128ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = GET path = /v1/certificates versions = all
27142026-01-27T01:14:02.128ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = POST path = /v1/certificates versions = all
27152026-01-27T01:14:02.128ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = DELETE path = /v1/certificates/{certificate} versions = all
27162026-01-27T01:14:02.128ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = GET path = /v1/certificates/{certificate} versions = all
27172026-01-27T01:14:02.128ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = GET path = /v1/disks versions = all ending with 2025120300.0.0
27182026-01-27T01:14:02.128ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = GET path = /v1/disks versions = all starting from 2025120300.0.0
27192026-01-27T01:14:02.128ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = POST path = /v1/disks versions = all ending with 2025120300.0.0
27202026-01-27T01:14:02.128ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = POST path = /v1/disks versions = all starting from 2025120300.0.0
27212026-01-27T01:14:02.128ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = DELETE path = /v1/disks/{disk} versions = all
27222026-01-27T01:14:02.128ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = GET path = /v1/disks/{disk} versions = all ending with 2025120300.0.0
27232026-01-27T01:14:02.128ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = GET path = /v1/disks/{disk} versions = all starting from 2025120300.0.0
27242026-01-27T01:14:02.128ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = POST path = /v1/disks/{disk}/bulk-write versions = all
27252026-01-27T01:14:02.128ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = POST path = /v1/disks/{disk}/bulk-write-start versions = all
27262026-01-27T01:14:02.128ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = POST path = /v1/disks/{disk}/bulk-write-stop versions = all
27272026-01-27T01:14:02.128ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = POST path = /v1/disks/{disk}/finalize versions = all
27282026-01-27T01:14:02.128ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = GET path = /v1/external-subnets versions = all starting from 2026011601.0.0
27292026-01-27T01:14:02.129ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = POST path = /v1/external-subnets versions = all starting from 2026012201.0.0
27302026-01-27T01:14:02.129ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = POST path = /v1/external-subnets versions = from 2026011601.0.0 to 2026012201.0.0
27312026-01-27T01:14:02.129ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = DELETE path = /v1/external-subnets/{external_subnet} versions = all starting from 2026011601.0.0
27322026-01-27T01:14:02.129ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = GET path = /v1/external-subnets/{external_subnet} versions = all starting from 2026011601.0.0
27332026-01-27T01:14:02.129ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = PUT path = /v1/external-subnets/{external_subnet} versions = all starting from 2026011601.0.0
27342026-01-27T01:14:02.129ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = POST path = /v1/external-subnets/{external_subnet}/attach versions = all starting from 2026011601.0.0
27352026-01-27T01:14:02.129ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = POST path = /v1/external-subnets/{external_subnet}/detach versions = all starting from 2026011601.0.0
27362026-01-27T01:14:02.129ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = GET path = /v1/floating-ips versions = all
27372026-01-27T01:14:02.129ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = POST path = /v1/floating-ips versions = all starting from 2026012200.0.0
27382026-01-27T01:14:02.129ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = POST path = /v1/floating-ips versions = from 2026011600.0.0 to 2026012200.0.0
27392026-01-27T01:14:02.129ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = POST path = /v1/floating-ips versions = from 2026010500.0.0 to 2026011600.0.0
27402026-01-27T01:14:02.129ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = POST path = /v1/floating-ips versions = from 2025122300.0.0 to 2026010500.0.0
27412026-01-27T01:14:02.129ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = POST path = /v1/floating-ips versions = all ending with 2025122300.0.0
27422026-01-27T01:14:02.129ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = DELETE path = /v1/floating-ips/{floating_ip} versions = all
27432026-01-27T01:14:02.129ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = GET path = /v1/floating-ips/{floating_ip} versions = all
27442026-01-27T01:14:02.129ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = PUT path = /v1/floating-ips/{floating_ip} versions = all
27452026-01-27T01:14:02.129ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = POST path = /v1/floating-ips/{floating_ip}/attach versions = all
27462026-01-27T01:14:02.129ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = POST path = /v1/floating-ips/{floating_ip}/detach versions = all
27472026-01-27T01:14:02.129ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = GET path = /v1/groups versions = all
27482026-01-27T01:14:02.129ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = GET path = /v1/groups/{group_id} versions = all
27492026-01-27T01:14:02.129ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = GET path = /v1/images versions = all
27502026-01-27T01:14:02.129ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = POST path = /v1/images versions = all
27512026-01-27T01:14:02.129ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = DELETE path = /v1/images/{image} versions = all
27522026-01-27T01:14:02.129ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = GET path = /v1/images/{image} versions = all
27532026-01-27T01:14:02.130ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = POST path = /v1/images/{image}/demote versions = all
27542026-01-27T01:14:02.130ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = POST path = /v1/images/{image}/promote versions = all
27552026-01-27T01:14:02.130ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = GET path = /v1/instances versions = all
27562026-01-27T01:14:02.130ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = POST path = /v1/instances versions = all ending with 2025120300.0.0
27572026-01-27T01:14:02.130ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = POST path = /v1/instances versions = from 2025120300.0.0 to 2025122300.0.0
27582026-01-27T01:14:02.130ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = POST path = /v1/instances versions = from 2025122300.0.0 to 2026010300.0.0
27592026-01-27T01:14:02.130ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = POST path = /v1/instances versions = from 2026010300.0.0 to 2026010500.0.0
27602026-01-27T01:14:02.130ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = POST path = /v1/instances versions = from 2026010500.0.0 to 2026010800.0.0
27612026-01-27T01:14:02.130ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = POST path = /v1/instances versions = all starting from 2026010800.0.0
27622026-01-27T01:14:02.130ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = DELETE path = /v1/instances/{instance} versions = all
27632026-01-27T01:14:02.130ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = GET path = /v1/instances/{instance} versions = all
27642026-01-27T01:14:02.130ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = PUT path = /v1/instances/{instance} versions = all ending with 2026010800.0.0
27652026-01-27T01:14:02.130ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = PUT path = /v1/instances/{instance} versions = all starting from 2026010800.0.0
27662026-01-27T01:14:02.130ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = GET path = /v1/instances/{instance}/affinity-groups versions = all
27672026-01-27T01:14:02.130ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = GET path = /v1/instances/{instance}/anti-affinity-groups versions = all
27682026-01-27T01:14:02.130ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = GET path = /v1/instances/{instance}/disks versions = all ending with 2025120300.0.0
27692026-01-27T01:14:02.130ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = GET path = /v1/instances/{instance}/disks versions = all starting from 2025120300.0.0
27702026-01-27T01:14:02.130ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = POST path = /v1/instances/{instance}/disks/attach versions = all ending with 2025120300.0.0
27712026-01-27T01:14:02.130ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = POST path = /v1/instances/{instance}/disks/attach versions = all starting from 2025120300.0.0
27722026-01-27T01:14:02.130ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = POST path = /v1/instances/{instance}/disks/detach versions = all ending with 2025120300.0.0
27732026-01-27T01:14:02.130ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = POST path = /v1/instances/{instance}/disks/detach versions = all starting from 2025120300.0.0
27742026-01-27T01:14:02.130ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = GET path = /v1/instances/{instance}/external-ips versions = all
27752026-01-27T01:14:02.130ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = DELETE path = /v1/instances/{instance}/external-ips/ephemeral versions = all
27762026-01-27T01:14:02.130ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = POST path = /v1/instances/{instance}/external-ips/ephemeral versions = all ending with 2025122300.0.0
27772026-01-27T01:14:02.130ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = POST path = /v1/instances/{instance}/external-ips/ephemeral versions = from 2025122300.0.0 to 2026010500.0.0
27782026-01-27T01:14:02.131ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = POST path = /v1/instances/{instance}/external-ips/ephemeral versions = all starting from 2026010500.0.0
27792026-01-27T01:14:02.131ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = GET path = /v1/instances/{instance}/multicast-groups versions = all ending with 2026010800.0.0
27802026-01-27T01:14:02.131ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = GET path = /v1/instances/{instance}/multicast-groups versions = all starting from 2026010800.0.0
27812026-01-27T01:14:02.131ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = DELETE path = /v1/instances/{instance}/multicast-groups/{multicast_group} versions = all ending with 2026010800.0.0
27822026-01-27T01:14:02.131ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = DELETE path = /v1/instances/{instance}/multicast-groups/{multicast_group} versions = all starting from 2026010800.0.0
27832026-01-27T01:14:02.131ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = PUT path = /v1/instances/{instance}/multicast-groups/{multicast_group} versions = all ending with 2026010800.0.0
27842026-01-27T01:14:02.131ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = PUT path = /v1/instances/{instance}/multicast-groups/{multicast_group} versions = all starting from 2026010800.0.0
27852026-01-27T01:14:02.131ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = POST path = /v1/instances/{instance}/reboot versions = all
27862026-01-27T01:14:02.131ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = GET path = /v1/instances/{instance}/serial-console versions = all
27872026-01-27T01:14:02.131ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = GET path = /v1/instances/{instance}/serial-console/stream versions = all
27882026-01-27T01:14:02.131ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = GET path = /v1/instances/{instance}/ssh-public-keys versions = all
27892026-01-27T01:14:02.131ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = POST path = /v1/instances/{instance}/start versions = all
27902026-01-27T01:14:02.131ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = POST path = /v1/instances/{instance}/stop versions = all
27912026-01-27T01:14:02.131ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = GET path = /v1/internet-gateway-ip-addresses versions = all
27922026-01-27T01:14:02.131ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = POST path = /v1/internet-gateway-ip-addresses versions = all
27932026-01-27T01:14:02.131ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = DELETE path = /v1/internet-gateway-ip-addresses/{address} versions = all
27942026-01-27T01:14:02.131ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = GET path = /v1/internet-gateway-ip-pools versions = all
27952026-01-27T01:14:02.131ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = POST path = /v1/internet-gateway-ip-pools versions = all
27962026-01-27T01:14:02.131ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = DELETE path = /v1/internet-gateway-ip-pools/{pool} versions = all
27972026-01-27T01:14:02.131ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = GET path = /v1/internet-gateways versions = all
27982026-01-27T01:14:02.131ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = POST path = /v1/internet-gateways versions = all
27992026-01-27T01:14:02.131ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = DELETE path = /v1/internet-gateways/{gateway} versions = all
28002026-01-27T01:14:02.132ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = GET path = /v1/internet-gateways/{gateway} versions = all
28012026-01-27T01:14:02.132ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = GET path = /v1/ip-pools versions = all ending with 2026010100.0.0
28022026-01-27T01:14:02.132ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = GET path = /v1/ip-pools versions = all starting from 2026010100.0.0
28032026-01-27T01:14:02.132ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = GET path = /v1/ip-pools/{pool} versions = all ending with 2026010100.0.0
28042026-01-27T01:14:02.132ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = GET path = /v1/ip-pools/{pool} versions = all starting from 2026010100.0.0
28052026-01-27T01:14:02.132ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = POST path = /v1/login/{silo_name}/local versions = all
28062026-01-27T01:14:02.132ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = POST path = /v1/logout versions = all
28072026-01-27T01:14:02.132ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = GET path = /v1/me versions = all
28082026-01-27T01:14:02.132ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = GET path = /v1/me/access-tokens versions = all
28092026-01-27T01:14:02.132ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = DELETE path = /v1/me/access-tokens/{token_id} versions = all
28102026-01-27T01:14:02.132ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = GET path = /v1/me/groups versions = all
28112026-01-27T01:14:02.132ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = GET path = /v1/me/ssh-keys versions = all
28122026-01-27T01:14:02.132ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = POST path = /v1/me/ssh-keys versions = all
28132026-01-27T01:14:02.132ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = DELETE path = /v1/me/ssh-keys/{ssh_key} versions = all
28142026-01-27T01:14:02.132ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = GET path = /v1/me/ssh-keys/{ssh_key} versions = all
28152026-01-27T01:14:02.132ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = GET path = /v1/metrics/{metric_name} versions = all
28162026-01-27T01:14:02.132ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = GET path = /v1/multicast-groups versions = all ending with 2026010800.0.0
28172026-01-27T01:14:02.132ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = GET path = /v1/multicast-groups versions = all starting from 2026010800.0.0
28182026-01-27T01:14:02.132ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = POST path = /v1/multicast-groups versions = all ending with 2026010800.0.0
28192026-01-27T01:14:02.132ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = DELETE path = /v1/multicast-groups/{multicast_group} versions = all ending with 2026010800.0.0
28202026-01-27T01:14:02.132ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = GET path = /v1/multicast-groups/{multicast_group} versions = all ending with 2026010800.0.0
28212026-01-27T01:14:02.132ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = GET path = /v1/multicast-groups/{multicast_group} versions = all starting from 2026010800.0.0
28222026-01-27T01:14:02.132ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = PUT path = /v1/multicast-groups/{multicast_group} versions = all ending with 2026010800.0.0
28232026-01-27T01:14:02.132ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = GET path = /v1/multicast-groups/{multicast_group}/members versions = all ending with 2026010800.0.0
28242026-01-27T01:14:02.133ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = GET path = /v1/multicast-groups/{multicast_group}/members versions = all starting from 2026010800.0.0
28252026-01-27T01:14:02.133ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = POST path = /v1/multicast-groups/{multicast_group}/members versions = all ending with 2026010800.0.0
28262026-01-27T01:14:02.133ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = DELETE path = /v1/multicast-groups/{multicast_group}/members/{instance} versions = all ending with 2026010800.0.0
28272026-01-27T01:14:02.133ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = GET path = /v1/network-interfaces versions = all ending with 2026010300.0.0
28282026-01-27T01:14:02.133ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = GET path = /v1/network-interfaces versions = all starting from 2026010300.0.0
28292026-01-27T01:14:02.133ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = POST path = /v1/network-interfaces versions = all ending with 2026010300.0.0
28302026-01-27T01:14:02.133ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = POST path = /v1/network-interfaces versions = all starting from 2026010300.0.0
28312026-01-27T01:14:02.133ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = DELETE path = /v1/network-interfaces/{interface} versions = all
28322026-01-27T01:14:02.133ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = GET path = /v1/network-interfaces/{interface} versions = all ending with 2026010300.0.0
28332026-01-27T01:14:02.133ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = GET path = /v1/network-interfaces/{interface} versions = all starting from 2026010300.0.0
28342026-01-27T01:14:02.133ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = PUT path = /v1/network-interfaces/{interface} versions = all ending with 2026010300.0.0
28352026-01-27T01:14:02.133ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = PUT path = /v1/network-interfaces/{interface} versions = all starting from 2026010300.0.0
28362026-01-27T01:14:02.133ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = GET path = /v1/ping versions = all
28372026-01-27T01:14:02.133ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = GET path = /v1/policy versions = all
28382026-01-27T01:14:02.133ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = PUT path = /v1/policy versions = all
28392026-01-27T01:14:02.133ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = GET path = /v1/projects versions = all
28402026-01-27T01:14:02.133ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = POST path = /v1/projects versions = all
28412026-01-27T01:14:02.133ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = DELETE path = /v1/projects/{project} versions = all
28422026-01-27T01:14:02.133ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = GET path = /v1/projects/{project} versions = all
28432026-01-27T01:14:02.133ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = PUT path = /v1/projects/{project} versions = all
28442026-01-27T01:14:02.133ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = GET path = /v1/projects/{project}/policy versions = all
28452026-01-27T01:14:02.133ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = PUT path = /v1/projects/{project}/policy versions = all
28462026-01-27T01:14:02.133ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = GET path = /v1/snapshots versions = all
28472026-01-27T01:14:02.134ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = POST path = /v1/snapshots versions = all
28482026-01-27T01:14:02.134ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = DELETE path = /v1/snapshots/{snapshot} versions = all
28492026-01-27T01:14:02.134ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = GET path = /v1/snapshots/{snapshot} versions = all
28502026-01-27T01:14:02.134ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = GET path = /v1/system/audit-log versions = all
28512026-01-27T01:14:02.134ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = GET path = /v1/system/hardware/disks versions = all
28522026-01-27T01:14:02.134ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = GET path = /v1/system/hardware/disks/{disk_id} versions = all
28532026-01-27T01:14:02.134ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = GET path = /v1/system/hardware/rack-switch-port/{rack_id}/{switch_location}/{port}/lldp/neighbors versions = all
28542026-01-27T01:14:02.134ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = GET path = /v1/system/hardware/racks versions = all
28552026-01-27T01:14:02.134ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = GET path = /v1/system/hardware/racks/{rack_id} versions = all
28562026-01-27T01:14:02.134ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = GET path = /v1/system/hardware/racks/{rack_id}/membership versions = all starting from 2026012100.0.0
28572026-01-27T01:14:02.134ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = POST path = /v1/system/hardware/racks/{rack_id}/membership/add versions = all starting from 2026012100.0.0
28582026-01-27T01:14:02.134ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = GET path = /v1/system/hardware/sleds versions = all
28592026-01-27T01:14:02.134ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = POST path = /v1/system/hardware/sleds versions = all
28602026-01-27T01:14:02.134ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = GET path = /v1/system/hardware/sleds/{sled_id} versions = all
28612026-01-27T01:14:02.134ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = GET path = /v1/system/hardware/sleds/{sled_id}/disks versions = all
28622026-01-27T01:14:02.134ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = GET path = /v1/system/hardware/sleds/{sled_id}/instances versions = all
28632026-01-27T01:14:02.134ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = PUT path = /v1/system/hardware/sleds/{sled_id}/provision-policy versions = all
28642026-01-27T01:14:02.134ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = GET path = /v1/system/hardware/sleds-uninitialized versions = all
28652026-01-27T01:14:02.134ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = GET path = /v1/system/hardware/switch-port versions = all
28662026-01-27T01:14:02.134ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = GET path = /v1/system/hardware/switch-port/{port}/lldp/config versions = all
28672026-01-27T01:14:02.134ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = POST path = /v1/system/hardware/switch-port/{port}/lldp/config versions = all
28682026-01-27T01:14:02.135ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = DELETE path = /v1/system/hardware/switch-port/{port}/settings versions = all
28692026-01-27T01:14:02.135ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = POST path = /v1/system/hardware/switch-port/{port}/settings versions = all
28702026-01-27T01:14:02.135ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = GET path = /v1/system/hardware/switch-port/{port}/status versions = all
28712026-01-27T01:14:02.135ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = GET path = /v1/system/hardware/switches versions = all
28722026-01-27T01:14:02.135ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = GET path = /v1/system/hardware/switches/{switch_id} versions = all
28732026-01-27T01:14:02.135ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = GET path = /v1/system/identity-providers versions = all
28742026-01-27T01:14:02.135ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = POST path = /v1/system/identity-providers/local/users versions = all
28752026-01-27T01:14:02.135ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = DELETE path = /v1/system/identity-providers/local/users/{user_id} versions = all
28762026-01-27T01:14:02.135ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = POST path = /v1/system/identity-providers/local/users/{user_id}/set-password versions = all
28772026-01-27T01:14:02.135ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = POST path = /v1/system/identity-providers/saml versions = all
28782026-01-27T01:14:02.135ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = GET path = /v1/system/identity-providers/saml/{provider} versions = all
28792026-01-27T01:14:02.135ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = GET path = /v1/system/ip-pools versions = all
28802026-01-27T01:14:02.135ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = POST path = /v1/system/ip-pools versions = all
28812026-01-27T01:14:02.135ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = DELETE path = /v1/system/ip-pools/{pool} versions = all
28822026-01-27T01:14:02.135ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = GET path = /v1/system/ip-pools/{pool} versions = all
28832026-01-27T01:14:02.135ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = PUT path = /v1/system/ip-pools/{pool} versions = all
28842026-01-27T01:14:02.135ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = GET path = /v1/system/ip-pools/{pool}/ranges versions = all
28852026-01-27T01:14:02.135ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = POST path = /v1/system/ip-pools/{pool}/ranges/add versions = all
28862026-01-27T01:14:02.135ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = POST path = /v1/system/ip-pools/{pool}/ranges/remove versions = all
28872026-01-27T01:14:02.135ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = GET path = /v1/system/ip-pools/{pool}/silos versions = all
28882026-01-27T01:14:02.135ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = POST path = /v1/system/ip-pools/{pool}/silos versions = all
28892026-01-27T01:14:02.135ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = DELETE path = /v1/system/ip-pools/{pool}/silos/{silo} versions = all
28902026-01-27T01:14:02.135ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = PUT path = /v1/system/ip-pools/{pool}/silos/{silo} versions = all
28912026-01-27T01:14:02.135ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = GET path = /v1/system/ip-pools/{pool}/utilization versions = all
28922026-01-27T01:14:02.136ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = GET path = /v1/system/ip-pools-service versions = all
28932026-01-27T01:14:02.136ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = GET path = /v1/system/ip-pools-service/ranges versions = all
28942026-01-27T01:14:02.136ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = POST path = /v1/system/ip-pools-service/ranges/add versions = all
28952026-01-27T01:14:02.136ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = POST path = /v1/system/ip-pools-service/ranges/remove versions = all
28962026-01-27T01:14:02.136ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = GET path = /v1/system/metrics/{metric_name} versions = all
28972026-01-27T01:14:02.136ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = GET path = /v1/system/multicast-groups/by-ip/{address} versions = all ending with 2026010800.0.0
28982026-01-27T01:14:02.136ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = GET path = /v1/system/networking/address-lot versions = all
28992026-01-27T01:14:02.136ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = POST path = /v1/system/networking/address-lot versions = all
29002026-01-27T01:14:02.136ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = DELETE path = /v1/system/networking/address-lot/{address_lot} versions = all
29012026-01-27T01:14:02.136ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = GET path = /v1/system/networking/address-lot/{address_lot} versions = all
29022026-01-27T01:14:02.136ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = GET path = /v1/system/networking/address-lot/{address_lot}/blocks versions = all
29032026-01-27T01:14:02.136ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = GET path = /v1/system/networking/allow-list versions = all
29042026-01-27T01:14:02.136ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = PUT path = /v1/system/networking/allow-list versions = all
29052026-01-27T01:14:02.136ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = POST path = /v1/system/networking/bfd-disable versions = all
29062026-01-27T01:14:02.136ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = POST path = /v1/system/networking/bfd-enable versions = all
29072026-01-27T01:14:02.136ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = GET path = /v1/system/networking/bfd-status versions = all
29082026-01-27T01:14:02.136ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = DELETE path = /v1/system/networking/bgp versions = all
29092026-01-27T01:14:02.136ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = GET path = /v1/system/networking/bgp versions = all
29102026-01-27T01:14:02.136ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = POST path = /v1/system/networking/bgp versions = all
29112026-01-27T01:14:02.136ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = GET path = /v1/system/networking/bgp-announce-set versions = all
29122026-01-27T01:14:02.136ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = PUT path = /v1/system/networking/bgp-announce-set versions = all
29132026-01-27T01:14:02.136ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = DELETE path = /v1/system/networking/bgp-announce-set/{announce_set} versions = all
29142026-01-27T01:14:02.136ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = GET path = /v1/system/networking/bgp-announce-set/{announce_set}/announcement versions = all
29152026-01-27T01:14:02.136ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = GET path = /v1/system/networking/bgp-exported versions = all
29162026-01-27T01:14:02.136ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = GET path = /v1/system/networking/bgp-message-history versions = all
29172026-01-27T01:14:02.137ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = GET path = /v1/system/networking/bgp-routes-ipv4 versions = all
29182026-01-27T01:14:02.137ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = GET path = /v1/system/networking/bgp-status versions = all ending with 2025121200.0.0
29192026-01-27T01:14:02.137ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = GET path = /v1/system/networking/bgp-status versions = all starting from 2025121200.0.0
29202026-01-27T01:14:02.137ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = GET path = /v1/system/networking/inbound-icmp versions = all
29212026-01-27T01:14:02.137ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = PUT path = /v1/system/networking/inbound-icmp versions = all
29222026-01-27T01:14:02.137ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = GET path = /v1/system/networking/loopback-address versions = all
29232026-01-27T01:14:02.137ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = POST path = /v1/system/networking/loopback-address versions = all
29242026-01-27T01:14:02.137ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = DELETE path = /v1/system/networking/loopback-address/{rack_id}/{switch_location}/{address}/{subnet_mask} versions = all
29252026-01-27T01:14:02.137ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = DELETE path = /v1/system/networking/switch-port-settings versions = all
29262026-01-27T01:14:02.137ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = GET path = /v1/system/networking/switch-port-settings versions = all
29272026-01-27T01:14:02.137ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = POST path = /v1/system/networking/switch-port-settings versions = all
29282026-01-27T01:14:02.137ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = GET path = /v1/system/networking/switch-port-settings/{port} versions = all
29292026-01-27T01:14:02.137ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = GET path = /v1/system/policy versions = all
29302026-01-27T01:14:02.137ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = PUT path = /v1/system/policy versions = all
29312026-01-27T01:14:02.137ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = GET path = /v1/system/scim/tokens versions = all
29322026-01-27T01:14:02.137ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = POST path = /v1/system/scim/tokens versions = all
29332026-01-27T01:14:02.137ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = DELETE path = /v1/system/scim/tokens/{token_id} versions = all
29342026-01-27T01:14:02.137ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = GET path = /v1/system/scim/tokens/{token_id} versions = all
29352026-01-27T01:14:02.137ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = GET path = /v1/system/silo-quotas versions = all
29362026-01-27T01:14:02.137ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = GET path = /v1/system/silos versions = all
29372026-01-27T01:14:02.137ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = POST path = /v1/system/silos versions = all
29382026-01-27T01:14:02.137ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = DELETE path = /v1/system/silos/{silo} versions = all
29392026-01-27T01:14:02.137ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = GET path = /v1/system/silos/{silo} versions = all
29402026-01-27T01:14:02.137ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = GET path = /v1/system/silos/{silo}/ip-pools versions = all ending with 2026010100.0.0
29412026-01-27T01:14:02.137ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = GET path = /v1/system/silos/{silo}/ip-pools versions = all starting from 2026010100.0.0
29422026-01-27T01:14:02.137ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = GET path = /v1/system/silos/{silo}/policy versions = all
29432026-01-27T01:14:02.137ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = PUT path = /v1/system/silos/{silo}/policy versions = all
29442026-01-27T01:14:02.138ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = GET path = /v1/system/silos/{silo}/quotas versions = all
29452026-01-27T01:14:02.138ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = PUT path = /v1/system/silos/{silo}/quotas versions = all
29462026-01-27T01:14:02.138ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = GET path = /v1/system/subnet-pools versions = all starting from 2026011601.0.0
29472026-01-27T01:14:02.138ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = POST path = /v1/system/subnet-pools versions = all starting from 2026012201.0.0
29482026-01-27T01:14:02.138ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = POST path = /v1/system/subnet-pools versions = from 2026011601.0.0 to 2026012201.0.0
29492026-01-27T01:14:02.138ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = DELETE path = /v1/system/subnet-pools/{pool} versions = all starting from 2026011601.0.0
29502026-01-27T01:14:02.138ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = GET path = /v1/system/subnet-pools/{pool} versions = all starting from 2026011601.0.0
29512026-01-27T01:14:02.138ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = PUT path = /v1/system/subnet-pools/{pool} versions = all starting from 2026011601.0.0
29522026-01-27T01:14:02.138ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = GET path = /v1/system/subnet-pools/{pool}/members versions = all starting from 2026011601.0.0
29532026-01-27T01:14:02.138ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = POST path = /v1/system/subnet-pools/{pool}/members/add versions = all starting from 2026012201.0.0
29542026-01-27T01:14:02.138ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = POST path = /v1/system/subnet-pools/{pool}/members/add versions = from 2026011601.0.0 to 2026012201.0.0
29552026-01-27T01:14:02.138ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = POST path = /v1/system/subnet-pools/{pool}/members/remove versions = all starting from 2026011601.0.0
29562026-01-27T01:14:02.138ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = GET path = /v1/system/subnet-pools/{pool}/silos versions = all starting from 2026011601.0.0
29572026-01-27T01:14:02.138ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = POST path = /v1/system/subnet-pools/{pool}/silos versions = all starting from 2026011601.0.0
29582026-01-27T01:14:02.138ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = DELETE path = /v1/system/subnet-pools/{pool}/silos/{silo} versions = all starting from 2026011601.0.0
29592026-01-27T01:14:02.138ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = PUT path = /v1/system/subnet-pools/{pool}/silos/{silo} versions = all starting from 2026011601.0.0
29602026-01-27T01:14:02.138ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = GET path = /v1/system/subnet-pools/{pool}/utilization versions = all starting from 2026011601.0.0
29612026-01-27T01:14:02.138ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = POST path = /v1/system/timeseries/query versions = all
29622026-01-27T01:14:02.138ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = GET path = /v1/system/timeseries/schemas versions = all
29632026-01-27T01:14:02.138ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = GET path = /v1/system/update/repositories versions = all
29642026-01-27T01:14:02.138ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = PUT path = /v1/system/update/repositories versions = all
29652026-01-27T01:14:02.138ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = GET path = /v1/system/update/repositories/{system_version} versions = all
29662026-01-27T01:14:02.138ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = GET path = /v1/system/update/status versions = all
29672026-01-27T01:14:02.138ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = PUT path = /v1/system/update/target-release versions = all
29682026-01-27T01:14:02.138ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = GET path = /v1/system/update/trust-roots versions = all
29692026-01-27T01:14:02.138ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = POST path = /v1/system/update/trust-roots versions = all
29702026-01-27T01:14:02.139ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = DELETE path = /v1/system/update/trust-roots/{trust_root_id} versions = all
29712026-01-27T01:14:02.139ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = GET path = /v1/system/update/trust-roots/{trust_root_id} versions = all
29722026-01-27T01:14:02.139ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = GET path = /v1/system/users versions = all
29732026-01-27T01:14:02.139ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = GET path = /v1/system/users/{user_id} versions = all
29742026-01-27T01:14:02.139ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = GET path = /v1/system/users-builtin versions = all
29752026-01-27T01:14:02.139ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = GET path = /v1/system/users-builtin/{user} versions = all
29762026-01-27T01:14:02.139ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = GET path = /v1/system/utilization/silos versions = all
29772026-01-27T01:14:02.139ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = GET path = /v1/system/utilization/silos/{silo} versions = all
29782026-01-27T01:14:02.139ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = POST path = /v1/timeseries/query versions = all
29792026-01-27T01:14:02.139ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = GET path = /v1/users versions = all
29802026-01-27T01:14:02.139ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = GET path = /v1/users/{user_id} versions = all
29812026-01-27T01:14:02.139ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = GET path = /v1/users/{user_id}/access-tokens versions = all
29822026-01-27T01:14:02.139ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = POST path = /v1/users/{user_id}/logout versions = all
29832026-01-27T01:14:02.139ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = GET path = /v1/users/{user_id}/sessions versions = all
29842026-01-27T01:14:02.139ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = GET path = /v1/utilization versions = all
29852026-01-27T01:14:02.139ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = GET path = /v1/vpc-firewall-rules versions = all
29862026-01-27T01:14:02.139ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = PUT path = /v1/vpc-firewall-rules versions = all
29872026-01-27T01:14:02.139ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = GET path = /v1/vpc-router-routes versions = all
29882026-01-27T01:14:02.139ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = POST path = /v1/vpc-router-routes versions = all
29892026-01-27T01:14:02.139ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = DELETE path = /v1/vpc-router-routes/{route} versions = all
29902026-01-27T01:14:02.139ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = GET path = /v1/vpc-router-routes/{route} versions = all
29912026-01-27T01:14:02.139ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = PUT path = /v1/vpc-router-routes/{route} versions = all
29922026-01-27T01:14:02.139ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = GET path = /v1/vpc-routers versions = all
29932026-01-27T01:14:02.139ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = POST path = /v1/vpc-routers versions = all
29942026-01-27T01:14:02.139ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = DELETE path = /v1/vpc-routers/{router} versions = all
29952026-01-27T01:14:02.139ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = GET path = /v1/vpc-routers/{router} versions = all
29962026-01-27T01:14:02.139ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = PUT path = /v1/vpc-routers/{router} versions = all
29972026-01-27T01:14:02.139ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = GET path = /v1/vpc-subnets versions = all
29982026-01-27T01:14:02.140ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = POST path = /v1/vpc-subnets versions = all
29992026-01-27T01:14:02.140ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = DELETE path = /v1/vpc-subnets/{subnet} versions = all
30002026-01-27T01:14:02.140ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = GET path = /v1/vpc-subnets/{subnet} versions = all
30012026-01-27T01:14:02.140ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = PUT path = /v1/vpc-subnets/{subnet} versions = all
30022026-01-27T01:14:02.140ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = GET path = /v1/vpc-subnets/{subnet}/network-interfaces versions = all ending with 2026010300.0.0
30032026-01-27T01:14:02.140ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = GET path = /v1/vpc-subnets/{subnet}/network-interfaces versions = all starting from 2026010300.0.0
30042026-01-27T01:14:02.140ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = GET path = /v1/vpcs versions = all
30052026-01-27T01:14:02.140ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = POST path = /v1/vpcs versions = all
30062026-01-27T01:14:02.140ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = DELETE path = /v1/vpcs/{vpc} versions = all
30072026-01-27T01:14:02.140ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = GET path = /v1/vpcs/{vpc} versions = all
30082026-01-27T01:14:02.140ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = PUT path = /v1/vpcs/{vpc} versions = all
30092026-01-27T01:14:02.140ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = POST path = /v1/webhook-receivers versions = all
30102026-01-27T01:14:02.140ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = PUT path = /v1/webhook-receivers/{receiver} versions = all
30112026-01-27T01:14:02.140ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = GET path = /v1/webhook-secrets versions = all
30122026-01-27T01:14:02.140ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = POST path = /v1/webhook-secrets versions = all
30132026-01-27T01:14:02.140ZDEBGtest_vpcs (dropshot_external): registered endpoint local_addr = 127.0.0.1:50372 method = DELETE path = /v1/webhook-secrets/{secret_id} versions = all
30142026-01-27T01:14:02.140ZINFOtest_vpcs (dropshot_external): listening local_addr = 127.0.0.1:50372
30152026-01-27T01:14:02.140ZDEBGtest_vpcs (dropshot_external): successfully registered DTrace USDT probes local_addr = 127.0.0.1:50372
30162026-01-27T01:14:02.331ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = GET path = / versions = all
30172026-01-27T01:14:02.331ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = GET path = /access versions = all
30182026-01-27T01:14:02.332ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = GET path = /assets/{path} versions = all
30192026-01-27T01:14:02.332ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = POST path = /device/auth versions = all
30202026-01-27T01:14:02.332ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = POST path = /device/confirm versions = all
30212026-01-27T01:14:02.332ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = GET path = /device/success versions = all
30222026-01-27T01:14:02.332ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = POST path = /device/token versions = all
30232026-01-27T01:14:02.332ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = GET path = /device/verify versions = all
30242026-01-27T01:14:02.332ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = GET path = /experimental/v1/probes versions = all ending with 2026010300.0.0
30252026-01-27T01:14:02.332ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = GET path = /experimental/v1/probes versions = all starting from 2026010300.0.0
30262026-01-27T01:14:02.332ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = POST path = /experimental/v1/probes versions = all ending with 2026010500.0.0
30272026-01-27T01:14:02.332ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = POST path = /experimental/v1/probes versions = all starting from 2026010500.0.0
30282026-01-27T01:14:02.332ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = DELETE path = /experimental/v1/probes/{probe} versions = all
30292026-01-27T01:14:02.332ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = GET path = /experimental/v1/probes/{probe} versions = all ending with 2026010300.0.0
30302026-01-27T01:14:02.332ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = GET path = /experimental/v1/probes/{probe} versions = all starting from 2026010300.0.0
30312026-01-27T01:14:02.332ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = GET path = /experimental/v1/system/support-bundles versions = all
30322026-01-27T01:14:02.332ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = POST path = /experimental/v1/system/support-bundles versions = all
30332026-01-27T01:14:02.332ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = DELETE path = /experimental/v1/system/support-bundles/{bundle_id} versions = all
30342026-01-27T01:14:02.332ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = GET path = /experimental/v1/system/support-bundles/{bundle_id} versions = all
30352026-01-27T01:14:02.332ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = PUT path = /experimental/v1/system/support-bundles/{bundle_id} versions = all
30362026-01-27T01:14:02.332ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = GET path = /experimental/v1/system/support-bundles/{bundle_id}/download versions = all
30372026-01-27T01:14:02.332ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = HEAD path = /experimental/v1/system/support-bundles/{bundle_id}/download versions = all
30382026-01-27T01:14:02.332ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = GET path = /experimental/v1/system/support-bundles/{bundle_id}/download/{file} versions = all
30392026-01-27T01:14:02.332ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = HEAD path = /experimental/v1/system/support-bundles/{bundle_id}/download/{file} versions = all
30402026-01-27T01:14:02.333ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = GET path = /experimental/v1/system/support-bundles/{bundle_id}/index versions = all
30412026-01-27T01:14:02.333ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = GET path = /images versions = all
30422026-01-27T01:14:02.333ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = GET path = /login versions = all
30432026-01-27T01:14:02.333ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = GET path = /login/{silo_name}/local versions = all
30442026-01-27T01:14:02.333ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = GET path = /login/{silo_name}/saml/{provider_name} versions = all
30452026-01-27T01:14:02.333ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = POST path = /login/{silo_name}/saml/{provider_name} versions = all
30462026-01-27T01:14:02.333ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = GET path = /login/{silo_name}/saml/{provider_name}/redirect versions = all
30472026-01-27T01:14:02.333ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = GET path = /lookup/{path} versions = all
30482026-01-27T01:14:02.333ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = GET path = /projects/{path} versions = all
30492026-01-27T01:14:02.333ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = GET path = /projects-new versions = all
30502026-01-27T01:14:02.333ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = GET path = /scim/v2/Groups versions = all
30512026-01-27T01:14:02.333ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = POST path = /scim/v2/Groups versions = all
30522026-01-27T01:14:02.333ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = DELETE path = /scim/v2/Groups/{group_id} versions = all
30532026-01-27T01:14:02.333ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = GET path = /scim/v2/Groups/{group_id} versions = all
30542026-01-27T01:14:02.333ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = PATCH path = /scim/v2/Groups/{group_id} versions = all
30552026-01-27T01:14:02.333ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = PUT path = /scim/v2/Groups/{group_id} versions = all
30562026-01-27T01:14:02.333ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = GET path = /scim/v2/Users versions = all
30572026-01-27T01:14:02.333ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = POST path = /scim/v2/Users versions = all
30582026-01-27T01:14:02.333ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = DELETE path = /scim/v2/Users/{user_id} versions = all
30592026-01-27T01:14:02.333ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = GET path = /scim/v2/Users/{user_id} versions = all
30602026-01-27T01:14:02.333ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = PATCH path = /scim/v2/Users/{user_id} versions = all
30612026-01-27T01:14:02.333ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = PUT path = /scim/v2/Users/{user_id} versions = all
30622026-01-27T01:14:02.333ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = GET path = /settings/{path} versions = all
30632026-01-27T01:14:02.334ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = GET path = /system/{path} versions = all
30642026-01-27T01:14:02.334ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = GET path = /utilization versions = all
30652026-01-27T01:14:02.334ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = GET path = /v1/affinity-groups versions = all
30662026-01-27T01:14:02.334ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = POST path = /v1/affinity-groups versions = all
30672026-01-27T01:14:02.334ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = DELETE path = /v1/affinity-groups/{affinity_group} versions = all
30682026-01-27T01:14:02.334ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = GET path = /v1/affinity-groups/{affinity_group} versions = all
30692026-01-27T01:14:02.334ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = PUT path = /v1/affinity-groups/{affinity_group} versions = all
30702026-01-27T01:14:02.334ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = GET path = /v1/affinity-groups/{affinity_group}/members versions = all
30712026-01-27T01:14:02.334ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = DELETE path = /v1/affinity-groups/{affinity_group}/members/instance/{instance} versions = all
30722026-01-27T01:14:02.334ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = GET path = /v1/affinity-groups/{affinity_group}/members/instance/{instance} versions = all
30732026-01-27T01:14:02.334ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = POST path = /v1/affinity-groups/{affinity_group}/members/instance/{instance} versions = all
30742026-01-27T01:14:02.334ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = GET path = /v1/alert-classes versions = all
30752026-01-27T01:14:02.334ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = GET path = /v1/alert-receivers versions = all
30762026-01-27T01:14:02.334ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = DELETE path = /v1/alert-receivers/{receiver} versions = all
30772026-01-27T01:14:02.334ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = GET path = /v1/alert-receivers/{receiver} versions = all
30782026-01-27T01:14:02.334ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = GET path = /v1/alert-receivers/{receiver}/deliveries versions = all
30792026-01-27T01:14:02.334ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = POST path = /v1/alert-receivers/{receiver}/probe versions = all
30802026-01-27T01:14:02.334ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = POST path = /v1/alert-receivers/{receiver}/subscriptions versions = all
30812026-01-27T01:14:02.334ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = DELETE path = /v1/alert-receivers/{receiver}/subscriptions/{subscription} versions = all
30822026-01-27T01:14:02.334ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = POST path = /v1/alerts/{alert_id}/resend versions = all
30832026-01-27T01:14:02.334ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = GET path = /v1/anti-affinity-groups versions = all
30842026-01-27T01:14:02.334ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = POST path = /v1/anti-affinity-groups versions = all
30852026-01-27T01:14:02.335ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = DELETE path = /v1/anti-affinity-groups/{anti_affinity_group} versions = all
30862026-01-27T01:14:02.335ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = GET path = /v1/anti-affinity-groups/{anti_affinity_group} versions = all
30872026-01-27T01:14:02.335ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = PUT path = /v1/anti-affinity-groups/{anti_affinity_group} versions = all
30882026-01-27T01:14:02.335ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = GET path = /v1/anti-affinity-groups/{anti_affinity_group}/members versions = all
30892026-01-27T01:14:02.335ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = DELETE path = /v1/anti-affinity-groups/{anti_affinity_group}/members/instance/{instance} versions = all
30902026-01-27T01:14:02.335ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = GET path = /v1/anti-affinity-groups/{anti_affinity_group}/members/instance/{instance} versions = all
30912026-01-27T01:14:02.335ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = POST path = /v1/anti-affinity-groups/{anti_affinity_group}/members/instance/{instance} versions = all
30922026-01-27T01:14:02.335ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = GET path = /v1/auth-settings versions = all
30932026-01-27T01:14:02.335ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = PUT path = /v1/auth-settings versions = all
30942026-01-27T01:14:02.335ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = GET path = /v1/certificates versions = all
30952026-01-27T01:14:02.335ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = POST path = /v1/certificates versions = all
30962026-01-27T01:14:02.335ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = DELETE path = /v1/certificates/{certificate} versions = all
30972026-01-27T01:14:02.335ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = GET path = /v1/certificates/{certificate} versions = all
30982026-01-27T01:14:02.335ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = GET path = /v1/disks versions = all ending with 2025120300.0.0
30992026-01-27T01:14:02.335ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = GET path = /v1/disks versions = all starting from 2025120300.0.0
31002026-01-27T01:14:02.335ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = POST path = /v1/disks versions = all ending with 2025120300.0.0
31012026-01-27T01:14:02.335ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = POST path = /v1/disks versions = all starting from 2025120300.0.0
31022026-01-27T01:14:02.335ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = DELETE path = /v1/disks/{disk} versions = all
31032026-01-27T01:14:02.335ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = GET path = /v1/disks/{disk} versions = all ending with 2025120300.0.0
31042026-01-27T01:14:02.335ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = GET path = /v1/disks/{disk} versions = all starting from 2025120300.0.0
31052026-01-27T01:14:02.335ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = POST path = /v1/disks/{disk}/bulk-write versions = all
31062026-01-27T01:14:02.335ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = POST path = /v1/disks/{disk}/bulk-write-start versions = all
31072026-01-27T01:14:02.335ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = POST path = /v1/disks/{disk}/bulk-write-stop versions = all
31082026-01-27T01:14:02.335ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = POST path = /v1/disks/{disk}/finalize versions = all
31092026-01-27T01:14:02.335ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = GET path = /v1/external-subnets versions = all starting from 2026011601.0.0
31102026-01-27T01:14:02.335ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = POST path = /v1/external-subnets versions = all starting from 2026012201.0.0
31112026-01-27T01:14:02.336ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = POST path = /v1/external-subnets versions = from 2026011601.0.0 to 2026012201.0.0
31122026-01-27T01:14:02.336ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = DELETE path = /v1/external-subnets/{external_subnet} versions = all starting from 2026011601.0.0
31132026-01-27T01:14:02.336ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = GET path = /v1/external-subnets/{external_subnet} versions = all starting from 2026011601.0.0
31142026-01-27T01:14:02.336ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = PUT path = /v1/external-subnets/{external_subnet} versions = all starting from 2026011601.0.0
31152026-01-27T01:14:02.336ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = POST path = /v1/external-subnets/{external_subnet}/attach versions = all starting from 2026011601.0.0
31162026-01-27T01:14:02.336ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = POST path = /v1/external-subnets/{external_subnet}/detach versions = all starting from 2026011601.0.0
31172026-01-27T01:14:02.336ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = GET path = /v1/floating-ips versions = all
31182026-01-27T01:14:02.336ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = POST path = /v1/floating-ips versions = all starting from 2026012200.0.0
31192026-01-27T01:14:02.336ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = POST path = /v1/floating-ips versions = from 2026011600.0.0 to 2026012200.0.0
31202026-01-27T01:14:02.336ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = POST path = /v1/floating-ips versions = from 2026010500.0.0 to 2026011600.0.0
31212026-01-27T01:14:02.336ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = POST path = /v1/floating-ips versions = from 2025122300.0.0 to 2026010500.0.0
31222026-01-27T01:14:02.336ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = POST path = /v1/floating-ips versions = all ending with 2025122300.0.0
31232026-01-27T01:14:02.336ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = DELETE path = /v1/floating-ips/{floating_ip} versions = all
31242026-01-27T01:14:02.336ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = GET path = /v1/floating-ips/{floating_ip} versions = all
31252026-01-27T01:14:02.336ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = PUT path = /v1/floating-ips/{floating_ip} versions = all
31262026-01-27T01:14:02.336ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = POST path = /v1/floating-ips/{floating_ip}/attach versions = all
31272026-01-27T01:14:02.336ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = POST path = /v1/floating-ips/{floating_ip}/detach versions = all
31282026-01-27T01:14:02.336ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = GET path = /v1/groups versions = all
31292026-01-27T01:14:02.336ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = GET path = /v1/groups/{group_id} versions = all
31302026-01-27T01:14:02.336ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = GET path = /v1/images versions = all
31312026-01-27T01:14:02.336ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = POST path = /v1/images versions = all
31322026-01-27T01:14:02.336ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = DELETE path = /v1/images/{image} versions = all
31332026-01-27T01:14:02.336ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = GET path = /v1/images/{image} versions = all
31342026-01-27T01:14:02.336ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = POST path = /v1/images/{image}/demote versions = all
31352026-01-27T01:14:02.336ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = POST path = /v1/images/{image}/promote versions = all
31362026-01-27T01:14:02.336ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = GET path = /v1/instances versions = all
31372026-01-27T01:14:02.337ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = POST path = /v1/instances versions = all ending with 2025120300.0.0
31382026-01-27T01:14:02.337ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = POST path = /v1/instances versions = from 2025120300.0.0 to 2025122300.0.0
31392026-01-27T01:14:02.337ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = POST path = /v1/instances versions = from 2025122300.0.0 to 2026010300.0.0
31402026-01-27T01:14:02.337ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = POST path = /v1/instances versions = from 2026010300.0.0 to 2026010500.0.0
31412026-01-27T01:14:02.337ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = POST path = /v1/instances versions = from 2026010500.0.0 to 2026010800.0.0
31422026-01-27T01:14:02.337ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = POST path = /v1/instances versions = all starting from 2026010800.0.0
31432026-01-27T01:14:02.337ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = DELETE path = /v1/instances/{instance} versions = all
31442026-01-27T01:14:02.337ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = GET path = /v1/instances/{instance} versions = all
31452026-01-27T01:14:02.337ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = PUT path = /v1/instances/{instance} versions = all ending with 2026010800.0.0
31462026-01-27T01:14:02.337ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = PUT path = /v1/instances/{instance} versions = all starting from 2026010800.0.0
31472026-01-27T01:14:02.337ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = GET path = /v1/instances/{instance}/affinity-groups versions = all
31482026-01-27T01:14:02.337ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = GET path = /v1/instances/{instance}/anti-affinity-groups versions = all
31492026-01-27T01:14:02.337ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = GET path = /v1/instances/{instance}/disks versions = all ending with 2025120300.0.0
31502026-01-27T01:14:02.337ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = GET path = /v1/instances/{instance}/disks versions = all starting from 2025120300.0.0
31512026-01-27T01:14:02.337ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = POST path = /v1/instances/{instance}/disks/attach versions = all ending with 2025120300.0.0
31522026-01-27T01:14:02.337ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = POST path = /v1/instances/{instance}/disks/attach versions = all starting from 2025120300.0.0
31532026-01-27T01:14:02.337ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = POST path = /v1/instances/{instance}/disks/detach versions = all ending with 2025120300.0.0
31542026-01-27T01:14:02.337ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = POST path = /v1/instances/{instance}/disks/detach versions = all starting from 2025120300.0.0
31552026-01-27T01:14:02.337ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = GET path = /v1/instances/{instance}/external-ips versions = all
31562026-01-27T01:14:02.337ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = DELETE path = /v1/instances/{instance}/external-ips/ephemeral versions = all
31572026-01-27T01:14:02.337ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = POST path = /v1/instances/{instance}/external-ips/ephemeral versions = all ending with 2025122300.0.0
31582026-01-27T01:14:02.337ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = POST path = /v1/instances/{instance}/external-ips/ephemeral versions = from 2025122300.0.0 to 2026010500.0.0
31592026-01-27T01:14:02.337ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = POST path = /v1/instances/{instance}/external-ips/ephemeral versions = all starting from 2026010500.0.0
31602026-01-27T01:14:02.337ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = GET path = /v1/instances/{instance}/multicast-groups versions = all ending with 2026010800.0.0
31612026-01-27T01:14:02.337ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = GET path = /v1/instances/{instance}/multicast-groups versions = all starting from 2026010800.0.0
31622026-01-27T01:14:02.337ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = DELETE path = /v1/instances/{instance}/multicast-groups/{multicast_group} versions = all ending with 2026010800.0.0
31632026-01-27T01:14:02.338ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = DELETE path = /v1/instances/{instance}/multicast-groups/{multicast_group} versions = all starting from 2026010800.0.0
31642026-01-27T01:14:02.338ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = PUT path = /v1/instances/{instance}/multicast-groups/{multicast_group} versions = all ending with 2026010800.0.0
31652026-01-27T01:14:02.338ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = PUT path = /v1/instances/{instance}/multicast-groups/{multicast_group} versions = all starting from 2026010800.0.0
31662026-01-27T01:14:02.338ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = POST path = /v1/instances/{instance}/reboot versions = all
31672026-01-27T01:14:02.338ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = GET path = /v1/instances/{instance}/serial-console versions = all
31682026-01-27T01:14:02.338ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = GET path = /v1/instances/{instance}/serial-console/stream versions = all
31692026-01-27T01:14:02.338ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = GET path = /v1/instances/{instance}/ssh-public-keys versions = all
31702026-01-27T01:14:02.338ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = POST path = /v1/instances/{instance}/start versions = all
31712026-01-27T01:14:02.338ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = POST path = /v1/instances/{instance}/stop versions = all
31722026-01-27T01:14:02.338ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = GET path = /v1/internet-gateway-ip-addresses versions = all
31732026-01-27T01:14:02.338ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = POST path = /v1/internet-gateway-ip-addresses versions = all
31742026-01-27T01:14:02.338ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = DELETE path = /v1/internet-gateway-ip-addresses/{address} versions = all
31752026-01-27T01:14:02.338ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = GET path = /v1/internet-gateway-ip-pools versions = all
31762026-01-27T01:14:02.338ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = POST path = /v1/internet-gateway-ip-pools versions = all
31772026-01-27T01:14:02.338ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = DELETE path = /v1/internet-gateway-ip-pools/{pool} versions = all
31782026-01-27T01:14:02.338ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = GET path = /v1/internet-gateways versions = all
31792026-01-27T01:14:02.338ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = POST path = /v1/internet-gateways versions = all
31802026-01-27T01:14:02.338ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = DELETE path = /v1/internet-gateways/{gateway} versions = all
31812026-01-27T01:14:02.338ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = GET path = /v1/internet-gateways/{gateway} versions = all
31822026-01-27T01:14:02.338ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = GET path = /v1/ip-pools versions = all ending with 2026010100.0.0
31832026-01-27T01:14:02.338ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = GET path = /v1/ip-pools versions = all starting from 2026010100.0.0
31842026-01-27T01:14:02.338ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = GET path = /v1/ip-pools/{pool} versions = all ending with 2026010100.0.0
31852026-01-27T01:14:02.338ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = GET path = /v1/ip-pools/{pool} versions = all starting from 2026010100.0.0
31862026-01-27T01:14:02.338ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = POST path = /v1/login/{silo_name}/local versions = all
31872026-01-27T01:14:02.339ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = POST path = /v1/logout versions = all
31882026-01-27T01:14:02.339ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = GET path = /v1/me versions = all
31892026-01-27T01:14:02.339ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = GET path = /v1/me/access-tokens versions = all
31902026-01-27T01:14:02.339ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = DELETE path = /v1/me/access-tokens/{token_id} versions = all
31912026-01-27T01:14:02.339ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = GET path = /v1/me/groups versions = all
31922026-01-27T01:14:02.339ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = GET path = /v1/me/ssh-keys versions = all
31932026-01-27T01:14:02.339ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = POST path = /v1/me/ssh-keys versions = all
31942026-01-27T01:14:02.339ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = DELETE path = /v1/me/ssh-keys/{ssh_key} versions = all
31952026-01-27T01:14:02.339ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = GET path = /v1/me/ssh-keys/{ssh_key} versions = all
31962026-01-27T01:14:02.339ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = GET path = /v1/metrics/{metric_name} versions = all
31972026-01-27T01:14:02.339ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = GET path = /v1/multicast-groups versions = all ending with 2026010800.0.0
31982026-01-27T01:14:02.339ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = GET path = /v1/multicast-groups versions = all starting from 2026010800.0.0
31992026-01-27T01:14:02.339ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = POST path = /v1/multicast-groups versions = all ending with 2026010800.0.0
32002026-01-27T01:14:02.339ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = DELETE path = /v1/multicast-groups/{multicast_group} versions = all ending with 2026010800.0.0
32012026-01-27T01:14:02.339ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = GET path = /v1/multicast-groups/{multicast_group} versions = all ending with 2026010800.0.0
32022026-01-27T01:14:02.339ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = GET path = /v1/multicast-groups/{multicast_group} versions = all starting from 2026010800.0.0
32032026-01-27T01:14:02.339ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = PUT path = /v1/multicast-groups/{multicast_group} versions = all ending with 2026010800.0.0
32042026-01-27T01:14:02.339ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = GET path = /v1/multicast-groups/{multicast_group}/members versions = all ending with 2026010800.0.0
32052026-01-27T01:14:02.339ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = GET path = /v1/multicast-groups/{multicast_group}/members versions = all starting from 2026010800.0.0
32062026-01-27T01:14:02.339ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = POST path = /v1/multicast-groups/{multicast_group}/members versions = all ending with 2026010800.0.0
32072026-01-27T01:14:02.339ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = DELETE path = /v1/multicast-groups/{multicast_group}/members/{instance} versions = all ending with 2026010800.0.0
32082026-01-27T01:14:02.339ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = GET path = /v1/network-interfaces versions = all ending with 2026010300.0.0
32092026-01-27T01:14:02.339ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = GET path = /v1/network-interfaces versions = all starting from 2026010300.0.0
32102026-01-27T01:14:02.339ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = POST path = /v1/network-interfaces versions = all ending with 2026010300.0.0
32112026-01-27T01:14:02.339ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = POST path = /v1/network-interfaces versions = all starting from 2026010300.0.0
32122026-01-27T01:14:02.340ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = DELETE path = /v1/network-interfaces/{interface} versions = all
32132026-01-27T01:14:02.340ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = GET path = /v1/network-interfaces/{interface} versions = all ending with 2026010300.0.0
32142026-01-27T01:14:02.340ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = GET path = /v1/network-interfaces/{interface} versions = all starting from 2026010300.0.0
32152026-01-27T01:14:02.340ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = PUT path = /v1/network-interfaces/{interface} versions = all ending with 2026010300.0.0
32162026-01-27T01:14:02.340ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = PUT path = /v1/network-interfaces/{interface} versions = all starting from 2026010300.0.0
32172026-01-27T01:14:02.340ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = GET path = /v1/ping versions = all
32182026-01-27T01:14:02.340ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = GET path = /v1/policy versions = all
32192026-01-27T01:14:02.340ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = PUT path = /v1/policy versions = all
32202026-01-27T01:14:02.340ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = GET path = /v1/projects versions = all
32212026-01-27T01:14:02.340ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = POST path = /v1/projects versions = all
32222026-01-27T01:14:02.340ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = DELETE path = /v1/projects/{project} versions = all
32232026-01-27T01:14:02.340ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = GET path = /v1/projects/{project} versions = all
32242026-01-27T01:14:02.340ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = PUT path = /v1/projects/{project} versions = all
32252026-01-27T01:14:02.340ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = GET path = /v1/projects/{project}/policy versions = all
32262026-01-27T01:14:02.340ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = PUT path = /v1/projects/{project}/policy versions = all
32272026-01-27T01:14:02.340ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = GET path = /v1/snapshots versions = all
32282026-01-27T01:14:02.340ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = POST path = /v1/snapshots versions = all
32292026-01-27T01:14:02.340ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = DELETE path = /v1/snapshots/{snapshot} versions = all
32302026-01-27T01:14:02.340ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = GET path = /v1/snapshots/{snapshot} versions = all
32312026-01-27T01:14:02.340ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = GET path = /v1/system/audit-log versions = all
32322026-01-27T01:14:02.340ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = GET path = /v1/system/hardware/disks versions = all
32332026-01-27T01:14:02.340ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = GET path = /v1/system/hardware/disks/{disk_id} versions = all
32342026-01-27T01:14:02.340ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = GET path = /v1/system/hardware/rack-switch-port/{rack_id}/{switch_location}/{port}/lldp/neighbors versions = all
32352026-01-27T01:14:02.340ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = GET path = /v1/system/hardware/racks versions = all
32362026-01-27T01:14:02.340ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = GET path = /v1/system/hardware/racks/{rack_id} versions = all
32372026-01-27T01:14:02.340ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = GET path = /v1/system/hardware/racks/{rack_id}/membership versions = all starting from 2026012100.0.0
32382026-01-27T01:14:02.341ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = POST path = /v1/system/hardware/racks/{rack_id}/membership/add versions = all starting from 2026012100.0.0
32392026-01-27T01:14:02.341ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = GET path = /v1/system/hardware/sleds versions = all
32402026-01-27T01:14:02.341ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = POST path = /v1/system/hardware/sleds versions = all
32412026-01-27T01:14:02.341ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = GET path = /v1/system/hardware/sleds/{sled_id} versions = all
32422026-01-27T01:14:02.341ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = GET path = /v1/system/hardware/sleds/{sled_id}/disks versions = all
32432026-01-27T01:14:02.341ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = GET path = /v1/system/hardware/sleds/{sled_id}/instances versions = all
32442026-01-27T01:14:02.341ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = PUT path = /v1/system/hardware/sleds/{sled_id}/provision-policy versions = all
32452026-01-27T01:14:02.341ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = GET path = /v1/system/hardware/sleds-uninitialized versions = all
32462026-01-27T01:14:02.341ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = GET path = /v1/system/hardware/switch-port versions = all
32472026-01-27T01:14:02.341ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = GET path = /v1/system/hardware/switch-port/{port}/lldp/config versions = all
32482026-01-27T01:14:02.341ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = POST path = /v1/system/hardware/switch-port/{port}/lldp/config versions = all
32492026-01-27T01:14:02.341ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = DELETE path = /v1/system/hardware/switch-port/{port}/settings versions = all
32502026-01-27T01:14:02.341ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = POST path = /v1/system/hardware/switch-port/{port}/settings versions = all
32512026-01-27T01:14:02.341ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = GET path = /v1/system/hardware/switch-port/{port}/status versions = all
32522026-01-27T01:14:02.341ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = GET path = /v1/system/hardware/switches versions = all
32532026-01-27T01:14:02.341ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = GET path = /v1/system/hardware/switches/{switch_id} versions = all
32542026-01-27T01:14:02.341ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = GET path = /v1/system/identity-providers versions = all
32552026-01-27T01:14:02.341ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = POST path = /v1/system/identity-providers/local/users versions = all
32562026-01-27T01:14:02.341ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = DELETE path = /v1/system/identity-providers/local/users/{user_id} versions = all
32572026-01-27T01:14:02.341ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = POST path = /v1/system/identity-providers/local/users/{user_id}/set-password versions = all
32582026-01-27T01:14:02.341ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = POST path = /v1/system/identity-providers/saml versions = all
32592026-01-27T01:14:02.341ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = GET path = /v1/system/identity-providers/saml/{provider} versions = all
32602026-01-27T01:14:02.341ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = GET path = /v1/system/ip-pools versions = all
32612026-01-27T01:14:02.341ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = POST path = /v1/system/ip-pools versions = all
32622026-01-27T01:14:02.341ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = DELETE path = /v1/system/ip-pools/{pool} versions = all
32632026-01-27T01:14:02.341ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = GET path = /v1/system/ip-pools/{pool} versions = all
32642026-01-27T01:14:02.342ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = PUT path = /v1/system/ip-pools/{pool} versions = all
32652026-01-27T01:14:02.342ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = GET path = /v1/system/ip-pools/{pool}/ranges versions = all
32662026-01-27T01:14:02.342ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = POST path = /v1/system/ip-pools/{pool}/ranges/add versions = all
32672026-01-27T01:14:02.342ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = POST path = /v1/system/ip-pools/{pool}/ranges/remove versions = all
32682026-01-27T01:14:02.342ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = GET path = /v1/system/ip-pools/{pool}/silos versions = all
32692026-01-27T01:14:02.342ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = POST path = /v1/system/ip-pools/{pool}/silos versions = all
32702026-01-27T01:14:02.342ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = DELETE path = /v1/system/ip-pools/{pool}/silos/{silo} versions = all
32712026-01-27T01:14:02.342ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = PUT path = /v1/system/ip-pools/{pool}/silos/{silo} versions = all
32722026-01-27T01:14:02.342ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = GET path = /v1/system/ip-pools/{pool}/utilization versions = all
32732026-01-27T01:14:02.342ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = GET path = /v1/system/ip-pools-service versions = all
32742026-01-27T01:14:02.342ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = GET path = /v1/system/ip-pools-service/ranges versions = all
32752026-01-27T01:14:02.342ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = POST path = /v1/system/ip-pools-service/ranges/add versions = all
32762026-01-27T01:14:02.342ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = POST path = /v1/system/ip-pools-service/ranges/remove versions = all
32772026-01-27T01:14:02.342ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = GET path = /v1/system/metrics/{metric_name} versions = all
32782026-01-27T01:14:02.342ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = GET path = /v1/system/multicast-groups/by-ip/{address} versions = all ending with 2026010800.0.0
32792026-01-27T01:14:02.342ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = GET path = /v1/system/networking/address-lot versions = all
32802026-01-27T01:14:02.342ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = POST path = /v1/system/networking/address-lot versions = all
32812026-01-27T01:14:02.342ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = DELETE path = /v1/system/networking/address-lot/{address_lot} versions = all
32822026-01-27T01:14:02.342ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = GET path = /v1/system/networking/address-lot/{address_lot} versions = all
32832026-01-27T01:14:02.342ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = GET path = /v1/system/networking/address-lot/{address_lot}/blocks versions = all
32842026-01-27T01:14:02.342ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = GET path = /v1/system/networking/allow-list versions = all
32852026-01-27T01:14:02.342ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = PUT path = /v1/system/networking/allow-list versions = all
32862026-01-27T01:14:02.342ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = POST path = /v1/system/networking/bfd-disable versions = all
32872026-01-27T01:14:02.342ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = POST path = /v1/system/networking/bfd-enable versions = all
32882026-01-27T01:14:02.343ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = GET path = /v1/system/networking/bfd-status versions = all
32892026-01-27T01:14:02.343ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = DELETE path = /v1/system/networking/bgp versions = all
32902026-01-27T01:14:02.343ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = GET path = /v1/system/networking/bgp versions = all
32912026-01-27T01:14:02.343ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = POST path = /v1/system/networking/bgp versions = all
32922026-01-27T01:14:02.343ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = GET path = /v1/system/networking/bgp-announce-set versions = all
32932026-01-27T01:14:02.343ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = PUT path = /v1/system/networking/bgp-announce-set versions = all
32942026-01-27T01:14:02.343ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = DELETE path = /v1/system/networking/bgp-announce-set/{announce_set} versions = all
32952026-01-27T01:14:02.343ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = GET path = /v1/system/networking/bgp-announce-set/{announce_set}/announcement versions = all
32962026-01-27T01:14:02.343ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = GET path = /v1/system/networking/bgp-exported versions = all
32972026-01-27T01:14:02.343ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = GET path = /v1/system/networking/bgp-message-history versions = all
32982026-01-27T01:14:02.343ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = GET path = /v1/system/networking/bgp-routes-ipv4 versions = all
32992026-01-27T01:14:02.343ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = GET path = /v1/system/networking/bgp-status versions = all ending with 2025121200.0.0
33002026-01-27T01:14:02.343ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = GET path = /v1/system/networking/bgp-status versions = all starting from 2025121200.0.0
33012026-01-27T01:14:02.343ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = GET path = /v1/system/networking/inbound-icmp versions = all
33022026-01-27T01:14:02.343ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = PUT path = /v1/system/networking/inbound-icmp versions = all
33032026-01-27T01:14:02.343ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = GET path = /v1/system/networking/loopback-address versions = all
33042026-01-27T01:14:02.343ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = POST path = /v1/system/networking/loopback-address versions = all
33052026-01-27T01:14:02.343ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = DELETE path = /v1/system/networking/loopback-address/{rack_id}/{switch_location}/{address}/{subnet_mask} versions = all
33062026-01-27T01:14:02.343ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = DELETE path = /v1/system/networking/switch-port-settings versions = all
33072026-01-27T01:14:02.343ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = GET path = /v1/system/networking/switch-port-settings versions = all
33082026-01-27T01:14:02.343ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = POST path = /v1/system/networking/switch-port-settings versions = all
33092026-01-27T01:14:02.344ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = GET path = /v1/system/networking/switch-port-settings/{port} versions = all
33102026-01-27T01:14:02.344ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = GET path = /v1/system/policy versions = all
33112026-01-27T01:14:02.344ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = PUT path = /v1/system/policy versions = all
33122026-01-27T01:14:02.344ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = GET path = /v1/system/scim/tokens versions = all
33132026-01-27T01:14:02.344ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = POST path = /v1/system/scim/tokens versions = all
33142026-01-27T01:14:02.344ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = DELETE path = /v1/system/scim/tokens/{token_id} versions = all
33152026-01-27T01:14:02.344ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = GET path = /v1/system/scim/tokens/{token_id} versions = all
33162026-01-27T01:14:02.344ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = GET path = /v1/system/silo-quotas versions = all
33172026-01-27T01:14:02.344ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = GET path = /v1/system/silos versions = all
33182026-01-27T01:14:02.344ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = POST path = /v1/system/silos versions = all
33192026-01-27T01:14:02.344ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = DELETE path = /v1/system/silos/{silo} versions = all
33202026-01-27T01:14:02.344ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = GET path = /v1/system/silos/{silo} versions = all
33212026-01-27T01:14:02.344ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = GET path = /v1/system/silos/{silo}/ip-pools versions = all ending with 2026010100.0.0
33222026-01-27T01:14:02.344ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = GET path = /v1/system/silos/{silo}/ip-pools versions = all starting from 2026010100.0.0
33232026-01-27T01:14:02.344ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = GET path = /v1/system/silos/{silo}/policy versions = all
33242026-01-27T01:14:02.344ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = PUT path = /v1/system/silos/{silo}/policy versions = all
33252026-01-27T01:14:02.344ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = GET path = /v1/system/silos/{silo}/quotas versions = all
33262026-01-27T01:14:02.344ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = PUT path = /v1/system/silos/{silo}/quotas versions = all
33272026-01-27T01:14:02.344ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = GET path = /v1/system/subnet-pools versions = all starting from 2026011601.0.0
33282026-01-27T01:14:02.344ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = POST path = /v1/system/subnet-pools versions = all starting from 2026012201.0.0
33292026-01-27T01:14:02.344ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = POST path = /v1/system/subnet-pools versions = from 2026011601.0.0 to 2026012201.0.0
33302026-01-27T01:14:02.344ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = DELETE path = /v1/system/subnet-pools/{pool} versions = all starting from 2026011601.0.0
33312026-01-27T01:14:02.344ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = GET path = /v1/system/subnet-pools/{pool} versions = all starting from 2026011601.0.0
33322026-01-27T01:14:02.344ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = PUT path = /v1/system/subnet-pools/{pool} versions = all starting from 2026011601.0.0
33332026-01-27T01:14:02.345ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = GET path = /v1/system/subnet-pools/{pool}/members versions = all starting from 2026011601.0.0
33342026-01-27T01:14:02.345ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = POST path = /v1/system/subnet-pools/{pool}/members/add versions = all starting from 2026012201.0.0
33352026-01-27T01:14:02.345ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = POST path = /v1/system/subnet-pools/{pool}/members/add versions = from 2026011601.0.0 to 2026012201.0.0
33362026-01-27T01:14:02.345ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = POST path = /v1/system/subnet-pools/{pool}/members/remove versions = all starting from 2026011601.0.0
33372026-01-27T01:14:02.345ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = GET path = /v1/system/subnet-pools/{pool}/silos versions = all starting from 2026011601.0.0
33382026-01-27T01:14:02.345ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = POST path = /v1/system/subnet-pools/{pool}/silos versions = all starting from 2026011601.0.0
33392026-01-27T01:14:02.345ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = DELETE path = /v1/system/subnet-pools/{pool}/silos/{silo} versions = all starting from 2026011601.0.0
33402026-01-27T01:14:02.345ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = PUT path = /v1/system/subnet-pools/{pool}/silos/{silo} versions = all starting from 2026011601.0.0
33412026-01-27T01:14:02.345ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = GET path = /v1/system/subnet-pools/{pool}/utilization versions = all starting from 2026011601.0.0
33422026-01-27T01:14:02.345ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = POST path = /v1/system/timeseries/query versions = all
33432026-01-27T01:14:02.345ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = GET path = /v1/system/timeseries/schemas versions = all
33442026-01-27T01:14:02.345ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = GET path = /v1/system/update/repositories versions = all
33452026-01-27T01:14:02.345ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = PUT path = /v1/system/update/repositories versions = all
33462026-01-27T01:14:02.345ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = GET path = /v1/system/update/repositories/{system_version} versions = all
33472026-01-27T01:14:02.345ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = GET path = /v1/system/update/status versions = all
33482026-01-27T01:14:02.345ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = PUT path = /v1/system/update/target-release versions = all
33492026-01-27T01:14:02.345ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = GET path = /v1/system/update/trust-roots versions = all
33502026-01-27T01:14:02.345ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = POST path = /v1/system/update/trust-roots versions = all
33512026-01-27T01:14:02.345ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = DELETE path = /v1/system/update/trust-roots/{trust_root_id} versions = all
33522026-01-27T01:14:02.345ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = GET path = /v1/system/update/trust-roots/{trust_root_id} versions = all
33532026-01-27T01:14:02.345ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = GET path = /v1/system/users versions = all
33542026-01-27T01:14:02.345ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = GET path = /v1/system/users/{user_id} versions = all
33552026-01-27T01:14:02.345ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = GET path = /v1/system/users-builtin versions = all
33562026-01-27T01:14:02.345ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = GET path = /v1/system/users-builtin/{user} versions = all
33572026-01-27T01:14:02.345ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = GET path = /v1/system/utilization/silos versions = all
33582026-01-27T01:14:02.346ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = GET path = /v1/system/utilization/silos/{silo} versions = all
33592026-01-27T01:14:02.346ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = POST path = /v1/timeseries/query versions = all
33602026-01-27T01:14:02.346ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = GET path = /v1/users versions = all
33612026-01-27T01:14:02.346ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = GET path = /v1/users/{user_id} versions = all
33622026-01-27T01:14:02.346ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = GET path = /v1/users/{user_id}/access-tokens versions = all
33632026-01-27T01:14:02.346ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = POST path = /v1/users/{user_id}/logout versions = all
33642026-01-27T01:14:02.346ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = GET path = /v1/users/{user_id}/sessions versions = all
33652026-01-27T01:14:02.346ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = GET path = /v1/utilization versions = all
33662026-01-27T01:14:02.346ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = GET path = /v1/vpc-firewall-rules versions = all
33672026-01-27T01:14:02.346ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = PUT path = /v1/vpc-firewall-rules versions = all
33682026-01-27T01:14:02.346ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = GET path = /v1/vpc-router-routes versions = all
33692026-01-27T01:14:02.346ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = POST path = /v1/vpc-router-routes versions = all
33702026-01-27T01:14:02.346ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = DELETE path = /v1/vpc-router-routes/{route} versions = all
33712026-01-27T01:14:02.346ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = GET path = /v1/vpc-router-routes/{route} versions = all
33722026-01-27T01:14:02.346ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = PUT path = /v1/vpc-router-routes/{route} versions = all
33732026-01-27T01:14:02.346ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = GET path = /v1/vpc-routers versions = all
33742026-01-27T01:14:02.346ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = POST path = /v1/vpc-routers versions = all
33752026-01-27T01:14:02.346ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = DELETE path = /v1/vpc-routers/{router} versions = all
33762026-01-27T01:14:02.346ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = GET path = /v1/vpc-routers/{router} versions = all
33772026-01-27T01:14:02.346ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = PUT path = /v1/vpc-routers/{router} versions = all
33782026-01-27T01:14:02.346ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = GET path = /v1/vpc-subnets versions = all
33792026-01-27T01:14:02.346ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = POST path = /v1/vpc-subnets versions = all
33802026-01-27T01:14:02.346ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = DELETE path = /v1/vpc-subnets/{subnet} versions = all
33812026-01-27T01:14:02.346ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = GET path = /v1/vpc-subnets/{subnet} versions = all
33822026-01-27T01:14:02.346ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = PUT path = /v1/vpc-subnets/{subnet} versions = all
33832026-01-27T01:14:02.346ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = GET path = /v1/vpc-subnets/{subnet}/network-interfaces versions = all ending with 2026010300.0.0
33842026-01-27T01:14:02.347ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = GET path = /v1/vpc-subnets/{subnet}/network-interfaces versions = all starting from 2026010300.0.0
33852026-01-27T01:14:02.347ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = GET path = /v1/vpcs versions = all
33862026-01-27T01:14:02.347ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = POST path = /v1/vpcs versions = all
33872026-01-27T01:14:02.347ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = DELETE path = /v1/vpcs/{vpc} versions = all
33882026-01-27T01:14:02.347ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = GET path = /v1/vpcs/{vpc} versions = all
33892026-01-27T01:14:02.347ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = PUT path = /v1/vpcs/{vpc} versions = all
33902026-01-27T01:14:02.347ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = POST path = /v1/webhook-receivers versions = all
33912026-01-27T01:14:02.347ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = PUT path = /v1/webhook-receivers/{receiver} versions = all
33922026-01-27T01:14:02.347ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = GET path = /v1/webhook-secrets versions = all
33932026-01-27T01:14:02.347ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = POST path = /v1/webhook-secrets versions = all
33942026-01-27T01:14:02.347ZDEBGtest_vpcs (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62010 method = DELETE path = /v1/webhook-secrets/{secret_id} versions = all
33952026-01-27T01:14:02.347ZINFOtest_vpcs (dropshot_external_techport): listening local_addr = 127.0.0.1:62010
33962026-01-27T01:14:02.347ZDEBGtest_vpcs (dropshot_external_techport): successfully registered DTrace USDT probes local_addr = 127.0.0.1:62010
33972026-01-27T01:14:02.347ZDEBGtest_vpcs (nexus-producer-server): registered DTrace probes
33982026-01-27T01:14:02.347ZDEBGtest_vpcs (dropshot): registered endpoint local_addr = 127.0.0.1:62938 method = GET path = /{producer_id} versions = all
33992026-01-27T01:14:02.347ZINFOtest_vpcs (dropshot): listening file = /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.6/src/server.rs:328 local_addr = 127.0.0.1:62938
34002026-01-27T01:14:02.347ZDEBGtest_vpcs (dropshot): successfully registered DTrace USDT probes local_addr = 127.0.0.1:62938
34012026-01-27T01:14:02.347ZDEBGtest_vpcs (nexus-producer-server): Requested any available port, Dropshot server has been bound to 127.0.0.1:62938
34022026-01-27T01:14:02.347ZDEBGtest_vpcs (nexus-producer-server): Nexus IP provided explicitly, will use it addr = 127.0.0.1:46983
34032026-01-27T01:14:02.347ZDEBGtest_vpcs (nexus-producer-server): starting producer registration task
34042026-01-27T01:14:02.347ZINFOtest_vpcs (nexus-producer-server): starting oximeter metric producer server address = 127.0.0.1:62938 file = oximeter/producer/src/lib.rs:279 interval = 10s producer_id = 913233fe-92a8-4635-9572-183f495429c4
34052026-01-27T01:14:02.347ZDEBGtest_vpcs (init_with_steps): Running step start_oximeter
34062026-01-27T01:14:02.347ZDEBGtest_vpcs: Starting Oximeter
34072026-01-27T01:14:02.347ZDEBGtest_vpcs (oximeter): registered DTrace probes
34082026-01-27T01:14:02.347ZINFOtest_vpcs (oximeter): starting oximeter server file = oximeter/collector/src/lib.rs:264
34092026-01-27T01:14:02.347ZDEBGtest_vpcs (oximeter): creating ClickHouse client
34102026-01-27T01:14:02.347ZDEBGtest_vpcs (clickhouse-client): registered USDT probes collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 719060a6-12ac-470c-bb91-e566c7f997b2
34112026-01-27T01:14:02.348ZDEBGtest_vpcs (producer-registration-task): registering as oximeter producer with Nexus registration_count = 0
34122026-01-27T01:14:02.348ZDEBGtest_vpcs (producer-registration-task): will register with Nexus at 127.0.0.1:46983
34132026-01-27T01:14:02.438ZDEBGtest_vpcs (producer-registration-task): client request body = Some(Body) method = POST uri = http://127.0.0.1:46983/metrics/producers
34142026-01-27T01:14:02.441ZDEBGtest_vpcs (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
34152026-01-27T01:14:02.447ZDEBGtest_vpcs (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = inventory_collection resource = Fleet result = Ok(())
34162026-01-27T01:14:02.447ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = inventory_collection resource = Database
34172026-01-27T01:14:02.447ZDEBGtest_vpcs (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {} }
34182026-01-27T01:14:02.448ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = inventory_collection resource = Database result = Ok(())
34192026-01-27T01:14:02.449ZINFOtest_vpcs (dropshot_internal): accepted connection local_addr = 127.0.0.1:46983 remote_addr = 127.0.0.1:65452
34202026-01-27T01:14:02.454ZTRACtest_vpcs (dropshot_internal): incoming request local_addr = 127.0.0.1:46983 method = POST remote_addr = 127.0.0.1:65452 req_id = cd454bf0-445a-4ef3-8caa-0b895bc76ac4 uri = /metrics/producers
34212026-01-27T01:14:02.454ZDEBGtest_vpcs (dropshot_internal): determined request API version local_addr = 127.0.0.1:46983 method = POST remote_addr = 127.0.0.1:65452 req_id = cd454bf0-445a-4ef3-8caa-0b895bc76ac4 uri = /metrics/producers version = 1.0.0
34222026-01-27T01:14:02.466ZTRACtest_vpcs (dropshot_internal): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) authenticated = true local_addr = 127.0.0.1:46983 method = POST remote_addr = 127.0.0.1:65452 req_id = cd454bf0-445a-4ef3-8caa-0b895bc76ac4 resource = Database type = user_builtin uri = /metrics/producers user_builtin_id = 001de000-05e4-4000-8000-000000000002
34232026-01-27T01:14:02.466ZDEBGtest_vpcs (dropshot_internal): roles authenticated = true local_addr = 127.0.0.1:46983 method = POST remote_addr = 127.0.0.1:65452 req_id = cd454bf0-445a-4ef3-8caa-0b895bc76ac4 roles = RoleSet { roles: {} } type = user_builtin uri = /metrics/producers user_builtin_id = 001de000-05e4-4000-8000-000000000002
34242026-01-27T01:14:02.467ZDEBGtest_vpcs (dropshot_internal): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) authenticated = true local_addr = 127.0.0.1:46983 method = POST remote_addr = 127.0.0.1:65452 req_id = cd454bf0-445a-4ef3-8caa-0b895bc76ac4 resource = Database result = Ok(()) type = user_builtin uri = /metrics/producers user_builtin_id = 001de000-05e4-4000-8000-000000000002
34252026-01-27T01:14:02.472ZTRACtest_vpcs (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 719060a6-12ac-470c-bb91-e566c7f997b2 sql = SELECT MAX(value) AS max_version FROM oximeter.version;
34262026-01-27T01:14:02.474ZDEBGtest_vpcs (BackgroundTasks): activating background_task = reconfigurator_config_watcher iteration = 3 reason = Timeout
34272026-01-27T01:14:02.474ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = reconfigurator_config_watcher resource = BlueprintConfig
34282026-01-27T01:14:02.474ZTRACtest_vpcs (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } background_task = reconfigurator_config_watcher resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
34292026-01-27T01:14:02.474ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = reconfigurator_config_watcher resource = Database
34302026-01-27T01:14:02.474ZDEBGtest_vpcs (BackgroundTasks): roles background_task = reconfigurator_config_watcher roles = RoleSet { roles: {} }
34312026-01-27T01:14:02.474ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = reconfigurator_config_watcher resource = Database result = Ok(())
34322026-01-27T01:14:02.479ZDEBGtest_vpcs (BackgroundTasks): roles background_task = reconfigurator_config_watcher roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
34332026-01-27T01:14:02.491ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = reconfigurator_config_watcher resource = BlueprintConfig result = Ok(())
34342026-01-27T01:14:02.491ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = reconfigurator_config_watcher resource = Database
34352026-01-27T01:14:02.491ZDEBGtest_vpcs (BackgroundTasks): roles background_task = reconfigurator_config_watcher roles = RoleSet { roles: {} }
34362026-01-27T01:14:02.492ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = reconfigurator_config_watcher resource = Database result = Ok(())
34372026-01-27T01:14:02.495ZWARNtest_vpcs (clickhouse-client): oximeter database does not exist, or is out-of-date collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 file = oximeter/db/src/client/mod.rs:900 id = 719060a6-12ac-470c-bb91-e566c7f997b2
34382026-01-27T01:14:02.495ZDEBGtest_vpcs (oximeter-agent): oximeter database does not exist, creating collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
34392026-01-27T01:14:02.495ZINFOtest_vpcs (clickhouse-client): reading db version collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 file = oximeter/db/src/client/mod.rs:800 id = 719060a6-12ac-470c-bb91-e566c7f997b2
34402026-01-27T01:14:02.495ZTRACtest_vpcs (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 719060a6-12ac-470c-bb91-e566c7f997b2 sql = SELECT MAX(value) AS max_version FROM oximeter.version;
34412026-01-27T01:14:02.497ZWARNtest_vpcs (clickhouse-client): oximeter database does not exist, or is out-of-date collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 file = oximeter/db/src/client/mod.rs:900 id = 719060a6-12ac-470c-bb91-e566c7f997b2
34422026-01-27T01:14:02.497ZINFOtest_vpcs (clickhouse-client): read oximeter database version collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 file = oximeter/db/src/client/mod.rs:805 id = 719060a6-12ac-470c-bb91-e566c7f997b2 version = 0
34432026-01-27T01:14:02.497ZINFOtest_vpcs (clickhouse-client): initializing oximeter schema collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 file = oximeter/db/src/client/mod.rs:810 id = 719060a6-12ac-470c-bb91-e566c7f997b2
34442026-01-27T01:14:02.497ZDEBGtest_vpcs (clickhouse-client): initializing ClickHouse database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 719060a6-12ac-470c-bb91-e566c7f997b2
34452026-01-27T01:14:02.497ZDEBGtest_vpcs (BackgroundTasks): reconfigurator config load complete background_task = reconfigurator_config_watcher switches = Loaded(ReconfiguratorConfigView { version: 1, config: ReconfiguratorConfig { planner_enabled: false, planner_config: PlannerConfig { add_zones_with_mupdate_override: false }, tuf_repo_pruner_enabled: true }, time_modified: 2026-01-27T01:13:51.285464Z })
34462026-01-27T01:14:02.497ZDEBGtest_vpcs (BackgroundTasks): activation complete background_task = reconfigurator_config_watcher elapsed = 24.551699ms iteration = 3 status = {"config_updated":false}
34472026-01-27T01:14:02.498ZTRACtest_vpcs (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 719060a6-12ac-470c-bb91-e566c7f997b2 sql = CREATE DATABASE IF NOT EXISTS oximeter
34482026-01-27T01:14:02.506ZTRACtest_vpcs (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 719060a6-12ac-470c-bb91-e566c7f997b2 sql = \n\n/* The version table contains metadata about the `oximeter` database */\nCREATE TABLE IF NOT EXISTS oximeter.version\n(\n value UInt64,\n timestamp DateTime64(9, 'UTC')\n)\nENGINE = MergeTree()\nORDER BY (value, timestamp)
34492026-01-27T01:14:02.512ZTRACtest_vpcs (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 719060a6-12ac-470c-bb91-e566c7f997b2 sql = \n\n/* The measurement tables contain all individual samples from each timeseries.\n *\n * Each table stores a single datum type, and otherwise contains nearly the same\n * structure. The primary sorting key is on the timeseries name, key, and then\n * timestamp, so that all timeseries from the same schema are grouped, followed\n * by all samples from the same timeseries.\n *\n * This reflects that one usually looks up the _key_ in one or more field table,\n * and then uses that to index quickly into the measurements tables.\n */\nCREATE TABLE IF NOT EXISTS oximeter.measurements_bool\n(\n timeseries_name String,\n timeseries_key UInt64,\n timestamp DateTime64(9, 'UTC'),\n datum Nullable(Bool)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
34502026-01-27T01:14:02.529ZTRACtest_vpcs (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 719060a6-12ac-470c-bb91-e566c7f997b2 sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_i8\n(\n timeseries_name String,\n timeseries_key UInt64,\n timestamp DateTime64(9, 'UTC'),\n datum Nullable(Int8)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
34512026-01-27T01:14:02.540ZTRACtest_vpcs (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 719060a6-12ac-470c-bb91-e566c7f997b2 sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_u8\n(\n timeseries_name String,\n timeseries_key UInt64,\n timestamp DateTime64(9, 'UTC'),\n datum Nullable(UInt8)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
34522026-01-27T01:14:02.553ZINFOtest_vpcs (dropshot_internal): request completed error_message_external = Service Unavailable error_message_internal = no Oximeter instances available for assignment latency_us = 99593 local_addr = 127.0.0.1:46983 method = POST remote_addr = 127.0.0.1:65452 req_id = cd454bf0-445a-4ef3-8caa-0b895bc76ac4 response_code = 503 uri = /metrics/producers
34532026-01-27T01:14:02.555ZTRACtest_vpcs (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 719060a6-12ac-470c-bb91-e566c7f997b2 sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_i16\n(\n timeseries_name String,\n timeseries_key UInt64,\n timestamp DateTime64(9, 'UTC'),\n datum Nullable(Int16)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
34542026-01-27T01:14:02.560ZDEBGtest_vpcs (producer-registration-task): client response result = Ok(Response { url: "http://127.0.0.1:46983/metrics/producers", status: 503, headers: {"content-type": "application/json", "x-request-id": "cd454bf0-445a-4ef3-8caa-0b895bc76ac4", "content-length": "133", "date": "Tue, 27 Jan 2026 01:14:02 GMT"} })
34552026-01-27T01:14:02.561ZWARNtest_vpcs (producer-registration-task): failed to register with Nexus, will retry count = 0 delay = 215.694527ms error = "Error Response: status: 503 Service Unavailable; headers: {\\"content-type\\": \\"application/json\\", \\"x-request-id\\": \\"cd454bf0-445a-4ef3-8caa-0b895bc76ac4\\", \\"content-length\\": \\"133\\", \\"date\\": \\"Tue, 27 Jan 2026 01:14:02 GMT\\"}; value: Error { error_code: Some(\\"ServiceNotAvailable\\"), message: \\"Service Unavailable\\", request_id: \\"cd454bf0-445a-4ef3-8caa-0b895bc76ac4\\" }" file = oximeter/producer/src/lib.rs:371
34562026-01-27T01:14:02.561ZTRACtest_vpcs (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 719060a6-12ac-470c-bb91-e566c7f997b2 sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_u16\n(\n timeseries_name String,\n timeseries_key UInt64,\n timestamp DateTime64(9, 'UTC'),\n datum Nullable(UInt16)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
34572026-01-27T01:14:02.689ZDEBGtest_vpcs (BackgroundTasks): begin collection from Sled Agent background_task = inventory_collection sled_agent_url = http://[::1]:59842
34582026-01-27T01:14:02.690ZDEBGtest_vpcs (BackgroundTasks): client request SledAgent = http://[::1]:59842 background_task = inventory_collection body = None method = GET uri = http://[::1]:59842/inventory
34592026-01-27T01:14:02.691ZTRACtest_vpcs (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 719060a6-12ac-470c-bb91-e566c7f997b2 sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_i32\n(\n timeseries_name String,\n timeseries_key UInt64,\n timestamp DateTime64(9, 'UTC'),\n datum Nullable(Int32)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
34602026-01-27T01:14:02.696ZINFOtest_vpcs (dropshot): accepted connection local_addr = [::1]:59842 remote_addr = [::1]:55685 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
34612026-01-27T01:14:02.699ZTRACtest_vpcs (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 719060a6-12ac-470c-bb91-e566c7f997b2 sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_u32\n(\n timeseries_name String,\n timeseries_key UInt64,\n timestamp DateTime64(9, 'UTC'),\n datum Nullable(UInt32)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
34622026-01-27T01:14:02.700ZTRACtest_vpcs (dropshot): incoming request local_addr = [::1]:59842 method = GET remote_addr = [::1]:55685 req_id = dac183bb-457c-4333-ac95-f0ac9d14a62d sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /inventory
34632026-01-27T01:14:02.700ZDEBGtest_vpcs (dropshot): determined request API version local_addr = [::1]:59842 method = GET remote_addr = [::1]:55685 req_id = dac183bb-457c-4333-ac95-f0ac9d14a62d sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /inventory version = 15.0.0
34642026-01-27T01:14:02.711ZINFOtest_vpcs (dropshot): request completed latency_us = 10965 local_addr = [::1]:59842 method = GET remote_addr = [::1]:55685 req_id = dac183bb-457c-4333-ac95-f0ac9d14a62d response_code = 200 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /inventory
34652026-01-27T01:14:02.712ZTRACtest_vpcs (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 719060a6-12ac-470c-bb91-e566c7f997b2 sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_i64\n(\n timeseries_name String,\n timeseries_key UInt64,\n timestamp DateTime64(9, 'UTC'),\n datum Nullable(Int64)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
34662026-01-27T01:14:02.719ZDEBGtest_vpcs (BackgroundTasks): client response SledAgent = http://[::1]:59842 background_task = inventory_collection result = Ok(Response { url: "http://[::1]:59842/inventory", status: 200, headers: {"content-type": "application/json", "x-request-id": "dac183bb-457c-4333-ac95-f0ac9d14a62d", "content-length": "20487", "date": "Tue, 27 Jan 2026 01:14:02 GMT"} })
34672026-01-27T01:14:02.723ZDEBGtest_vpcs (BackgroundTasks): begin collecting all keepers background_task = inventory_collection nkeeper_admin_clients = 0
34682026-01-27T01:14:02.723ZDEBGtest_vpcs (BackgroundTasks): end collecting all keepers background_task = inventory_collection nkeeper_admin_clients = 0
34692026-01-27T01:14:02.723ZDEBGtest_vpcs (BackgroundTasks): begin collection from CockroachDB nodes background_task = inventory_collection
34702026-01-27T01:14:02.723ZDEBGtest_vpcs (CockroachClusterAdminClient): client request body = None method = GET uri = http://[::1]:32222/node/id
34712026-01-27T01:14:02.724ZDEBGtest_vpcs (CockroachClusterAdminClient): client response result = Err(reqwest::Error { kind: Request, url: "http://[::1]:32222/node/id", source: hyper_util::client::legacy::Error(Connect, ConnectError("tcp connect error", [::1]:32222, Os { code: 146, kind: ConnectionRefused, message: "Connection refused" })) })
34722026-01-27T01:14:02.724ZWARNtest_vpcs (CockroachClusterAdminClient): Failed to fetch metrics from CockroachDB node error = Failed to get node ID from [::1]:32222
34732026-01-27T01:14:02.811ZDEBGtest_vpcs (BackgroundTasks): begin collection from NTP admin (timesync) background_task = inventory_collection sled_agent_url = http://[::1]:10123 zone_id = dfa9197a-b8e0-4f4b-99de-5076da34c291 (omicron_zone)
34742026-01-27T01:14:02.812ZDEBGtest_vpcs (BackgroundTasks): client request background_task = inventory_collection body = None method = GET ntp_admin_url = http://[::1]:10123 uri = http://[::1]:10123/timesync
34752026-01-27T01:14:02.812ZDEBGtest_vpcs (BackgroundTasks): client response background_task = inventory_collection ntp_admin_url = http://[::1]:10123 result = Err(reqwest::Error { kind: Request, url: "http://[::1]:10123/timesync", source: hyper_util::client::legacy::Error(Connect, ConnectError("tcp connect error", [::1]:10123, Os { code: 146, kind: ConnectionRefused, message: "Connection refused" })) })
34762026-01-27T01:14:02.815ZDEBGtest_vpcs (BackgroundTasks): begin collection from internal DNS servers background_task = inventory_collection
34772026-01-27T01:14:02.986ZDEBGtest_vpcs (BackgroundTasks): begin collection from DNS server background_task = inventory_collection zone_id = fb7e8b12-2b9b-4970-85ca-299c62844890 (omicron_zone)
34782026-01-27T01:14:02.986ZDEBGtest_vpcs (BackgroundTasks): client request background_task = inventory_collection body = None internal_dns_url = http://[::1]:65457 method = GET uri = http://[::1]:65457/config
34792026-01-27T01:14:02.986ZTRACtest_vpcs (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 719060a6-12ac-470c-bb91-e566c7f997b2 sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_u64\n(\n timeseries_name String,\n timeseries_key UInt64,\n timestamp DateTime64(9, 'UTC'),\n datum Nullable(UInt64)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
34802026-01-27T01:14:02.989ZINFOtest_vpcs (http): accepted connection kind = dns local_addr = [::1]:65457 remote_addr = [::1]:47590
34812026-01-27T01:14:02.991ZDEBGtest_vpcs (producer-registration-task): will register with Nexus at 127.0.0.1:46983
34822026-01-27T01:14:03.164ZDEBGtest_vpcs (producer-registration-task): client request body = Some(Body) method = POST uri = http://127.0.0.1:46983/metrics/producers
34832026-01-27T01:14:03.167ZTRACtest_vpcs (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 719060a6-12ac-470c-bb91-e566c7f997b2 sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_f32\n(\n timeseries_name String,\n timeseries_key UInt64,\n timestamp DateTime64(9, 'UTC'),\n datum Nullable(Float32)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
34842026-01-27T01:14:03.167ZINFOtest_vpcs (dropshot_internal): accepted connection local_addr = 127.0.0.1:46983 remote_addr = 127.0.0.1:35831
34852026-01-27T01:14:03.168ZTRACtest_vpcs (http): incoming request kind = dns local_addr = [::1]:65457 method = GET remote_addr = [::1]:47590 req_id = 1b92dff1-2543-4a68-bcbe-b171de82fca2 uri = /config
34862026-01-27T01:14:03.168ZDEBGtest_vpcs (http): determined request API version kind = dns local_addr = [::1]:65457 method = GET remote_addr = [::1]:47590 req_id = 1b92dff1-2543-4a68-bcbe-b171de82fca2 uri = /config version = 2.0.0
34872026-01-27T01:14:03.169ZINFOtest_vpcs (http): request completed kind = dns latency_us = 1075 local_addr = [::1]:65457 method = GET remote_addr = [::1]:47590 req_id = 1b92dff1-2543-4a68-bcbe-b171de82fca2 response_code = 200 uri = /config
34882026-01-27T01:14:03.170ZTRACtest_vpcs (dropshot_internal): incoming request local_addr = 127.0.0.1:46983 method = POST remote_addr = 127.0.0.1:35831 req_id = e732c62e-7ad6-4f01-90e8-3c398e9a1ce3 uri = /metrics/producers
34892026-01-27T01:14:03.170ZDEBGtest_vpcs (dropshot_internal): determined request API version local_addr = 127.0.0.1:46983 method = POST remote_addr = 127.0.0.1:35831 req_id = e732c62e-7ad6-4f01-90e8-3c398e9a1ce3 uri = /metrics/producers version = 1.0.0
34902026-01-27T01:14:03.176ZDEBGtest_vpcs (BackgroundTasks): client response background_task = inventory_collection internal_dns_url = http://[::1]:65457 result = Ok(Response { url: "http://[::1]:65457/config", status: 200, headers: {"content-type": "application/json", "x-request-id": "1b92dff1-2543-4a68-bcbe-b171de82fca2", "content-length": "3478", "date": "Tue, 27 Jan 2026 01:14:03 GMT"} })
34912026-01-27T01:14:03.177ZDEBGtest_vpcs (BackgroundTasks): finished collection from DNS server background_task = inventory_collection zone_id = fb7e8b12-2b9b-4970-85ca-299c62844890 (omicron_zone)
34922026-01-27T01:14:03.187ZDEBGtest_vpcs (BackgroundTasks): finished collection from internal DNS servers background_task = inventory_collection
34932026-01-27T01:14:03.187ZDEBGtest_vpcs (BackgroundTasks): finished collection background_task = inventory_collection
34942026-01-27T01:14:03.188ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = inventory_collection resource = Inventory
34952026-01-27T01:14:03.188ZTRACtest_vpcs (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } background_task = inventory_collection resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
34962026-01-27T01:14:03.189ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = inventory_collection resource = Database
34972026-01-27T01:14:03.189ZDEBGtest_vpcs (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {} }
34982026-01-27T01:14:03.189ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = inventory_collection resource = Database result = Ok(())
34992026-01-27T01:14:03.191ZTRACtest_vpcs (dropshot_internal): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) authenticated = true local_addr = 127.0.0.1:46983 method = POST remote_addr = 127.0.0.1:35831 req_id = e732c62e-7ad6-4f01-90e8-3c398e9a1ce3 resource = Database type = user_builtin uri = /metrics/producers user_builtin_id = 001de000-05e4-4000-8000-000000000002
35002026-01-27T01:14:03.191ZDEBGtest_vpcs (dropshot_internal): roles authenticated = true local_addr = 127.0.0.1:46983 method = POST remote_addr = 127.0.0.1:35831 req_id = e732c62e-7ad6-4f01-90e8-3c398e9a1ce3 roles = RoleSet { roles: {} } type = user_builtin uri = /metrics/producers user_builtin_id = 001de000-05e4-4000-8000-000000000002
35012026-01-27T01:14:03.191ZDEBGtest_vpcs (dropshot_internal): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) authenticated = true local_addr = 127.0.0.1:46983 method = POST remote_addr = 127.0.0.1:35831 req_id = e732c62e-7ad6-4f01-90e8-3c398e9a1ce3 resource = Database result = Ok(()) type = user_builtin uri = /metrics/producers user_builtin_id = 001de000-05e4-4000-8000-000000000002
35022026-01-27T01:14:03.200ZTRACtest_vpcs (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 719060a6-12ac-470c-bb91-e566c7f997b2 sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_f64\n(\n timeseries_name String,\n timeseries_key UInt64,\n timestamp DateTime64(9, 'UTC'),\n datum Nullable(Float64)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
35032026-01-27T01:14:03.211ZDEBGtest_vpcs (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
35042026-01-27T01:14:03.216ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = inventory_collection resource = Inventory result = Ok(())
35052026-01-27T01:14:03.216ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = inventory_collection resource = Database
35062026-01-27T01:14:03.216ZDEBGtest_vpcs (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {} }
35072026-01-27T01:14:03.217ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = inventory_collection resource = Database result = Ok(())
35082026-01-27T01:14:03.219ZINFOtest_vpcs (dropshot_internal): request completed error_message_external = Service Unavailable error_message_internal = no Oximeter instances available for assignment latency_us = 48859 local_addr = 127.0.0.1:46983 method = POST remote_addr = 127.0.0.1:35831 req_id = e732c62e-7ad6-4f01-90e8-3c398e9a1ce3 response_code = 503 uri = /metrics/producers
35092026-01-27T01:14:03.219ZTRACtest_vpcs (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 719060a6-12ac-470c-bb91-e566c7f997b2 sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_string\n(\n timeseries_name String,\n timeseries_key UInt64,\n timestamp DateTime64(9, 'UTC'),\n datum Nullable(String)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
35102026-01-27T01:14:03.220ZDEBGtest_vpcs (producer-registration-task): client response result = Ok(Response { url: "http://127.0.0.1:46983/metrics/producers", status: 503, headers: {"content-type": "application/json", "x-request-id": "e732c62e-7ad6-4f01-90e8-3c398e9a1ce3", "content-length": "133", "date": "Tue, 27 Jan 2026 01:14:03 GMT"} })
35112026-01-27T01:14:03.222ZWARNtest_vpcs (producer-registration-task): failed to register with Nexus, will retry count = 1 delay = 876.568527ms error = "Error Response: status: 503 Service Unavailable; headers: {\\"content-type\\": \\"application/json\\", \\"x-request-id\\": \\"e732c62e-7ad6-4f01-90e8-3c398e9a1ce3\\", \\"content-length\\": \\"133\\", \\"date\\": \\"Tue, 27 Jan 2026 01:14:03 GMT\\"}; value: Error { error_code: Some(\\"ServiceNotAvailable\\"), message: \\"Service Unavailable\\", request_id: \\"e732c62e-7ad6-4f01-90e8-3c398e9a1ce3\\" }" file = oximeter/producer/src/lib.rs:371
35122026-01-27T01:14:03.224ZTRACtest_vpcs (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 719060a6-12ac-470c-bb91-e566c7f997b2 sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_bytes\n(\n timeseries_name String,\n timeseries_key UInt64,\n timestamp DateTime64(9, 'UTC'),\n /*\n * NOTE: Right now we can't unambiguously record a nullable byte array.\n * Arrays cannot be nested in `Nullable()` types, and encoding the array as\n * a string isn't palatable for a few reasons.\n * See: https://github.com/oxidecomputer/omicron/issues/4551 for more\n * details.\n */\n datum Array(UInt8)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
35132026-01-27T01:14:03.233ZTRACtest_vpcs (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 719060a6-12ac-470c-bb91-e566c7f997b2 sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_cumulativei64\n(\n timeseries_name String,\n timeseries_key UInt64,\n start_time DateTime64(9, 'UTC'),\n timestamp DateTime64(9, 'UTC'),\n datum Nullable(Int64)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, start_time, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
35142026-01-27T01:14:03.242ZTRACtest_vpcs (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 719060a6-12ac-470c-bb91-e566c7f997b2 sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_cumulativeu64\n(\n timeseries_name String,\n timeseries_key UInt64,\n start_time DateTime64(9, 'UTC'),\n timestamp DateTime64(9, 'UTC'),\n datum Nullable(UInt64)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, start_time, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
35152026-01-27T01:14:03.249ZTRACtest_vpcs (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 719060a6-12ac-470c-bb91-e566c7f997b2 sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_cumulativef32\n(\n timeseries_name String,\n timeseries_key UInt64,\n start_time DateTime64(9, 'UTC'),\n timestamp DateTime64(9, 'UTC'),\n datum Nullable(Float32)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, start_time, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
35162026-01-27T01:14:03.253ZTRACtest_vpcs (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 719060a6-12ac-470c-bb91-e566c7f997b2 sql = \n\n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_cumulativef64\n(\n timeseries_name String,\n timeseries_key UInt64,\n start_time DateTime64(9, 'UTC'),\n timestamp DateTime64(9, 'UTC'),\n datum Nullable(Float64)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, start_time, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
35172026-01-27T01:14:03.256ZTRACtest_vpcs (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 719060a6-12ac-470c-bb91-e566c7f997b2 sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_histogrami8\n(\n timeseries_name String,\n timeseries_key UInt64,\n start_time DateTime64(9, 'UTC'),\n timestamp DateTime64(9, 'UTC'),\n /*\n * NOTE: Array types cannot be Nullable, see\n * https://clickhouse.com/docs/en/sql-reference/data-types/nullable\n * for more details.\n *\n * This means we need to use empty arrays to indicate a missing value. This\n * is unfortunate, and at this point relies on the fact that an\n * `oximeter::Histogram` cannot have zero bins. If that changes, we'll need\n * to figure out another way to represent missing samples here.\n */\n bins Array(Int8),\n counts Array(UInt64),\n min Int8,\n max Int8,\n sum_of_samples Int64,\n squared_mean Float64,\n p50_marker_heights Array(Float64),\n p50_marker_positions Array(UInt64),\n p50_desired_marker_positions Array(Float64),\n p90_marker_heights Array(Float64),\n p90_marker_positions Array(UInt64),\n p90_desired_marker_positions Array(Float64),\n p99_marker_heights Array(Float64),\n p99_marker_positions Array(UInt64),\n p99_desired_marker_positions Array(Float64)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, start_time, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
35182026-01-27T01:14:03.269ZTRACtest_vpcs (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 719060a6-12ac-470c-bb91-e566c7f997b2 sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_histogramu8\n(\n timeseries_name String,\n timeseries_key UInt64,\n start_time DateTime64(9, 'UTC'),\n timestamp DateTime64(9, 'UTC'),\n bins Array(UInt8),\n counts Array(UInt64),\n min UInt8,\n max UInt8,\n sum_of_samples Int64,\n squared_mean Float64,\n p50_marker_heights Array(Float64),\n p50_marker_positions Array(UInt64),\n p50_desired_marker_positions Array(Float64),\n p90_marker_heights Array(Float64),\n p90_marker_positions Array(UInt64),\n p90_desired_marker_positions Array(Float64),\n p99_marker_heights Array(Float64),\n p99_marker_positions Array(UInt64),\n p99_desired_marker_positions Array(Float64)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, start_time, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
35192026-01-27T01:14:03.277ZTRACtest_vpcs (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 719060a6-12ac-470c-bb91-e566c7f997b2 sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_histogrami16\n(\n timeseries_name String,\n timeseries_key UInt64,\n start_time DateTime64(9, 'UTC'),\n timestamp DateTime64(9, 'UTC'),\n bins Array(Int16),\n counts Array(UInt64),\n min Int16,\n max Int16,\n sum_of_samples Int64,\n squared_mean Float64,\n p50_marker_heights Array(Float64),\n p50_marker_positions Array(UInt64),\n p50_desired_marker_positions Array(Float64),\n p90_marker_heights Array(Float64),\n p90_marker_positions Array(UInt64),\n p90_desired_marker_positions Array(Float64),\n p99_marker_heights Array(Float64),\n p99_marker_positions Array(UInt64),\n p99_desired_marker_positions Array(Float64)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, start_time, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
35202026-01-27T01:14:03.297ZTRACtest_vpcs (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 719060a6-12ac-470c-bb91-e566c7f997b2 sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_histogramu16\n(\n timeseries_name String,\n timeseries_key UInt64,\n start_time DateTime64(9, 'UTC'),\n timestamp DateTime64(9, 'UTC'),\n bins Array(UInt16),\n counts Array(UInt64),\n min UInt16,\n max UInt16,\n sum_of_samples Int64,\n squared_mean Float64,\n p50_marker_heights Array(Float64),\n p50_marker_positions Array(UInt64),\n p50_desired_marker_positions Array(Float64),\n p90_marker_heights Array(Float64),\n p90_marker_positions Array(UInt64),\n p90_desired_marker_positions Array(Float64),\n p99_marker_heights Array(Float64),\n p99_marker_positions Array(UInt64),\n p99_desired_marker_positions Array(Float64)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, start_time, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
35212026-01-27T01:14:03.311ZTRACtest_vpcs (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 719060a6-12ac-470c-bb91-e566c7f997b2 sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_histogrami32\n(\n timeseries_name String,\n timeseries_key UInt64,\n start_time DateTime64(9, 'UTC'),\n timestamp DateTime64(9, 'UTC'),\n bins Array(Int32),\n counts Array(UInt64),\n min Int32,\n max Int32,\n sum_of_samples Int64,\n squared_mean Float64,\n p50_marker_heights Array(Float64),\n p50_marker_positions Array(UInt64),\n p50_desired_marker_positions Array(Float64),\n p90_marker_heights Array(Float64),\n p90_marker_positions Array(UInt64),\n p90_desired_marker_positions Array(Float64),\n p99_marker_heights Array(Float64),\n p99_marker_positions Array(UInt64),\n p99_desired_marker_positions Array(Float64)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, start_time, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
35222026-01-27T01:14:03.342ZTRACtest_vpcs (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 719060a6-12ac-470c-bb91-e566c7f997b2 sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_histogramu32\n(\n timeseries_name String,\n timeseries_key UInt64,\n start_time DateTime64(9, 'UTC'),\n timestamp DateTime64(9, 'UTC'),\n bins Array(UInt32),\n counts Array(UInt64),\n min UInt32,\n max UInt32,\n sum_of_samples Int64,\n squared_mean Float64,\n p50_marker_heights Array(Float64),\n p50_marker_positions Array(UInt64),\n p50_desired_marker_positions Array(Float64),\n p90_marker_heights Array(Float64),\n p90_marker_positions Array(UInt64),\n p90_desired_marker_positions Array(Float64),\n p99_marker_heights Array(Float64),\n p99_marker_positions Array(UInt64),\n p99_desired_marker_positions Array(Float64)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, start_time, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
35232026-01-27T01:14:03.353ZTRACtest_vpcs (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 719060a6-12ac-470c-bb91-e566c7f997b2 sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_histogrami64\n(\n timeseries_name String,\n timeseries_key UInt64,\n start_time DateTime64(9, 'UTC'),\n timestamp DateTime64(9, 'UTC'),\n bins Array(Int64),\n counts Array(UInt64),\n min Int64,\n max Int64,\n sum_of_samples Int64,\n squared_mean Float64,\n p50_marker_heights Array(Float64),\n p50_marker_positions Array(UInt64),\n p50_desired_marker_positions Array(Float64),\n p90_marker_heights Array(Float64),\n p90_marker_positions Array(UInt64),\n p90_desired_marker_positions Array(Float64),\n p99_marker_heights Array(Float64),\n p99_marker_positions Array(UInt64),\n p99_desired_marker_positions Array(Float64)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, start_time, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
35242026-01-27T01:14:03.367ZTRACtest_vpcs (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 719060a6-12ac-470c-bb91-e566c7f997b2 sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_histogramu64\n(\n timeseries_name String,\n timeseries_key UInt64,\n start_time DateTime64(9, 'UTC'),\n timestamp DateTime64(9, 'UTC'),\n bins Array(UInt64),\n counts Array(UInt64),\n min UInt64,\n max UInt64,\n sum_of_samples Int64,\n squared_mean Float64,\n p50_marker_heights Array(Float64),\n p50_marker_positions Array(UInt64),\n p50_desired_marker_positions Array(Float64),\n p90_marker_heights Array(Float64),\n p90_marker_positions Array(UInt64),\n p90_desired_marker_positions Array(Float64),\n p99_marker_heights Array(Float64),\n p99_marker_positions Array(UInt64),\n p99_desired_marker_positions Array(Float64)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, start_time, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
35252026-01-27T01:14:03.375ZTRACtest_vpcs (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 719060a6-12ac-470c-bb91-e566c7f997b2 sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_histogramf32\n(\n timeseries_name String,\n timeseries_key UInt64,\n start_time DateTime64(9, 'UTC'),\n timestamp DateTime64(9, 'UTC'),\n bins Array(Float32),\n counts Array(UInt64),\n min Float32,\n max Float32,\n sum_of_samples Float64,\n squared_mean Float64,\n p50_marker_heights Array(Float64),\n p50_marker_positions Array(UInt64),\n p50_desired_marker_positions Array(Float64),\n p90_marker_heights Array(Float64),\n p90_marker_positions Array(UInt64),\n p90_desired_marker_positions Array(Float64),\n p99_marker_heights Array(Float64),\n p99_marker_positions Array(UInt64),\n p99_desired_marker_positions Array(Float64)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, start_time, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
35262026-01-27T01:14:03.395ZTRACtest_vpcs (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 719060a6-12ac-470c-bb91-e566c7f997b2 sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_histogramf64\n(\n timeseries_name String,\n timeseries_key UInt64,\n start_time DateTime64(9, 'UTC'),\n timestamp DateTime64(9, 'UTC'),\n bins Array(Float64),\n counts Array(UInt64),\n min Float64,\n max Float64,\n sum_of_samples Float64,\n squared_mean Float64,\n p50_marker_heights Array(Float64),\n p50_marker_positions Array(UInt64),\n p50_desired_marker_positions Array(Float64),\n p90_marker_heights Array(Float64),\n p90_marker_positions Array(UInt64),\n p90_desired_marker_positions Array(Float64),\n p99_marker_heights Array(Float64),\n p99_marker_positions Array(UInt64),\n p99_desired_marker_positions Array(Float64)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, start_time, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
35272026-01-27T01:14:03.405ZTRACtest_vpcs (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 719060a6-12ac-470c-bb91-e566c7f997b2 sql = \n\n/* The field tables store named dimensions of each timeseries.\n *\n * As with the measurement tables, there is one field table for each field data\n * type. Fields are deduplicated by using the "replacing merge tree", though\n * this behavior **must not** be relied upon for query correctness.\n *\n * The index for the fields differs from the measurements, however. Rows are\n * sorted by timeseries name, then field name, field value, and finally\n * timeseries key. This reflects the most common pattern for looking them up:\n * by field name and possibly value, within a timeseries. The resulting keys are\n * usually then used to look up measurements.\n *\n * NOTE: We may want to consider a secondary index on these tables, sorting by\n * timeseries name and then key, since it would improve lookups where one\n * already has the key. Realistically though, these tables are quite small and\n * so performance benefits will be low in absolute terms.\n *\n * TTL: We use a materialized column to expire old field table records. This\n * column is generated automatically by the database whenever a new row is\n * inserted. It cannot be inserted directly, nor is it returned in a `SELECT *`\n * query. Since these tables are `ReplacingMergeTree`s, that means the last\n * record will remain during a deduplication, which will have the last\n * timestamp. ClickHouse will then expire old data for us, similar to the\n * measurement tables.\n */\nCREATE TABLE IF NOT EXISTS oximeter.fields_bool\n(\n timeseries_name String,\n timeseries_key UInt64,\n field_name String,\n field_value Bool,\n last_updated_at DateTime MATERIALIZED now()\n)\nENGINE = ReplacingMergeTree()\nORDER BY (timeseries_name, field_name, field_value, timeseries_key)\nTTL last_updated_at + INTERVAL 30 DAY
35282026-01-27T01:14:03.410ZTRACtest_vpcs (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 719060a6-12ac-470c-bb91-e566c7f997b2 sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.fields_i8\n(\n timeseries_name String,\n timeseries_key UInt64,\n field_name String,\n field_value Int8,\n last_updated_at DateTime MATERIALIZED now()\n)\nENGINE = ReplacingMergeTree()\nORDER BY (timeseries_name, field_name, field_value, timeseries_key)\nTTL last_updated_at + INTERVAL 30 DAY
35292026-01-27T01:14:03.414ZTRACtest_vpcs (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 719060a6-12ac-470c-bb91-e566c7f997b2 sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.fields_u8\n(\n timeseries_name String,\n timeseries_key UInt64,\n field_name String,\n field_value UInt8,\n last_updated_at DateTime MATERIALIZED now()\n)\nENGINE = ReplacingMergeTree()\nORDER BY (timeseries_name, field_name, field_value, timeseries_key)\nTTL last_updated_at + INTERVAL 30 DAY
35302026-01-27T01:14:03.421ZTRACtest_vpcs (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 719060a6-12ac-470c-bb91-e566c7f997b2 sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.fields_i16\n(\n timeseries_name String,\n timeseries_key UInt64,\n field_name String,\n field_value Int16,\n last_updated_at DateTime MATERIALIZED now()\n)\nENGINE = ReplacingMergeTree()\nORDER BY (timeseries_name, field_name, field_value, timeseries_key)\nTTL last_updated_at + INTERVAL 30 DAY
35312026-01-27T01:14:03.449ZTRACtest_vpcs (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 719060a6-12ac-470c-bb91-e566c7f997b2 sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.fields_u16\n(\n timeseries_name String,\n timeseries_key UInt64,\n field_name String,\n field_value UInt16,\n last_updated_at DateTime MATERIALIZED now()\n)\nENGINE = ReplacingMergeTree()\nORDER BY (timeseries_name, field_name, field_value, timeseries_key)\nTTL last_updated_at + INTERVAL 30 DAY
35322026-01-27T01:14:03.462ZTRACtest_vpcs (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 719060a6-12ac-470c-bb91-e566c7f997b2 sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.fields_i32\n(\n timeseries_name String,\n timeseries_key UInt64,\n field_name String,\n field_value Int32,\n last_updated_at DateTime MATERIALIZED now()\n)\nENGINE = ReplacingMergeTree()\nORDER BY (timeseries_name, field_name, field_value, timeseries_key)\nTTL last_updated_at + INTERVAL 30 DAY
35332026-01-27T01:14:03.468ZTRACtest_vpcs (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 719060a6-12ac-470c-bb91-e566c7f997b2 sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.fields_u32\n(\n timeseries_name String,\n timeseries_key UInt64,\n field_name String,\n field_value UInt32,\n last_updated_at DateTime MATERIALIZED now()\n)\nENGINE = ReplacingMergeTree()\nORDER BY (timeseries_name, field_name, field_value, timeseries_key)\nTTL last_updated_at + INTERVAL 30 DAY
35342026-01-27T01:14:03.486ZTRACtest_vpcs (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 719060a6-12ac-470c-bb91-e566c7f997b2 sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.fields_i64\n(\n timeseries_name String,\n timeseries_key UInt64,\n field_name String,\n field_value Int64,\n last_updated_at DateTime MATERIALIZED now()\n)\nENGINE = ReplacingMergeTree()\nORDER BY (timeseries_name, field_name, field_value, timeseries_key)\nTTL last_updated_at + INTERVAL 30 DAY
35352026-01-27T01:14:03.541ZTRACtest_vpcs (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 719060a6-12ac-470c-bb91-e566c7f997b2 sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.fields_u64\n(\n timeseries_name String,\n timeseries_key UInt64,\n field_name String,\n field_value UInt64,\n last_updated_at DateTime MATERIALIZED now()\n)\nENGINE = ReplacingMergeTree()\nORDER BY (timeseries_name, field_name, field_value, timeseries_key)\nTTL last_updated_at + INTERVAL 30 DAY
35362026-01-27T01:14:03.561ZTRACtest_vpcs (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 719060a6-12ac-470c-bb91-e566c7f997b2 sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.fields_ipaddr\n(\n timeseries_name String,\n timeseries_key UInt64,\n field_name String,\n field_value IPv6,\n last_updated_at DateTime MATERIALIZED now()\n)\nENGINE = ReplacingMergeTree()\nORDER BY (timeseries_name, field_name, field_value, timeseries_key)\nTTL last_updated_at + INTERVAL 30 DAY
35372026-01-27T01:14:03.574ZTRACtest_vpcs (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 719060a6-12ac-470c-bb91-e566c7f997b2 sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.fields_string\n(\n timeseries_name String,\n timeseries_key UInt64,\n field_name String,\n field_value String,\n last_updated_at DateTime MATERIALIZED now()\n)\nENGINE = ReplacingMergeTree()\nORDER BY (timeseries_name, field_name, field_value, timeseries_key)\nTTL last_updated_at + INTERVAL 30 DAY
35382026-01-27T01:14:03.593ZTRACtest_vpcs (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 719060a6-12ac-470c-bb91-e566c7f997b2 sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.fields_uuid\n(\n timeseries_name String,\n timeseries_key UInt64,\n field_name String,\n field_value UUID,\n last_updated_at DateTime MATERIALIZED now()\n)\nENGINE = ReplacingMergeTree()\nORDER BY (timeseries_name, field_name, field_value, timeseries_key)\nTTL last_updated_at + INTERVAL 30 DAY
35392026-01-27T01:14:03.610ZTRACtest_vpcs (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 719060a6-12ac-470c-bb91-e566c7f997b2 sql = \n\n/* The timeseries schema table stores the extracted schema for the samples\n * oximeter collects.\n */\nCREATE TABLE IF NOT EXISTS oximeter.timeseries_schema\n(\n timeseries_name String,\n fields Nested(\n name String,\n type Enum(\n 'Bool' = 1,\n 'I64' = 2,\n 'IpAddr' = 3,\n 'String' = 4,\n 'Uuid' = 6,\n 'I8' = 7,\n 'U8' = 8,\n 'I16' = 9,\n 'U16' = 10,\n 'I32' = 11,\n 'U32' = 12,\n 'U64' = 13\n ),\n source Enum(\n 'Target' = 1,\n 'Metric' = 2\n )\n ),\n datum_type Enum(\n 'Bool' = 1,\n 'I64' = 2,\n 'F64' = 3,\n 'String' = 4,\n 'Bytes' = 5,\n 'CumulativeI64' = 6,\n 'CumulativeF64' = 7,\n 'HistogramI64' = 8,\n 'HistogramF64' = 9,\n 'I8' = 10,\n 'U8' = 11,\n 'I16' = 12,\n 'U16' = 13,\n 'I32' = 14,\n 'U32' = 15,\n 'U64' = 16,\n 'F32' = 17,\n 'CumulativeU64' = 18,\n 'CumulativeF32' = 19,\n 'HistogramI8' = 20,\n 'HistogramU8' = 21,\n 'HistogramI16' = 22,\n 'HistogramU16' = 23,\n 'HistogramI32' = 24,\n 'HistogramU32' = 25,\n 'HistogramU64' = 26,\n 'HistogramF32' = 27\n ),\n created DateTime64(9, 'UTC')\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, fields.name)
35402026-01-27T01:14:03.617ZINFOtest_vpcs (clickhouse-client): inserting current version collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 file = oximeter/db/src/client/mod.rs:831 id = 719060a6-12ac-470c-bb91-e566c7f997b2 version = 14
35412026-01-27T01:14:03.617ZTRACtest_vpcs (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 719060a6-12ac-470c-bb91-e566c7f997b2 sql = INSERT INTO oximeter.version (*) VALUES (14, now());
35422026-01-27T01:14:03.625ZDEBGtest_vpcs (clickhouse-client): registered USDT probes collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 4751cf52-7dde-4a54-919f-14f8550f8912
35432026-01-27T01:14:03.626ZDEBGtest_vpcs (dropshot): registered endpoint local_addr = [::1]:46496 method = GET path = /info versions = all
35442026-01-27T01:14:03.626ZDEBGtest_vpcs (dropshot): registered endpoint local_addr = [::1]:46496 method = GET path = /producers versions = all
35452026-01-27T01:14:03.626ZDEBGtest_vpcs (dropshot): registered endpoint local_addr = [::1]:46496 method = DELETE path = /producers/{producer_id} versions = all
35462026-01-27T01:14:03.626ZDEBGtest_vpcs (dropshot): registered endpoint local_addr = [::1]:46496 method = GET path = /producers/{producer_id} versions = all
35472026-01-27T01:14:03.626ZINFOtest_vpcs (dropshot): listening file = /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.6/src/server.rs:328 local_addr = [::1]:46496
35482026-01-27T01:14:03.627ZDEBGtest_vpcs (dropshot): successfully registered DTrace USDT probes local_addr = [::1]:46496
35492026-01-27T01:14:03.629ZDEBGtest_vpcs (oximeter): registered USDT probes
35502026-01-27T01:14:03.629ZDEBGtest_vpcs (oximeter): contacting nexus
35512026-01-27T01:14:04.563ZDEBGtest_vpcs (oximeter): client request body = Some(Body) method = POST uri = http://127.0.0.1:46983/metrics/collectors
35522026-01-27T01:14:04.564ZDEBGtest_vpcs (producer-registration-task): will register with Nexus at 127.0.0.1:46983
35532026-01-27T01:14:04.715ZDEBGtest_vpcs (producer-registration-task): client request body = Some(Body) method = POST uri = http://127.0.0.1:46983/metrics/producers
35542026-01-27T01:14:04.720ZINFOtest_vpcs (dropshot_internal): accepted connection local_addr = 127.0.0.1:46983 remote_addr = 127.0.0.1:62470
35552026-01-27T01:14:04.720ZINFOtest_vpcs (dropshot_internal): accepted connection local_addr = 127.0.0.1:46983 remote_addr = 127.0.0.1:41164
35562026-01-27T01:14:04.721ZTRACtest_vpcs (results-sink): batch interval expired, but no samples to insert collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
35572026-01-27T01:14:04.721ZTRACtest_vpcs (results-sink-cluster): batch interval expired, but no samples to insert collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
35582026-01-27T01:14:04.723ZTRACtest_vpcs (dropshot_internal): incoming request local_addr = 127.0.0.1:46983 method = POST remote_addr = 127.0.0.1:41164 req_id = 33575175-ea69-4604-9c23-1eb857774614 uri = /metrics/producers
35592026-01-27T01:14:04.723ZDEBGtest_vpcs (dropshot_internal): determined request API version local_addr = 127.0.0.1:46983 method = POST remote_addr = 127.0.0.1:41164 req_id = 33575175-ea69-4604-9c23-1eb857774614 uri = /metrics/producers version = 1.0.0
35602026-01-27T01:14:04.724ZTRACtest_vpcs (dropshot_internal): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) authenticated = true local_addr = 127.0.0.1:46983 method = POST remote_addr = 127.0.0.1:41164 req_id = 33575175-ea69-4604-9c23-1eb857774614 resource = Database type = user_builtin uri = /metrics/producers user_builtin_id = 001de000-05e4-4000-8000-000000000002
35612026-01-27T01:14:04.724ZDEBGtest_vpcs (dropshot_internal): roles authenticated = true local_addr = 127.0.0.1:46983 method = POST remote_addr = 127.0.0.1:41164 req_id = 33575175-ea69-4604-9c23-1eb857774614 roles = RoleSet { roles: {} } type = user_builtin uri = /metrics/producers user_builtin_id = 001de000-05e4-4000-8000-000000000002
35622026-01-27T01:14:04.725ZDEBGtest_vpcs (dropshot_internal): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) authenticated = true local_addr = 127.0.0.1:46983 method = POST remote_addr = 127.0.0.1:41164 req_id = 33575175-ea69-4604-9c23-1eb857774614 resource = Database result = Ok(()) type = user_builtin uri = /metrics/producers user_builtin_id = 001de000-05e4-4000-8000-000000000002
35632026-01-27T01:14:04.729ZTRACtest_vpcs (dropshot_internal): incoming request local_addr = 127.0.0.1:46983 method = POST remote_addr = 127.0.0.1:62470 req_id = 74918082-4350-4d86-87c0-2d7ce79a9ee7 uri = /metrics/collectors
35642026-01-27T01:14:04.729ZDEBGtest_vpcs (dropshot_internal): determined request API version local_addr = 127.0.0.1:46983 method = POST remote_addr = 127.0.0.1:62470 req_id = 74918082-4350-4d86-87c0-2d7ce79a9ee7 uri = /metrics/collectors version = 1.0.0
35652026-01-27T01:14:04.729ZTRACtest_vpcs (dropshot_internal): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) authenticated = true local_addr = 127.0.0.1:46983 method = POST remote_addr = 127.0.0.1:62470 req_id = 74918082-4350-4d86-87c0-2d7ce79a9ee7 resource = Database type = user_builtin uri = /metrics/collectors user_builtin_id = 001de000-05e4-4000-8000-000000000002
35662026-01-27T01:14:04.729ZDEBGtest_vpcs (dropshot_internal): roles authenticated = true local_addr = 127.0.0.1:46983 method = POST remote_addr = 127.0.0.1:62470 req_id = 74918082-4350-4d86-87c0-2d7ce79a9ee7 roles = RoleSet { roles: {} } type = user_builtin uri = /metrics/collectors user_builtin_id = 001de000-05e4-4000-8000-000000000002
35672026-01-27T01:14:04.730ZDEBGtest_vpcs (dropshot_internal): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) authenticated = true local_addr = 127.0.0.1:46983 method = POST remote_addr = 127.0.0.1:62470 req_id = 74918082-4350-4d86-87c0-2d7ce79a9ee7 resource = Database result = Ok(()) type = user_builtin uri = /metrics/collectors user_builtin_id = 001de000-05e4-4000-8000-000000000002
35682026-01-27T01:14:04.740ZINFOtest_vpcs (nexus): registered new oximeter metric collection server address = [::1]:46496 collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
35692026-01-27T01:14:04.740ZINFOtest_vpcs (dropshot_internal): request completed latency_us = 11201 local_addr = 127.0.0.1:46983 method = POST remote_addr = 127.0.0.1:62470 req_id = 74918082-4350-4d86-87c0-2d7ce79a9ee7 response_code = 204 uri = /metrics/collectors
35702026-01-27T01:14:04.741ZDEBGtest_vpcs (oximeter): client response result = Ok(Response { url: "http://127.0.0.1:46983/metrics/collectors", status: 204, headers: {"x-request-id": "74918082-4350-4d86-87c0-2d7ce79a9ee7", "date": "Tue, 27 Jan 2026 01:14:04 GMT"} })
35712026-01-27T01:14:04.741ZINFOtest_vpcs (oximeter): oximeter registered with nexus file = oximeter/collector/src/lib.rs:427 id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
35722026-01-27T01:14:04.741ZDEBGtest_vpcs (init_with_steps): Running step start_producer_server
35732026-01-27T01:14:04.741ZDEBGtest_vpcs: Starting test metric Producer Server
35742026-01-27T01:14:04.748ZINFOtest_vpcs (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:50372/v1/projects
35752026-01-27T01:14:04.749ZINFOtest_vpcs (oximeter-agent): starting refresh list task collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 file = oximeter/collector/src/agent.rs:554
35762026-01-27T01:14:04.841ZINFOtest_vpcs (nexus): assigned collector to new producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 producer_id = 913233fe-92a8-4635-9572-183f495429c4
35772026-01-27T01:14:04.841ZINFOtest_vpcs (dropshot_internal): request completed latency_us = 118179 local_addr = 127.0.0.1:46983 method = POST remote_addr = 127.0.0.1:41164 req_id = 33575175-ea69-4604-9c23-1eb857774614 response_code = 201 uri = /metrics/producers
35782026-01-27T01:14:04.842ZINFOtest_vpcs (dropshot_internal): accepted connection local_addr = 127.0.0.1:46983 remote_addr = 127.0.0.1:53398
35792026-01-27T01:14:04.842ZINFOtest_vpcs (dropshot_external): accepted connection local_addr = 127.0.0.1:50372 remote_addr = 127.0.0.1:38658
35802026-01-27T01:14:04.843ZINFOtest_vpcs (oximeter-agent): refreshing list of producers from Nexus collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 file = oximeter/collector/src/agent.rs:557
35812026-01-27T01:14:04.843ZDEBGtest_vpcs (producer-registration-task): client response result = Ok(Response { url: "http://127.0.0.1:46983/metrics/producers", status: 201, headers: {"content-type": "application/json", "x-request-id": "33575175-ea69-4604-9c23-1eb857774614", "content-length": "41", "date": "Tue, 27 Jan 2026 01:14:04 GMT"} })
35822026-01-27T01:14:04.845ZDEBGtest_vpcs (producer-registration-task): successfully registered with Nexus, pausing until time to renew lease lease_duration = 600s wait_period = 150s
35832026-01-27T01:14:04.845ZDEBGtest_vpcs (oximeter): client request body = None method = GET uri = http://127.0.0.1:46983/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
35842026-01-27T01:14:04.846ZTRACtest_vpcs (dropshot_internal): incoming request local_addr = 127.0.0.1:46983 method = GET remote_addr = 127.0.0.1:62470 req_id = 125e6699-9d36-4957-8dcc-68b47186b6db uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
35852026-01-27T01:14:04.846ZDEBGtest_vpcs (dropshot_internal): determined request API version local_addr = 127.0.0.1:46983 method = GET remote_addr = 127.0.0.1:62470 req_id = 125e6699-9d36-4957-8dcc-68b47186b6db uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending version = 1.0.0
35862026-01-27T01:14:04.846ZTRACtest_vpcs (dropshot_internal): incoming request local_addr = 127.0.0.1:46983 method = POST remote_addr = 127.0.0.1:53398 req_id = becee102-7514-448f-90b4-4f5614168a06 uri = /metrics/producers
35872026-01-27T01:14:04.847ZDEBGtest_vpcs (dropshot_internal): determined request API version local_addr = 127.0.0.1:46983 method = POST remote_addr = 127.0.0.1:53398 req_id = becee102-7514-448f-90b4-4f5614168a06 uri = /metrics/producers version = 1.0.0
35882026-01-27T01:14:04.852ZTRACtest_vpcs (dropshot_internal): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) authenticated = true local_addr = 127.0.0.1:46983 method = GET remote_addr = 127.0.0.1:62470 req_id = 125e6699-9d36-4957-8dcc-68b47186b6db resource = Database type = user_builtin uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending user_builtin_id = 001de000-05e4-4000-8000-000000000002
35892026-01-27T01:14:04.852ZDEBGtest_vpcs (dropshot_internal): roles authenticated = true local_addr = 127.0.0.1:46983 method = GET remote_addr = 127.0.0.1:62470 req_id = 125e6699-9d36-4957-8dcc-68b47186b6db roles = RoleSet { roles: {} } type = user_builtin uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending user_builtin_id = 001de000-05e4-4000-8000-000000000002
35902026-01-27T01:14:04.853ZDEBGtest_vpcs (dropshot_internal): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) authenticated = true local_addr = 127.0.0.1:46983 method = GET remote_addr = 127.0.0.1:62470 req_id = 125e6699-9d36-4957-8dcc-68b47186b6db resource = Database result = Ok(()) type = user_builtin uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending user_builtin_id = 001de000-05e4-4000-8000-000000000002
35912026-01-27T01:14:04.855ZTRACtest_vpcs (dropshot_internal): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) authenticated = true local_addr = 127.0.0.1:46983 method = POST remote_addr = 127.0.0.1:53398 req_id = becee102-7514-448f-90b4-4f5614168a06 resource = Database type = user_builtin uri = /metrics/producers user_builtin_id = 001de000-05e4-4000-8000-000000000002
35922026-01-27T01:14:04.855ZDEBGtest_vpcs (dropshot_internal): roles authenticated = true local_addr = 127.0.0.1:46983 method = POST remote_addr = 127.0.0.1:53398 req_id = becee102-7514-448f-90b4-4f5614168a06 roles = RoleSet { roles: {} } type = user_builtin uri = /metrics/producers user_builtin_id = 001de000-05e4-4000-8000-000000000002
35932026-01-27T01:14:04.855ZDEBGtest_vpcs (dropshot_internal): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) authenticated = true local_addr = 127.0.0.1:46983 method = POST remote_addr = 127.0.0.1:53398 req_id = becee102-7514-448f-90b4-4f5614168a06 resource = Database result = Ok(()) type = user_builtin uri = /metrics/producers user_builtin_id = 001de000-05e4-4000-8000-000000000002
35942026-01-27T01:14:04.858ZTRACtest_vpcs (dropshot_external): incoming request local_addr = 127.0.0.1:50372 method = POST remote_addr = 127.0.0.1:38658 req_id = 080f25fb-73f3-4a96-a048-da3d85194d7a uri = /v1/projects
35952026-01-27T01:14:04.858ZDEBGtest_vpcs (dropshot_external): determined request API version local_addr = 127.0.0.1:50372 method = POST remote_addr = 127.0.0.1:38658 req_id = 080f25fb-73f3-4a96-a048-da3d85194d7a uri = /v1/projects version = 2026012300.0.0
35962026-01-27T01:14:04.858ZTRACtest_vpcs (dropshot_external): authn: trying Spoof local_addr = 127.0.0.1:50372 method = POST remote_addr = 127.0.0.1:38658 req_id = 080f25fb-73f3-4a96-a048-da3d85194d7a uri = /v1/projects
35972026-01-27T01:14:04.858ZDEBGtest_vpcs (dropshot_external): looking up silo for user local_addr = 127.0.0.1:50372 method = POST remote_addr = 127.0.0.1:38658 req_id = 080f25fb-73f3-4a96-a048-da3d85194d7a silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/projects
35982026-01-27T01:14:04.858ZTRACtest_vpcs (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. }) resource = Database
35992026-01-27T01:14:04.858ZDEBGtest_vpcs (ExternalAuthn): roles roles = RoleSet { roles: {} }
36002026-01-27T01:14:04.859ZDEBGtest_vpcs (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. }) resource = Database result = Ok(())
36012026-01-27T01:14:04.866ZINFOtest_vpcs (dropshot_internal): request completed latency_us = 20010 local_addr = 127.0.0.1:46983 method = GET remote_addr = 127.0.0.1:62470 req_id = 125e6699-9d36-4957-8dcc-68b47186b6db response_code = 200 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
36022026-01-27T01:14:04.867ZDEBGtest_vpcs (oximeter): client response result = Ok(Response { url: "http://127.0.0.1:46983/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending", status: 200, headers: {"content-type": "application/json", "x-request-id": "125e6699-9d36-4957-8dcc-68b47186b6db", "content-length": "286", "date": "Tue, 27 Jan 2026 01:14:04 GMT"} })
36032026-01-27T01:14:04.868ZDEBGtest_vpcs (oximeter): client request body = None method = GET uri = http://127.0.0.1:46983/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiI5MTMyMzNmZS05MmE4LTQ2MzUtOTU3Mi0xODNmNDk1NDI5YzQifX0%3D
36042026-01-27T01:14:04.868ZTRACtest_vpcs (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. }) resource = Database
36052026-01-27T01:14:04.868ZDEBGtest_vpcs (ExternalAuthn): roles roles = RoleSet { roles: {} }
36062026-01-27T01:14:04.869ZDEBGtest_vpcs (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. }) resource = Database result = Ok(())
36072026-01-27T01:14:04.873ZTRACtest_vpcs (dropshot_internal): incoming request local_addr = 127.0.0.1:46983 method = GET remote_addr = 127.0.0.1:62470 req_id = e1e90e33-7777-42e1-8f13-ae7cedb78d74 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiI5MTMyMzNmZS05MmE4LTQ2MzUtOTU3Mi0xODNmNDk1NDI5YzQifX0%3D
36082026-01-27T01:14:04.873ZDEBGtest_vpcs (dropshot_internal): determined request API version local_addr = 127.0.0.1:46983 method = GET remote_addr = 127.0.0.1:62470 req_id = e1e90e33-7777-42e1-8f13-ae7cedb78d74 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiI5MTMyMzNmZS05MmE4LTQ2MzUtOTU3Mi0xODNmNDk1NDI5YzQifX0%3D version = 1.0.0
36092026-01-27T01:14:04.883ZTRACtest_vpcs (dropshot_internal): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) authenticated = true local_addr = 127.0.0.1:46983 method = GET remote_addr = 127.0.0.1:62470 req_id = e1e90e33-7777-42e1-8f13-ae7cedb78d74 resource = Database type = user_builtin uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiI5MTMyMzNmZS05MmE4LTQ2MzUtOTU3Mi0xODNmNDk1NDI5YzQifX0%3D user_builtin_id = 001de000-05e4-4000-8000-000000000002
36102026-01-27T01:14:04.883ZDEBGtest_vpcs (dropshot_internal): roles authenticated = true local_addr = 127.0.0.1:46983 method = GET remote_addr = 127.0.0.1:62470 req_id = e1e90e33-7777-42e1-8f13-ae7cedb78d74 roles = RoleSet { roles: {} } type = user_builtin uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiI5MTMyMzNmZS05MmE4LTQ2MzUtOTU3Mi0xODNmNDk1NDI5YzQifX0%3D user_builtin_id = 001de000-05e4-4000-8000-000000000002
36112026-01-27T01:14:04.887ZDEBGtest_vpcs (dropshot_internal): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) authenticated = true local_addr = 127.0.0.1:46983 method = GET remote_addr = 127.0.0.1:62470 req_id = e1e90e33-7777-42e1-8f13-ae7cedb78d74 resource = Database result = Ok(()) type = user_builtin uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiI5MTMyMzNmZS05MmE4LTQ2MzUtOTU3Mi0xODNmNDk1NDI5YzQifX0%3D user_builtin_id = 001de000-05e4-4000-8000-000000000002
36122026-01-27T01:14:04.888ZTRACtest_vpcs (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007 (silo_user), lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
36132026-01-27T01:14:04.888ZTRACtest_vpcs (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
36142026-01-27T01:14:04.888ZTRACtest_vpcs (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. }) resource = Database
36152026-01-27T01:14:04.888ZDEBGtest_vpcs (ExternalAuthn): roles roles = RoleSet { roles: {} }
36162026-01-27T01:14:04.889ZDEBGtest_vpcs (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. }) resource = Database result = Ok(())
36172026-01-27T01:14:04.895ZTRACtest_vpcs (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
36182026-01-27T01:14:04.898ZTRACtest_vpcs (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. }) resource = Database
36192026-01-27T01:14:04.898ZDEBGtest_vpcs (ExternalAuthn): roles roles = RoleSet { roles: {} }
36202026-01-27T01:14:04.899ZDEBGtest_vpcs (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. }) resource = Database result = Ok(())
36212026-01-27T01:14:04.901ZINFOtest_vpcs (dropshot_internal): request completed latency_us = 28479 local_addr = 127.0.0.1:46983 method = GET remote_addr = 127.0.0.1:62470 req_id = e1e90e33-7777-42e1-8f13-ae7cedb78d74 response_code = 200 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiI5MTMyMzNmZS05MmE4LTQ2MzUtOTU3Mi0xODNmNDk1NDI5YzQifX0%3D
36222026-01-27T01:14:04.905ZDEBGtest_vpcs (oximeter): client response result = Ok(Response { url: "http://127.0.0.1:46983/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiI5MTMyMzNmZS05MmE4LTQ2MzUtOTU3Mi0xODNmNDk1NDI5YzQifX0%3D", status: 200, headers: {"content-type": "application/json", "x-request-id": "e1e90e33-7777-42e1-8f13-ae7cedb78d74", "content-length": "29", "date": "Tue, 27 Jan 2026 01:14:04 GMT"} })
36232026-01-27T01:14:04.905ZDEBGtest_vpcs (oximeter-agent): registered new metric producer address = 127.0.0.1:62938 collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = 913233fe-92a8-4635-9572-183f495429c4
36242026-01-27T01:14:04.905ZINFOtest_vpcs (oximeter-agent): refreshed list of producers from Nexus collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 file = oximeter/collector/src/agent.rs:632 n_current_tasks = 1 n_pruned_tasks = 0
36252026-01-27T01:14:04.982ZTRACtest_vpcs (collection-task): top of inner collection loop, waiting for next request collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = 913233fe-92a8-4635-9572-183f495429c4 producer_ip = 127.0.0.1 producer_port = 62938
36262026-01-27T01:14:04.983ZDEBGtest_vpcs (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
36272026-01-27T01:14:04.987ZDEBGtest_vpcs (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007 (silo_user), lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
36282026-01-27T01:14:04.987ZTRACtest_vpcs (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. }) resource = Database
36292026-01-27T01:14:04.987ZDEBGtest_vpcs (ExternalAuthn): roles roles = RoleSet { roles: {} }
36302026-01-27T01:14:04.988ZDEBGtest_vpcs (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. }) resource = Database result = Ok(())
36312026-01-27T01:14:04.990ZINFOtest_vpcs (nexus): assigned collector to new producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
36322026-01-27T01:14:04.991ZINFOtest_vpcs (dropshot_internal): request completed latency_us = 144085 local_addr = 127.0.0.1:46983 method = POST remote_addr = 127.0.0.1:53398 req_id = becee102-7514-448f-90b4-4f5614168a06 response_code = 201 uri = /metrics/producers
36332026-01-27T01:14:04.992ZDEBGtest_vpcs (collection-task): reporting oximeter self-collection statistics collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = 913233fe-92a8-4635-9572-183f495429c4 producer_ip = 127.0.0.1 producer_port = 62938
36342026-01-27T01:14:04.993ZDEBGtest_vpcs (collection-task): sent timer-based collection request to the collection task collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = 913233fe-92a8-4635-9572-183f495429c4 producer_ip = 127.0.0.1 producer_port = 62938
36352026-01-27T01:14:05.001ZDEBGtest_vpcs (collection-task): collecting from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = 913233fe-92a8-4635-9572-183f495429c4 producer_ip = 127.0.0.1 producer_port = 62938
36362026-01-27T01:14:05.003ZINFOtest_vpcs (dropshot): accepted connection file = /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.6/src/server.rs:1025 local_addr = 127.0.0.1:62938 remote_addr = 127.0.0.1:54278
36372026-01-27T01:14:05.004ZTRACtest_vpcs (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
36382026-01-27T01:14:05.005ZTRACtest_vpcs (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
36392026-01-27T01:14:05.005ZTRACtest_vpcs (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. }) resource = Database
36402026-01-27T01:14:05.005ZDEBGtest_vpcs (ExternalAuthn): roles roles = RoleSet { roles: {} }
36412026-01-27T01:14:05.005ZDEBGtest_vpcs (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. }) resource = Database result = Ok(())
36422026-01-27T01:14:05.008ZTRACtest_vpcs (dropshot): incoming request local_addr = 127.0.0.1:62938 method = GET remote_addr = 127.0.0.1:54278 req_id = 61a93a76-56a9-4498-bb3b-5549e4562abc uri = /913233fe-92a8-4635-9572-183f495429c4
36432026-01-27T01:14:05.029ZINFOtest_vpcs (dropshot): request completed file = /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.6/src/server.rs:867 latency_us = 21292 local_addr = 127.0.0.1:62938 method = GET remote_addr = 127.0.0.1:54278 req_id = 61a93a76-56a9-4498-bb3b-5549e4562abc response_code = 200 uri = /913233fe-92a8-4635-9572-183f495429c4
36442026-01-27T01:14:05.032ZTRACtest_vpcs (collection-task): sent collection request to producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = 913233fe-92a8-4635-9572-183f495429c4 producer_ip = 127.0.0.1 producer_port = 62938
36452026-01-27T01:14:05.067ZDEBGtest_vpcs (collection-task): collected results from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 n_results = 5 producer_id = 913233fe-92a8-4635-9572-183f495429c4 producer_ip = 127.0.0.1 producer_port = 62938
36462026-01-27T01:14:05.067ZTRACtest_vpcs (collection-task): forwarded results to main collection loop collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = 913233fe-92a8-4635-9572-183f495429c4 producer_ip = 127.0.0.1 producer_port = 62938
36472026-01-27T01:14:05.067ZTRACtest_vpcs (collection-task): top of inner collection loop, waiting for next request collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = 913233fe-92a8-4635-9572-183f495429c4 producer_ip = 127.0.0.1 producer_port = 62938
36482026-01-27T01:14:05.068ZDEBGtest_vpcs (results-sink): inserting 19 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
36492026-01-27T01:14:05.068ZDEBGtest_vpcs (results-sink-cluster): inserting 19 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
36502026-01-27T01:14:05.069ZTRACtest_vpcs (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
36512026-01-27T01:14:05.069ZTRACtest_vpcs (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. }) resource = Database
36522026-01-27T01:14:05.069ZDEBGtest_vpcs (ExternalAuthn): roles roles = RoleSet { roles: {} }
36532026-01-27T01:14:05.070ZDEBGtest_vpcs (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. }) resource = Database result = Ok(())
36542026-01-27T01:14:05.074ZDEBGtest_vpcs (clickhouse-client): unrolling 19 total samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 719060a6-12ac-470c-bb91-e566c7f997b2
36552026-01-27T01:14:05.075ZDEBGtest_vpcs (clickhouse-client): retrieving timeseries schema from database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 719060a6-12ac-470c-bb91-e566c7f997b2
36562026-01-27T01:14:05.075ZTRACtest_vpcs (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 719060a6-12ac-470c-bb91-e566c7f997b2 sql = SELECT * FROM oximeter.timeseries_schema FORMAT Native;
36572026-01-27T01:14:05.079ZTRACtest_vpcs (clickhouse-client): no new timeseries schema in database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 719060a6-12ac-470c-bb91-e566c7f997b2
36582026-01-27T01:14:05.080ZDEBGtest_vpcs (clickhouse-client): new timeseries schema collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 719060a6-12ac-470c-bb91-e566c7f997b2 schema = TimeseriesSchema { timeseries_name: TimeseriesName("oximeter_collector:collections"), description: TimeseriesDescription { target: "", metric: "" }, field_schema: {FieldSchema { name: "base_route", field_type: String, source: Metric, description: "" }, FieldSchema { name: "collector_id", field_type: Uuid, source: Target, description: "" }, FieldSchema { name: "collector_ip", field_type: IpAddr, source: Target, description: "" }, FieldSchema { name: "collector_port", field_type: U16, source: Target, description: "" }, FieldSchema { name: "producer_id", field_type: Uuid, source: Metric, description: "" }, FieldSchema { name: "producer_ip", field_type: IpAddr, source: Metric, description: "" }, FieldSchema { name: "producer_port", field_type: U16, source: Metric, description: "" }}, datum_type: CumulativeU64, version: 1, authz_scope: Fleet, units: Count, created: 2026-01-27T01:14:05.075244811Z } timeseries_name = oximeter_collector:collections
36592026-01-27T01:14:05.081ZDEBGtest_vpcs (clickhouse-client): retrieving timeseries schema from database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 719060a6-12ac-470c-bb91-e566c7f997b2
36602026-01-27T01:14:05.081ZTRACtest_vpcs (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 719060a6-12ac-470c-bb91-e566c7f997b2 sql = SELECT * FROM oximeter.timeseries_schema WHERE timeseries_name NOT IN ('oximeter_collector:collections') FORMAT Native;
36612026-01-27T01:14:05.084ZDEBGtest_vpcs (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
36622026-01-27T01:14:05.089ZDEBGtest_vpcs (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
36632026-01-27T01:14:05.089ZTRACtest_vpcs (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }, device_token_expiration: None, credential_id: None }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [Spoof] }) local_addr = 127.0.0.1:50372 method = POST remote_addr = 127.0.0.1:38658 req_id = 080f25fb-73f3-4a96-a048-da3d85194d7a uri = /v1/projects
36642026-01-27T01:14:05.089ZTRACtest_vpcs (dropshot_external): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true local_addr = 127.0.0.1:50372 method = POST remote_addr = 127.0.0.1:38658 req_id = 080f25fb-73f3-4a96-a048-da3d85194d7a resource = AuditLog silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user uri = /v1/projects
36652026-01-27T01:14:05.089ZTRACtest_vpcs (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. } authenticated = true local_addr = 127.0.0.1:50372 method = POST remote_addr = 127.0.0.1:38658 req_id = 080f25fb-73f3-4a96-a048-da3d85194d7a resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user uri = /v1/projects
36662026-01-27T01:14:05.089ZTRACtest_vpcs (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true local_addr = 127.0.0.1:50372 method = POST remote_addr = 127.0.0.1:38658 req_id = 080f25fb-73f3-4a96-a048-da3d85194d7a resource = Database silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user uri = /v1/projects
36672026-01-27T01:14:05.089ZDEBGtest_vpcs (dropshot_external): roles authenticated = true local_addr = 127.0.0.1:50372 method = POST remote_addr = 127.0.0.1:38658 req_id = 080f25fb-73f3-4a96-a048-da3d85194d7a roles = RoleSet { roles: {} } silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user uri = /v1/projects
36682026-01-27T01:14:05.089ZDEBGtest_vpcs (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true local_addr = 127.0.0.1:50372 method = POST remote_addr = 127.0.0.1:38658 req_id = 080f25fb-73f3-4a96-a048-da3d85194d7a resource = Database result = Ok(()) silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user uri = /v1/projects
36692026-01-27T01:14:05.139ZTRACtest_vpcs (clickhouse-client): no new timeseries schema in database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 719060a6-12ac-470c-bb91-e566c7f997b2
36702026-01-27T01:14:05.139ZDEBGtest_vpcs (clickhouse-client): new timeseries schema collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 719060a6-12ac-470c-bb91-e566c7f997b2 schema = TimeseriesSchema { timeseries_name: TimeseriesName("http_service:request_latency_histogram"), description: TimeseriesDescription { target: "", metric: "" }, field_schema: {FieldSchema { name: "id", field_type: Uuid, source: Target, description: "" }, FieldSchema { name: "name", field_type: String, source: Target, description: "" }, FieldSchema { name: "operation_id", field_type: String, source: Metric, description: "" }, FieldSchema { name: "status_code", field_type: U16, source: Metric, description: "" }}, datum_type: HistogramU64, version: 1, authz_scope: Fleet, units: Count, created: 2026-01-27T01:14:05.081189619Z } timeseries_name = http_service:request_latency_histogram
36712026-01-27T01:14:05.148ZDEBGtest_vpcs (clickhouse-client): retrieving timeseries schema from database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 719060a6-12ac-470c-bb91-e566c7f997b2
36722026-01-27T01:14:05.149ZTRACtest_vpcs (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 719060a6-12ac-470c-bb91-e566c7f997b2 sql = SELECT * FROM oximeter.timeseries_schema WHERE timeseries_name NOT IN ('http_service:request_latency_histogram', 'oximeter_collector:collections') FORMAT Native;
36732026-01-27T01:14:05.154ZDEBGtest_vpcs (dropshot_external): roles authenticated = true local_addr = 127.0.0.1:50372 method = POST remote_addr = 127.0.0.1:38658 req_id = 080f25fb-73f3-4a96-a048-da3d85194d7a roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} } silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user uri = /v1/projects
36742026-01-27T01:14:05.157ZDEBGtest_vpcs (dropshot_external): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true local_addr = 127.0.0.1:50372 method = POST remote_addr = 127.0.0.1:38658 req_id = 080f25fb-73f3-4a96-a048-da3d85194d7a resource = AuditLog result = Ok(()) silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user uri = /v1/projects
36752026-01-27T01:14:05.158ZTRACtest_vpcs (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true local_addr = 127.0.0.1:50372 method = POST remote_addr = 127.0.0.1:38658 req_id = 080f25fb-73f3-4a96-a048-da3d85194d7a resource = Database silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user uri = /v1/projects
36762026-01-27T01:14:05.158ZDEBGtest_vpcs (dropshot_external): roles authenticated = true local_addr = 127.0.0.1:50372 method = POST remote_addr = 127.0.0.1:38658 req_id = 080f25fb-73f3-4a96-a048-da3d85194d7a roles = RoleSet { roles: {} } silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user uri = /v1/projects
36772026-01-27T01:14:05.159ZDEBGtest_vpcs (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true local_addr = 127.0.0.1:50372 method = POST remote_addr = 127.0.0.1:38658 req_id = 080f25fb-73f3-4a96-a048-da3d85194d7a resource = Database result = Ok(()) silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user uri = /v1/projects
36782026-01-27T01:14:05.165ZTRACtest_vpcs (clickhouse-client): no new timeseries schema in database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 719060a6-12ac-470c-bb91-e566c7f997b2
36792026-01-27T01:14:05.166ZDEBGtest_vpcs (clickhouse-client): new timeseries schema collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 719060a6-12ac-470c-bb91-e566c7f997b2 schema = TimeseriesSchema { timeseries_name: TimeseriesName("collection_target:cpus_provisioned"), description: TimeseriesDescription { target: "", metric: "" }, field_schema: {FieldSchema { name: "id", field_type: Uuid, source: Target, description: "" }}, datum_type: I64, version: 1, authz_scope: Fleet, units: Count, created: 2026-01-27T01:14:05.148800623Z } timeseries_name = collection_target:cpus_provisioned
36802026-01-27T01:14:05.167ZDEBGtest_vpcs (clickhouse-client): retrieving timeseries schema from database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 719060a6-12ac-470c-bb91-e566c7f997b2
36812026-01-27T01:14:05.167ZTRACtest_vpcs (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 719060a6-12ac-470c-bb91-e566c7f997b2 sql = SELECT * FROM oximeter.timeseries_schema WHERE timeseries_name NOT IN ('collection_target:cpus_provisioned', 'http_service:request_latency_histogram', 'oximeter_collector:collections') FORMAT Native;
36822026-01-27T01:14:05.171ZTRACtest_vpcs (clickhouse-client): no new timeseries schema in database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 719060a6-12ac-470c-bb91-e566c7f997b2
36832026-01-27T01:14:05.171ZDEBGtest_vpcs (clickhouse-client): new timeseries schema collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 719060a6-12ac-470c-bb91-e566c7f997b2 schema = TimeseriesSchema { timeseries_name: TimeseriesName("collection_target:ram_provisioned"), description: TimeseriesDescription { target: "", metric: "" }, field_schema: {FieldSchema { name: "id", field_type: Uuid, source: Target, description: "" }}, datum_type: I64, version: 1, authz_scope: Fleet, units: Count, created: 2026-01-27T01:14:05.167132554Z } timeseries_name = collection_target:ram_provisioned
36842026-01-27T01:14:05.172ZDEBGtest_vpcs (clickhouse-client): retrieving timeseries schema from database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 719060a6-12ac-470c-bb91-e566c7f997b2
36852026-01-27T01:14:05.172ZTRACtest_vpcs (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 719060a6-12ac-470c-bb91-e566c7f997b2 sql = SELECT * FROM oximeter.timeseries_schema WHERE timeseries_name NOT IN ('collection_target:cpus_provisioned', 'collection_target:ram_provisioned', 'http_service:request_latency_histogram', 'oximeter_collector:collections') FORMAT Native;
36862026-01-27T01:14:05.175ZWARNtest_vpcs (results-sink-cluster): failed to insert some results into metric DB collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 error = Failed to check out connection to database: No backends found for this service file = oximeter/collector/src/results_sink.rs:92
36872026-01-27T01:14:05.175ZTRACtest_vpcs (clickhouse-client): no new timeseries schema in database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 719060a6-12ac-470c-bb91-e566c7f997b2
36882026-01-27T01:14:05.175ZDEBGtest_vpcs (clickhouse-client): new timeseries schema collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 719060a6-12ac-470c-bb91-e566c7f997b2 schema = TimeseriesSchema { timeseries_name: TimeseriesName("collection_target:virtual_disk_space_provisioned"), description: TimeseriesDescription { target: "", metric: "" }, field_schema: {FieldSchema { name: "id", field_type: Uuid, source: Target, description: "" }}, datum_type: I64, version: 1, authz_scope: Fleet, units: Count, created: 2026-01-27T01:14:05.172305766Z } timeseries_name = collection_target:virtual_disk_space_provisioned
36892026-01-27T01:14:05.184ZDEBGtest_vpcs (clickhouse-client): inserting 5 new timeseries schema collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 719060a6-12ac-470c-bb91-e566c7f997b2
36902026-01-27T01:14:05.184ZTRACtest_vpcs (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 719060a6-12ac-470c-bb91-e566c7f997b2 n_columns = 6 n_rows = 5 sql = INSERT INTO oximeter.timeseries_schema FORMAT Native
36912026-01-27T01:14:05.197ZTRACtest_vpcs (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 719060a6-12ac-470c-bb91-e566c7f997b2 n_columns = 4 n_rows = 2 sql = INSERT INTO oximeter.fields_ipaddr FORMAT Native
36922026-01-27T01:14:05.203ZDEBGtest_vpcs (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 719060a6-12ac-470c-bb91-e566c7f997b2 n_rows = 2 table_name = fields_ipaddr
36932026-01-27T01:14:05.203ZTRACtest_vpcs (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 719060a6-12ac-470c-bb91-e566c7f997b2 n_columns = 4 n_rows = 13 sql = INSERT INTO oximeter.fields_string FORMAT Native
36942026-01-27T01:14:05.211ZDEBGtest_vpcs (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 719060a6-12ac-470c-bb91-e566c7f997b2 n_rows = 13 table_name = fields_string
36952026-01-27T01:14:05.211ZTRACtest_vpcs (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 719060a6-12ac-470c-bb91-e566c7f997b2 n_columns = 4 n_rows = 8 sql = INSERT INTO oximeter.fields_u16 FORMAT Native
36962026-01-27T01:14:05.240ZDEBGtest_vpcs (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 719060a6-12ac-470c-bb91-e566c7f997b2 n_rows = 8 table_name = fields_u16
36972026-01-27T01:14:05.240ZTRACtest_vpcs (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 719060a6-12ac-470c-bb91-e566c7f997b2 n_columns = 4 n_rows = 20 sql = INSERT INTO oximeter.fields_uuid FORMAT Native
36982026-01-27T01:14:05.256ZDEBGtest_vpcs (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 719060a6-12ac-470c-bb91-e566c7f997b2 n_rows = 20 table_name = fields_uuid
36992026-01-27T01:14:05.256ZTRACtest_vpcs (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 719060a6-12ac-470c-bb91-e566c7f997b2 n_columns = 5 n_rows = 1 sql = INSERT INTO oximeter.measurements_cumulativeu64 FORMAT Native
37002026-01-27T01:14:05.268ZDEBGtest_vpcs (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 719060a6-12ac-470c-bb91-e566c7f997b2 n_rows = 1 table_name = measurements_cumulativeu64
37012026-01-27T01:14:05.268ZTRACtest_vpcs (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 719060a6-12ac-470c-bb91-e566c7f997b2 n_columns = 19 n_rows = 6 sql = INSERT INTO oximeter.measurements_histogramu64 FORMAT Native
37022026-01-27T01:14:05.273ZDEBGtest_vpcs (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 719060a6-12ac-470c-bb91-e566c7f997b2 n_rows = 6 table_name = measurements_histogramu64
37032026-01-27T01:14:05.273ZTRACtest_vpcs (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 719060a6-12ac-470c-bb91-e566c7f997b2 n_columns = 4 n_rows = 12 sql = INSERT INTO oximeter.measurements_i64 FORMAT Native
37042026-01-27T01:14:05.276ZDEBGtest_vpcs (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 719060a6-12ac-470c-bb91-e566c7f997b2 n_rows = 12 table_name = measurements_i64
37052026-01-27T01:14:05.276ZTRACtest_vpcs (results-sink): successfully inserted samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
37062026-01-27T01:14:05.355ZTRACtest_vpcs (dropshot_external): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true local_addr = 127.0.0.1:50372 method = POST remote_addr = 127.0.0.1:38658 req_id = 080f25fb-73f3-4a96-a048-da3d85194d7a resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user uri = /v1/projects
37072026-01-27T01:14:05.355ZTRACtest_vpcs (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. } authenticated = true local_addr = 127.0.0.1:50372 method = POST remote_addr = 127.0.0.1:38658 req_id = 080f25fb-73f3-4a96-a048-da3d85194d7a resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user uri = /v1/projects
37082026-01-27T01:14:05.355ZTRACtest_vpcs (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true local_addr = 127.0.0.1:50372 method = POST remote_addr = 127.0.0.1:38658 req_id = 080f25fb-73f3-4a96-a048-da3d85194d7a resource = Database silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user uri = /v1/projects
37092026-01-27T01:14:05.355ZDEBGtest_vpcs (dropshot_external): roles authenticated = true local_addr = 127.0.0.1:50372 method = POST remote_addr = 127.0.0.1:38658 req_id = 080f25fb-73f3-4a96-a048-da3d85194d7a roles = RoleSet { roles: {} } silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user uri = /v1/projects
37102026-01-27T01:14:05.374ZDEBGtest_vpcs (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true local_addr = 127.0.0.1:50372 method = POST remote_addr = 127.0.0.1:38658 req_id = 080f25fb-73f3-4a96-a048-da3d85194d7a resource = Database result = Ok(()) silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user uri = /v1/projects
37112026-01-27T01:14:05.394ZTRACtest_vpcs (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. } authenticated = true local_addr = 127.0.0.1:50372 method = POST remote_addr = 127.0.0.1:38658 req_id = 080f25fb-73f3-4a96-a048-da3d85194d7a resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user uri = /v1/projects
37122026-01-27T01:14:05.394ZTRACtest_vpcs (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true local_addr = 127.0.0.1:50372 method = POST remote_addr = 127.0.0.1:38658 req_id = 080f25fb-73f3-4a96-a048-da3d85194d7a resource = Database silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user uri = /v1/projects
37132026-01-27T01:14:05.394ZDEBGtest_vpcs (dropshot_external): roles authenticated = true local_addr = 127.0.0.1:50372 method = POST remote_addr = 127.0.0.1:38658 req_id = 080f25fb-73f3-4a96-a048-da3d85194d7a roles = RoleSet { roles: {} } silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user uri = /v1/projects
37142026-01-27T01:14:05.398ZDEBGtest_vpcs (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true local_addr = 127.0.0.1:50372 method = POST remote_addr = 127.0.0.1:38658 req_id = 080f25fb-73f3-4a96-a048-da3d85194d7a resource = Database result = Ok(()) silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user uri = /v1/projects
37152026-01-27T01:14:05.406ZDEBGtest_vpcs (dropshot_external): roles authenticated = true local_addr = 127.0.0.1:50372 method = POST remote_addr = 127.0.0.1:38658 req_id = 080f25fb-73f3-4a96-a048-da3d85194d7a roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user uri = /v1/projects
37162026-01-27T01:14:05.411ZDEBGtest_vpcs (dropshot_external): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true local_addr = 127.0.0.1:50372 method = POST remote_addr = 127.0.0.1:38658 req_id = 080f25fb-73f3-4a96-a048-da3d85194d7a resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(()) silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user uri = /v1/projects
37172026-01-27T01:14:05.412ZINFOtest_vpcs (SagaQuiesceHandle): tracking newly created saga saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
37182026-01-27T01:14:05.412ZINFOtest_vpcs (SagaExecutor): preparing saga saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57 saga_name = project-create
37192026-01-27T01:14:05.415ZINFOtest_vpcs (SEC): saga create dag = {"end_node":21,"graph":{"edge_property":"directed","edges":[[0,1,null],[1,2,null],[3,4,null],[4,5,null],[5,6,null],[6,7,null],[7,8,null],[8,9,null],[9,10,null],[10,11,null],[11,12,null],[12,13,null],[13,14,null],[14,15,null],[15,16,null],[16,17,null],[17,18,null],[2,3,null],[18,19,null],[20,0,null],[19,21,null]],"node_holes":[],"nodes":[{"Action":{"action_name":"project_create.project_create_record","label":"ProjectCreateRecord","name":"project"}},{"Action":{"action_name":"project_create.project_create_vpc_params","label":"ProjectCreateVpcParams","name":"vpc_create_params"}},{"SubsagaStart":{"params_node_name":"vpc_create_params","saga_name":"vpc-create"}},{"Action":{"action_name":"common.uuid_generate","label":"GenerateVpcId","name":"vpc_id"}},{"Action":{"action_name":"common.uuid_generate","label":"GenerateSystemRouterId","name":"system_router_id"}},{"Action":{"action_name":"common.uuid_generate","label":"GenerateDefaultV4RouteId","name":"default_v4_route_id"}},{"Action":{"action_name":"common.uuid_generate","label":"GenerateDefaultV6RouteId","name":"default_v6_route_id"}},{"Action":{"action_name":"common.uuid_generate","label":"GenerateSubnetRouteId","name":"subnet_route_id"}},{"Action":{"action_name":"common.uuid_generate","label":"GenerateDefaultSubnetId","name":"default_subnet_id"}},{"Action":{"action_name":"common.uuid_generate","label":"GenerateDefaultInternetGatewayId","name":"default_internet_gateway_id"}},{"Action":{"action_name":"vpc_create.vpc_create_vpc","label":"VpcCreateVpc","name":"vpc"}},{"Action":{"action_name":"vpc_create.vpc_create_router","label":"VpcCreateRouter","name":"router"}},{"Action":{"action_name":"vpc_create.vpc_create_v4_route","label":"VpcCreateV4Route","name":"route4"}},{"Action":{"action_name":"vpc_create.vpc_create_v6_route","label":"VpcCreateV6Route","name":"route6"}},{"Action":{"action_name":"vpc_create.vpc_create_subnet","label":"VpcCreateSubnet","name":"subnet"}},{"Action":{"action_name":"vpc_create.vpc_create_subnet_route","label":"VpcCreateSubnetRoute","name":"route"}},{"Action":{"action_name":"vpc_create.vpc_update_firewall","label":"VpcUpdateFirewall","name":"firewall"}},{"Action":{"action_name":"vpc_create.vpc_create_gateway","label":"VpcCreateGateway","name":"gateway"}},{"Action":{"action_name":"vpc_create.vpc_notify_sleds","label":"VpcNotifySleds","name":"no_result"}},{"SubsagaEnd":{"name":"vpc"}},{"Start":{"params":{"authz_silo":{"key":"001de000-5110-4000-8000-000000000000","lookup_type":{"ById":"001de000-5110-4000-8000-000000000000"},"parent":null},"project_create":{"description":"a pier","name":"springfield-squidport"},"serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}},"credential_id":null,"device_token_expiration":null},{"mapped_fleet_roles":{}}]}}}}},"End"]},"saga_name":"project-create","start_node":20} saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57 saga_name = project-create sec_id = 913233fe-92a8-4635-9572-183f495429c4
37202026-01-27T01:14:05.415ZINFOtest_vpcs (SecStore): creating saga saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57 saga_name = project-create
37212026-01-27T01:14:05.429ZINFOtest_vpcs (SagaExecutor): starting saga saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57 saga_name = project-create
37222026-01-27T01:14:05.430ZINFOtest_vpcs (SEC): saga start saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57 saga_name = project-create sec_id = 913233fe-92a8-4635-9572-183f495429c4
37232026-01-27T01:14:05.430ZDEBGtest_vpcs (SEC): saga log event new_state = N020 started sec_id = 913233fe-92a8-4635-9572-183f495429c4
37242026-01-27T01:14:05.430ZDEBGtest_vpcs (SecStore): recording saga event event_type = Started node_id = 20 saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
37252026-01-27T01:14:05.486ZDEBGtest_vpcs (SEC): saga log event new_state = N020 succeeded sec_id = 913233fe-92a8-4635-9572-183f495429c4
37262026-01-27T01:14:05.487ZDEBGtest_vpcs (SecStore): recording saga event event_type = Succeeded(Null) node_id = 20 saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
37272026-01-27T01:14:05.509ZDEBGtest_vpcs (SEC): saga log event new_state = N000 started sec_id = 913233fe-92a8-4635-9572-183f495429c4
37282026-01-27T01:14:05.510ZDEBGtest_vpcs (SecStore): recording saga event event_type = Started node_id = 0 saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
37292026-01-27T01:14:05.528ZTRACtest_vpcs (SagaExecutor): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57 saga_name = project-create saga_node = ProjectCreateRecord silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
37302026-01-27T01:14:05.529ZTRACtest_vpcs (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. } authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57 saga_name = project-create saga_node = ProjectCreateRecord silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
37312026-01-27T01:14:05.529ZTRACtest_vpcs (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57 saga_name = project-create saga_node = ProjectCreateRecord silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
37322026-01-27T01:14:05.529ZDEBGtest_vpcs (SagaExecutor): roles authenticated = true roles = RoleSet { roles: {} } saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57 saga_name = project-create saga_node = ProjectCreateRecord silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
37332026-01-27T01:14:05.530ZDEBGtest_vpcs (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database result = Ok(()) saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57 saga_name = project-create saga_node = ProjectCreateRecord silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
37342026-01-27T01:14:05.540ZINFOtest_vpcs (BackgroundTasks): inserted inventory collection background_task = inventory_collection collection_id = 26e04365-9d11-40b8-b64d-d52efd2ebbc3
37352026-01-27T01:14:05.541ZDEBGtest_vpcs (BackgroundTasks): inventory collection complete background_task = inventory_collection collection_id = 26e04365-9d11-40b8-b64d-d52efd2ebbc3 time_started = 2026-01-27 01:14:00.923174 UTC
37362026-01-27T01:14:05.541ZDEBGtest_vpcs (BackgroundTasks): activation complete background_task = inventory_collection elapsed = 5.285769344s iteration = 3 status = {"collection_id":"26e04365-9d11-40b8-b64d-d52efd2ebbc3","time_done":"2026-01-27 01:14:03.187386 UTC","time_started":"2026-01-27 01:14:00.923174 UTC"}
37372026-01-27T01:14:05.541ZDEBGtest_vpcs (BackgroundTasks): activating background_task = inventory_loader iteration = 2 reason = Dependency
37382026-01-27T01:14:05.541ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = inventory_loader resource = Inventory
37392026-01-27T01:14:05.541ZTRACtest_vpcs (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } background_task = inventory_loader resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
37402026-01-27T01:14:05.541ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = inventory_loader resource = Database
37412026-01-27T01:14:05.541ZDEBGtest_vpcs (BackgroundTasks): roles background_task = inventory_loader roles = RoleSet { roles: {} }
37422026-01-27T01:14:05.541ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = inventory_loader resource = Database result = Ok(())
37432026-01-27T01:14:05.543ZDEBGtest_vpcs (BackgroundTasks): activating background_task = multicast_reconciler iteration = 2 reason = Dependency
37442026-01-27T01:14:05.543ZTRACtest_vpcs (BackgroundTasks): multicast group reconciler activating background_task = multicast_reconciler
37452026-01-27T01:14:05.543ZTRACtest_vpcs (BackgroundTasks): starting multicast reconciliation pass background_task = multicast_reconciler
37462026-01-27T01:14:05.543ZINFOtest_vpcs (BackgroundTasks): invalidating multicast caches due to topology change background_task = multicast_reconciler
37472026-01-27T01:14:05.543ZTRACtest_vpcs (DnsResolver): lookup_all_socket_v6 srv dns_name = _dendrite._tcp.control-plane.oxide.internal
37482026-01-27T01:14:05.544ZTRACtest_vpcs (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. } authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57 saga_name = project-create saga_node = ProjectCreateRecord silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
37492026-01-27T01:14:05.544ZTRACtest_vpcs (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57 saga_name = project-create saga_node = ProjectCreateRecord silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
37502026-01-27T01:14:05.545ZDEBGtest_vpcs (SagaExecutor): roles authenticated = true roles = RoleSet { roles: {} } saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57 saga_name = project-create saga_node = ProjectCreateRecord silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
37512026-01-27T01:14:05.545ZDEBGtest_vpcs (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database result = Ok(()) saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57 saga_name = project-create saga_node = ProjectCreateRecord silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
37522026-01-27T01:14:05.558ZDEBGtest_vpcs (BackgroundTasks): roles background_task = inventory_loader roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
37532026-01-27T01:14:05.569ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = inventory_loader resource = Inventory result = Ok(())
37542026-01-27T01:14:05.569ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = inventory_loader resource = Database
37552026-01-27T01:14:05.570ZDEBGtest_vpcs (BackgroundTasks): roles background_task = inventory_loader roles = RoleSet { roles: {} }
37562026-01-27T01:14:05.570ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = inventory_loader resource = Database result = Ok(())
37572026-01-27T01:14:05.575ZDEBGtest_vpcs (SagaExecutor): roles authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57 saga_name = project-create saga_node = ProjectCreateRecord silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
37582026-01-27T01:14:05.582ZDEBGtest_vpcs (SagaExecutor): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(()) saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57 saga_name = project-create saga_node = ProjectCreateRecord silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
37592026-01-27T01:14:05.583ZTRACtest_vpcs (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57 saga_name = project-create saga_node = ProjectCreateRecord silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
37602026-01-27T01:14:05.583ZDEBGtest_vpcs (SagaExecutor): roles authenticated = true roles = RoleSet { roles: {} } saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57 saga_name = project-create saga_node = ProjectCreateRecord silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
37612026-01-27T01:14:05.583ZDEBGtest_vpcs (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database result = Ok(()) saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57 saga_name = project-create saga_node = ProjectCreateRecord silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
37622026-01-27T01:14:05.587ZTRACtest_vpcs (dns): buffer buffer = Length: 72 (0x48) bytes\n0000: a8 8d 01 00 00 01 00 00 00 00 00 01 09 5f 64 65 ............._de\n0010: 6e 64 72 69 74 65 04 5f 74 63 70 0d 63 6f 6e 74 ndrite._tcp.cont\n0020: 72 6f 6c 2d 70 6c 61 6e 65 05 6f 78 69 64 65 08 rol-plane.oxide.\n0030: 69 6e 74 65 72 6e 61 6c 00 00 21 00 01 00 00 29 internal..!....)\n0040: 04 d0 00 00 00 00 00 00 ........ kind = dns peer_addr = [::1]:41532 req_id = 89ad338d-1066-47d4-a681-0885a3b4bf9a
37632026-01-27T01:14:05.587ZDEBGtest_vpcs (dns): message_request kind = dns mr = MessageRequest {\n header: Header {\n id: 43149,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n queries: Queries {\n queries: [\n LowerQuery {\n name: LowerName(\n Name("_dendrite._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_dendrite._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n ],\n original: [\n 9,\n 95,\n 100,\n 101,\n 110,\n 100,\n 114,\n 105,\n 116,\n 101,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n flags: EdnsFlags {\n dnssec_ok: false,\n z: 0,\n },\n max_payload: 1232,\n options: OPT {\n options: [],\n },\n },\n ),\n} peer_addr = [::1]:41532 req_id = 89ad338d-1066-47d4-a681-0885a3b4bf9a
37642026-01-27T01:14:05.588ZDEBGtest_vpcs (store): query key key = _dendrite._tcp
37652026-01-27T01:14:05.588ZDEBGtest_vpcs (store): query key key = dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host
37662026-01-27T01:14:05.588ZDEBGtest_vpcs (dns): dns response additional_records = [Record { name_labels: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal"), dns_class: IN, ttl: 0, rdata: AAAA(AAAA(::1)) }] kind = dns peer_addr = [::1]:41532 query = LowerQuery { name: LowerName(Name("_dendrite._tcp.control-plane.oxide.internal.")), original: Query { name: Name("_dendrite._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN } } records = [Record { name_labels: Name("_dendrite._tcp.control-plane.oxide.internal."), dns_class: IN, ttl: 0, rdata: SRV(SRV { priority: 0, weight: 0, port: 53072, target: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal") }) }] req_id = 89ad338d-1066-47d4-a681-0885a3b4bf9a
37672026-01-27T01:14:05.588ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = inventory_loader resource = Database
37682026-01-27T01:14:05.589ZDEBGtest_vpcs (BackgroundTasks): roles background_task = inventory_loader roles = RoleSet { roles: {} }
37692026-01-27T01:14:05.590ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = inventory_loader resource = Database result = Ok(())
37702026-01-27T01:14:05.595ZDEBGtest_vpcs (DnsResolver): lookup_all_socket_v6 srv dns_name = _dendrite._tcp.control-plane.oxide.internal response = SrvLookup(Lookup { query: Query { name: Name("_dendrite._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN }, records: [Record { name_labels: Name("_dendrite._tcp.control-plane.oxide.internal."), dns_class: IN, ttl: 0, rdata: SRV(SRV { priority: 0, weight: 0, port: 53072, target: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal.") }) }, Record { name_labels: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."), dns_class: IN, ttl: 0, rdata: AAAA(AAAA(::1)) }], valid_until: Instant { tv_sec: 10287, tv_nsec: 404402519 } })
37712026-01-27T01:14:05.595ZTRACtest_vpcs (DnsResolver): lookup_service_targets: looking up SRV target
37722026-01-27T01:14:05.606ZTRACtest_vpcs (dns): buffer buffer = Length: 108 (0x6c) bytes\n0000: d2 f3 01 00 00 01 00 00 00 00 00 01 2d 64 65 6e ............-den\n0010: 64 72 69 74 65 2d 62 36 64 36 35 33 34 31 2d 31 drite-b6d65341-1\n0020: 36 37 63 2d 34 31 64 66 2d 39 62 35 63 2d 34 31 67c-41df-9b5c-41\n0030: 63 64 65 64 39 39 63 32 32 39 04 68 6f 73 74 0d cded99c229.host.\n0040: 63 6f 6e 74 72 6f 6c 2d 70 6c 61 6e 65 05 6f 78 control-plane.ox\n0050: 69 64 65 08 69 6e 74 65 72 6e 61 6c 00 00 1c 00 ide.internal....\n0060: 01 00 00 29 04 d0 00 00 00 00 00 00 ...)........ kind = dns peer_addr = [::1]:20083 req_id = 495e253f-a529-4918-aae8-f5a6fdd81e50
37732026-01-27T01:14:05.606ZDEBGtest_vpcs (dns): message_request kind = dns mr = MessageRequest {\n header: Header {\n id: 54003,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n queries: Queries {\n queries: [\n LowerQuery {\n name: LowerName(\n Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."),\n query_type: AAAA,\n query_class: IN,\n },\n },\n ],\n original: [\n 45,\n 100,\n 101,\n 110,\n 100,\n 114,\n 105,\n 116,\n 101,\n 45,\n 98,\n 54,\n 100,\n 54,\n 53,\n 51,\n 52,\n 49,\n 45,\n 49,\n 54,\n 55,\n 99,\n 45,\n 52,\n 49,\n 100,\n 102,\n 45,\n 57,\n 98,\n 53,\n 99,\n 45,\n 52,\n 49,\n 99,\n 100,\n 101,\n 100,\n 57,\n 57,\n 99,\n 50,\n 50,\n 57,\n 4,\n 104,\n 111,\n 115,\n 116,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 28,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n flags: EdnsFlags {\n dnssec_ok: false,\n z: 0,\n },\n max_payload: 1232,\n options: OPT {\n options: [],\n },\n },\n ),\n} peer_addr = [::1]:20083 req_id = 495e253f-a529-4918-aae8-f5a6fdd81e50
37742026-01-27T01:14:05.607ZDEBGtest_vpcs (store): query key key = dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host
37752026-01-27T01:14:05.607ZDEBGtest_vpcs (dns): dns response additional_records = [] kind = dns peer_addr = [::1]:20083 query = LowerQuery { name: LowerName(Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal.")), original: Query { name: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."), query_type: AAAA, query_class: IN } } records = [Record { name_labels: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."), dns_class: IN, ttl: 0, rdata: AAAA(AAAA(::1)) }] req_id = 495e253f-a529-4918-aae8-f5a6fdd81e50
37762026-01-27T01:14:05.709ZTRACtest_vpcs (DpdClient): client request background_task = multicast_reconciler body = None method = GET uri = http://[::1]:53072/switch/identifiers
37772026-01-27T01:14:05.710ZTRACtest_vpcs (results-sink): batch interval expired, but no samples to insert collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
37782026-01-27T01:14:05.710ZTRACtest_vpcs (results-sink-cluster): batch interval expired, but no samples to insert collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
37792026-01-27T01:14:05.733ZTRACtest_vpcs (DpdClient): client response background_task = multicast_reconciler result = Ok(Response { url: "http://[::1]:53072/switch/identifiers", status: 200, headers: {"content-type": "application/json", "x-request-id": "2eed54cb-bb68-4388-8fed-c11443cfbaa9", "content-length": "206", "date": "Tue, 27 Jan 2026 01:14:05 GMT"} })
37802026-01-27T01:14:05.734ZTRACtest_vpcs (BackgroundTasks): searching for multicast groups background_task = multicast_reconciler state = Creating
37812026-01-27T01:14:05.735ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = multicast_reconciler resource = Database
37822026-01-27T01:14:05.743ZDEBGtest_vpcs (BackgroundTasks): roles background_task = multicast_reconciler roles = RoleSet { roles: {} }
37832026-01-27T01:14:05.744ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = multicast_reconciler resource = Database result = Ok(())
37842026-01-27T01:14:05.758ZDEBGtest_vpcs (SEC): saga log event new_state = N000 succeeded sec_id = 913233fe-92a8-4635-9572-183f495429c4
37852026-01-27T01:14:05.758ZDEBGtest_vpcs (SecStore): recording saga event event_type = Succeeded(Array [Object {"key": String("a1a9a9c7-9e7e-48b3-8937-c3723503857b"), "lookup_type": Object {"ByName": String("springfield-squidport")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}, Object {"identity": Object {"description": String("a pier"), "id": String("a1a9a9c7-9e7e-48b3-8937-c3723503857b"), "name": String("springfield-squidport"), "time_created": String("2026-01-27T01:14:05.528374Z"), "time_deleted": Null, "time_modified": String("2026-01-27T01:14:05.528374Z")}, "rcgen": Number(1), "silo_id": String("001de000-5110-4000-8000-000000000000")}]) node_id = 0 saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
37862026-01-27T01:14:05.787ZDEBGtest_vpcs (SEC): saga log event new_state = N001 started sec_id = 913233fe-92a8-4635-9572-183f495429c4
37872026-01-27T01:14:05.787ZDEBGtest_vpcs (SecStore): recording saga event event_type = Started node_id = 1 saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
37882026-01-27T01:14:05.803ZDEBGtest_vpcs (SEC): saga log event new_state = N001 succeeded sec_id = 913233fe-92a8-4635-9572-183f495429c4
37892026-01-27T01:14:05.810ZDEBGtest_vpcs (SecStore): recording saga event event_type = Succeeded(Object {"authz_project": Object {"key": String("a1a9a9c7-9e7e-48b3-8937-c3723503857b"), "lookup_type": Object {"ByName": String("springfield-squidport")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}, "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}, "credential_id": Null, "device_token_expiration": Null}, Object {"mapped_fleet_roles": Object {}}]}}, "vpc_create": Object {"description": String("Default VPC"), "dns_name": String("default"), "ipv6_prefix": String("fd6f:1fa5:6c45::/48"), "name": String("default")}}) node_id = 1 saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
37902026-01-27T01:14:05.822ZDEBGtest_vpcs (SEC): saga log event new_state = N002 started sec_id = 913233fe-92a8-4635-9572-183f495429c4
37912026-01-27T01:14:05.823ZDEBGtest_vpcs (SecStore): recording saga event event_type = Started node_id = 2 saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
37922026-01-27T01:14:05.851ZTRACtest_vpcs (BackgroundTasks): found multicast groups background_task = multicast_reconciler count = 0 state = Creating
37932026-01-27T01:14:05.863ZTRACtest_vpcs (BackgroundTasks): reconciling member state changes background_task = multicast_reconciler
37942026-01-27T01:14:05.864ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = multicast_reconciler resource = Database
37952026-01-27T01:14:05.864ZDEBGtest_vpcs (BackgroundTasks): roles background_task = multicast_reconciler roles = RoleSet { roles: {} }
37962026-01-27T01:14:05.865ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = multicast_reconciler resource = Database result = Ok(())
37972026-01-27T01:14:05.868ZDEBGtest_vpcs (SEC): saga log event new_state = N002 succeeded sec_id = 913233fe-92a8-4635-9572-183f495429c4
37982026-01-27T01:14:05.868ZDEBGtest_vpcs (SecStore): recording saga event event_type = Succeeded(Null) node_id = 2 saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
37992026-01-27T01:14:05.896ZDEBGtest_vpcs (SEC): saga log event new_state = N003 started sec_id = 913233fe-92a8-4635-9572-183f495429c4
38002026-01-27T01:14:05.896ZDEBGtest_vpcs (SecStore): recording saga event event_type = Started node_id = 3 saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
38012026-01-27T01:14:05.956ZDEBGtest_vpcs (SEC): saga log event new_state = N003 succeeded sec_id = 913233fe-92a8-4635-9572-183f495429c4
38022026-01-27T01:14:05.957ZDEBGtest_vpcs (SecStore): recording saga event event_type = Succeeded(String("9702b4b6-b761-4a78-93c1-48a3b0004b27")) node_id = 3 saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
38032026-01-27T01:14:05.973ZDEBGtest_vpcs (SEC): saga log event new_state = N004 started sec_id = 913233fe-92a8-4635-9572-183f495429c4
38042026-01-27T01:14:05.973ZDEBGtest_vpcs (SecStore): recording saga event event_type = Started node_id = 4 saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
38052026-01-27T01:14:06.016ZDEBGtest_vpcs (SEC): saga log event new_state = N004 succeeded sec_id = 913233fe-92a8-4635-9572-183f495429c4
38062026-01-27T01:14:06.017ZDEBGtest_vpcs (SecStore): recording saga event event_type = Succeeded(String("9b4d23dd-a0db-427f-957b-c661053a0cc4")) node_id = 4 saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
38072026-01-27T01:14:06.028ZDEBGtest_vpcs (SEC): saga log event new_state = N005 started sec_id = 913233fe-92a8-4635-9572-183f495429c4
38082026-01-27T01:14:06.028ZDEBGtest_vpcs (SecStore): recording saga event event_type = Started node_id = 5 saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
38092026-01-27T01:14:06.033ZDEBGtest_vpcs (SEC): saga log event new_state = N005 succeeded sec_id = 913233fe-92a8-4635-9572-183f495429c4
38102026-01-27T01:14:06.033ZDEBGtest_vpcs (SecStore): recording saga event event_type = Succeeded(String("02ab13cb-7e3c-4290-85f5-7c4e1cfdbc3f")) node_id = 5 saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
38112026-01-27T01:14:06.043ZDEBGtest_vpcs (SEC): saga log event new_state = N006 started sec_id = 913233fe-92a8-4635-9572-183f495429c4
38122026-01-27T01:14:06.043ZDEBGtest_vpcs (SecStore): recording saga event event_type = Started node_id = 6 saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
38132026-01-27T01:14:06.060ZDEBGtest_vpcs (SEC): saga log event new_state = N006 succeeded sec_id = 913233fe-92a8-4635-9572-183f495429c4
38142026-01-27T01:14:06.060ZDEBGtest_vpcs (SecStore): recording saga event event_type = Succeeded(String("9b7b7a26-0077-4905-8449-e7599aee34cf")) node_id = 6 saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
38152026-01-27T01:14:06.069ZDEBGtest_vpcs (SEC): saga log event new_state = N007 started sec_id = 913233fe-92a8-4635-9572-183f495429c4
38162026-01-27T01:14:06.070ZDEBGtest_vpcs (SecStore): recording saga event event_type = Started node_id = 7 saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
38172026-01-27T01:14:06.071ZDEBGtest_vpcs (BackgroundTasks): member state reconciliation completed background_task = multicast_reconciler members_processed = 0
38182026-01-27T01:14:06.071ZTRACtest_vpcs (BackgroundTasks): cleaning up deleted multicast members background_task = multicast_reconciler
38192026-01-27T01:14:06.071ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = multicast_reconciler resource = Database
38202026-01-27T01:14:06.071ZDEBGtest_vpcs (BackgroundTasks): roles background_task = multicast_reconciler roles = RoleSet { roles: {} }
38212026-01-27T01:14:06.072ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = multicast_reconciler resource = Database result = Ok(())
38222026-01-27T01:14:06.077ZDEBGtest_vpcs (SEC): saga log event new_state = N007 succeeded sec_id = 913233fe-92a8-4635-9572-183f495429c4
38232026-01-27T01:14:06.077ZDEBGtest_vpcs (SecStore): recording saga event event_type = Succeeded(String("70322159-3612-4366-a5c5-0de230edee74")) node_id = 7 saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
38242026-01-27T01:14:06.083ZDEBGtest_vpcs (SEC): saga log event new_state = N008 started sec_id = 913233fe-92a8-4635-9572-183f495429c4
38252026-01-27T01:14:06.084ZDEBGtest_vpcs (SecStore): recording saga event event_type = Started node_id = 8 saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
38262026-01-27T01:14:06.096ZDEBGtest_vpcs (SEC): saga log event new_state = N008 succeeded sec_id = 913233fe-92a8-4635-9572-183f495429c4
38272026-01-27T01:14:06.096ZDEBGtest_vpcs (SecStore): recording saga event event_type = Succeeded(String("8876f6e2-bc47-4ea3-bd82-a5551e4427e8")) node_id = 8 saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
38282026-01-27T01:14:06.104ZDEBGtest_vpcs (SEC): saga log event new_state = N009 started sec_id = 913233fe-92a8-4635-9572-183f495429c4
38292026-01-27T01:14:06.104ZDEBGtest_vpcs (SecStore): recording saga event event_type = Started node_id = 9 saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
38302026-01-27T01:14:06.108ZDEBGtest_vpcs (SEC): saga log event new_state = N009 succeeded sec_id = 913233fe-92a8-4635-9572-183f495429c4
38312026-01-27T01:14:06.109ZDEBGtest_vpcs (SecStore): recording saga event event_type = Succeeded(String("3b9499d6-e746-4ec4-846d-b9447f3c858f")) node_id = 9 saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
38322026-01-27T01:14:06.115ZDEBGtest_vpcs (SEC): saga log event new_state = N010 started sec_id = 913233fe-92a8-4635-9572-183f495429c4
38332026-01-27T01:14:06.115ZDEBGtest_vpcs (SecStore): recording saga event event_type = Started node_id = 10 saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
38342026-01-27T01:14:06.121ZTRACtest_vpcs (SagaExecutor): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: a1a9a9c7-9e7e-48b3-8937-c3723503857b, lookup_type: ByName("springfield-squidport") } saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57 saga_name = project-create saga_node = VpcCreateVpc silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
38352026-01-27T01:14:06.121ZTRACtest_vpcs (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. } authenticated = true resource_id = a1a9a9c7-9e7e-48b3-8937-c3723503857b resource_type = Project saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57 saga_name = project-create saga_node = VpcCreateVpc silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
38362026-01-27T01:14:06.121ZTRACtest_vpcs (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57 saga_name = project-create saga_node = VpcCreateVpc silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
38372026-01-27T01:14:06.121ZDEBGtest_vpcs (SagaExecutor): roles authenticated = true roles = RoleSet { roles: {} } saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57 saga_name = project-create saga_node = VpcCreateVpc silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
38382026-01-27T01:14:06.123ZDEBGtest_vpcs (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database result = Ok(()) saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57 saga_name = project-create saga_node = VpcCreateVpc silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
38392026-01-27T01:14:06.158ZTRACtest_vpcs (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. } authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57 saga_name = project-create saga_node = VpcCreateVpc silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
38402026-01-27T01:14:06.158ZTRACtest_vpcs (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57 saga_name = project-create saga_node = VpcCreateVpc silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
38412026-01-27T01:14:06.158ZDEBGtest_vpcs (SagaExecutor): roles authenticated = true roles = RoleSet { roles: {} } saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57 saga_name = project-create saga_node = VpcCreateVpc silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
38422026-01-27T01:14:06.160ZDEBGtest_vpcs (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database result = Ok(()) saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57 saga_name = project-create saga_node = VpcCreateVpc silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
38432026-01-27T01:14:06.168ZTRACtest_vpcs (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. } authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57 saga_name = project-create saga_node = VpcCreateVpc silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
38442026-01-27T01:14:06.168ZTRACtest_vpcs (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57 saga_name = project-create saga_node = VpcCreateVpc silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
38452026-01-27T01:14:06.168ZDEBGtest_vpcs (SagaExecutor): roles authenticated = true roles = RoleSet { roles: {} } saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57 saga_name = project-create saga_node = VpcCreateVpc silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
38462026-01-27T01:14:06.169ZDEBGtest_vpcs (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database result = Ok(()) saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57 saga_name = project-create saga_node = VpcCreateVpc silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
38472026-01-27T01:14:06.171ZDEBGtest_vpcs (BackgroundTasks): multicast group member complete deletion finished background_task = multicast_reconciler left_and_time_deleted_members_deleted = 0
38482026-01-27T01:14:06.171ZTRACtest_vpcs (BackgroundTasks): checking for empty multicast groups to implicitly delete background_task = multicast_reconciler
38492026-01-27T01:14:06.171ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = multicast_reconciler resource = Database
38502026-01-27T01:14:06.171ZDEBGtest_vpcs (BackgroundTasks): roles background_task = multicast_reconciler roles = RoleSet { roles: {} }
38512026-01-27T01:14:06.172ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = multicast_reconciler resource = Database result = Ok(())
38522026-01-27T01:14:06.177ZTRACtest_vpcs (BackgroundTasks): searching for multicast groups background_task = multicast_reconciler state = Active
38532026-01-27T01:14:06.177ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = multicast_reconciler resource = Database
38542026-01-27T01:14:06.177ZDEBGtest_vpcs (BackgroundTasks): roles background_task = multicast_reconciler roles = RoleSet { roles: {} }
38552026-01-27T01:14:06.178ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = multicast_reconciler resource = Database result = Ok(())
38562026-01-27T01:14:06.181ZDEBGtest_vpcs (SagaExecutor): roles authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57 saga_name = project-create saga_node = VpcCreateVpc silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
38572026-01-27T01:14:06.194ZDEBGtest_vpcs (SagaExecutor): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: a1a9a9c7-9e7e-48b3-8937-c3723503857b, lookup_type: ByName("springfield-squidport") } result = Ok(()) saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57 saga_name = project-create saga_node = VpcCreateVpc silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
38582026-01-27T01:14:06.194ZTRACtest_vpcs (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57 saga_name = project-create saga_node = VpcCreateVpc silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
38592026-01-27T01:14:06.195ZDEBGtest_vpcs (SagaExecutor): roles authenticated = true roles = RoleSet { roles: {} } saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57 saga_name = project-create saga_node = VpcCreateVpc silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
38602026-01-27T01:14:06.195ZDEBGtest_vpcs (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database result = Ok(()) saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57 saga_name = project-create saga_node = VpcCreateVpc silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
38612026-01-27T01:14:06.200ZTRACtest_vpcs (BackgroundTasks): found multicast groups background_task = multicast_reconciler count = 0 state = Active
38622026-01-27T01:14:06.200ZTRACtest_vpcs (BackgroundTasks): searching for multicast groups background_task = multicast_reconciler state = Deleting
38632026-01-27T01:14:06.200ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = multicast_reconciler resource = Database
38642026-01-27T01:14:06.200ZDEBGtest_vpcs (BackgroundTasks): roles background_task = multicast_reconciler roles = RoleSet { roles: {} }
38652026-01-27T01:14:06.201ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = multicast_reconciler resource = Database result = Ok(())
38662026-01-27T01:14:06.209ZTRACtest_vpcs (BackgroundTasks): found multicast groups background_task = multicast_reconciler count = 0 state = Deleting
38672026-01-27T01:14:06.210ZTRACtest_vpcs (BackgroundTasks): multicast RPW reconciliation cycle completed active_groups_verified = 0 background_task = multicast_reconciler error_count = 0 external_groups_created = 0 external_groups_deleted = 0 member_lifecycle_transitions = 0 orphaned_member_cleanup = 0 total_dpd_operations = 0
38682026-01-27T01:14:06.211ZTRACtest_vpcs (BackgroundTasks): multicast RPW reconciliation pass completed - dataplane consistent background_task = multicast_reconciler
38692026-01-27T01:14:06.212ZDEBGtest_vpcs (BackgroundTasks): activation complete background_task = multicast_reconciler elapsed = 668.463598ms iteration = 2 status = {"disabled":false,"empty_groups_marked":0,"errors":[],"groups_created":0,"groups_deleted":0,"groups_verified":0,"members_deleted":0,"members_processed":0}
38702026-01-27T01:14:06.212ZDEBGtest_vpcs (BackgroundTasks): activation complete background_task = inventory_loader elapsed = 672.279985ms iteration = 2 status = {"Loaded":{"collection_id":"26e04365-9d11-40b8-b64d-d52efd2ebbc3","time_loaded":"2026-01-27T01:14:05.540289437Z","time_started":"2026-01-27T01:14:00.923174Z"}}
38712026-01-27T01:14:06.213ZDEBGtest_vpcs (BackgroundTasks): activating background_task = multicast_reconciler iteration = 3 reason = Dependency
38722026-01-27T01:14:06.213ZTRACtest_vpcs (BackgroundTasks): multicast group reconciler activating background_task = multicast_reconciler
38732026-01-27T01:14:06.213ZTRACtest_vpcs (BackgroundTasks): starting multicast reconciliation pass background_task = multicast_reconciler
38742026-01-27T01:14:06.213ZTRACtest_vpcs (DnsResolver): lookup_all_socket_v6 srv dns_name = _dendrite._tcp.control-plane.oxide.internal
38752026-01-27T01:14:06.213ZDEBGtest_vpcs (BackgroundTasks): activating background_task = blueprint_planner iteration = 4 reason = Dependency
38762026-01-27T01:14:06.213ZDEBGtest_vpcs (BackgroundTasks): blueprint planning disabled, doing nothing background_task = blueprint_planner
38772026-01-27T01:14:06.213ZDEBGtest_vpcs (BackgroundTasks): activation complete background_task = blueprint_planner elapsed = 68.295\u{b5}s iteration = 4 status = "Disabled"
38782026-01-27T01:14:06.214ZDEBGtest_vpcs (BackgroundTasks): activating background_task = physical_disk_adoption iteration = 2 reason = Dependency
38792026-01-27T01:14:06.214ZDEBGtest_vpcs (BackgroundTasks): activation complete background_task = physical_disk_adoption elapsed = 20.35\u{b5}s iteration = 2 status = {"error":"task disabled"}
38802026-01-27T01:14:06.214ZDEBGtest_vpcs (BackgroundTasks): activating background_task = blueprint_rendezvous iteration = 2 reason = Dependency
38812026-01-27T01:14:06.214ZTRACtest_vpcs (BackgroundTasks): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = blueprint_rendezvous resource = Fleet
38822026-01-27T01:14:06.214ZTRACtest_vpcs (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } background_task = blueprint_rendezvous resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
38832026-01-27T01:14:06.214ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = blueprint_rendezvous resource = Database
38842026-01-27T01:14:06.214ZDEBGtest_vpcs (BackgroundTasks): roles background_task = blueprint_rendezvous roles = RoleSet { roles: {} }
38852026-01-27T01:14:06.215ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = blueprint_rendezvous resource = Database result = Ok(())
38862026-01-27T01:14:06.220ZTRACtest_vpcs (dns): buffer buffer = Length: 72 (0x48) bytes\n0000: 19 4c 01 00 00 01 00 00 00 00 00 01 09 5f 64 65 .L..........._de\n0010: 6e 64 72 69 74 65 04 5f 74 63 70 0d 63 6f 6e 74 ndrite._tcp.cont\n0020: 72 6f 6c 2d 70 6c 61 6e 65 05 6f 78 69 64 65 08 rol-plane.oxide.\n0030: 69 6e 74 65 72 6e 61 6c 00 00 21 00 01 00 00 29 internal..!....)\n0040: 04 d0 00 00 00 00 00 00 ........ kind = dns peer_addr = [::1]:46583 req_id = 73e410bc-b7ca-4a64-b1eb-882316cf3490
38872026-01-27T01:14:06.220ZDEBGtest_vpcs (dns): message_request kind = dns mr = MessageRequest {\n header: Header {\n id: 6476,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n queries: Queries {\n queries: [\n LowerQuery {\n name: LowerName(\n Name("_dendrite._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_dendrite._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n ],\n original: [\n 9,\n 95,\n 100,\n 101,\n 110,\n 100,\n 114,\n 105,\n 116,\n 101,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n flags: EdnsFlags {\n dnssec_ok: false,\n z: 0,\n },\n max_payload: 1232,\n options: OPT {\n options: [],\n },\n },\n ),\n} peer_addr = [::1]:46583 req_id = 73e410bc-b7ca-4a64-b1eb-882316cf3490
38882026-01-27T01:14:06.220ZDEBGtest_vpcs (store): query key key = _dendrite._tcp
38892026-01-27T01:14:06.220ZDEBGtest_vpcs (store): query key key = dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host
38902026-01-27T01:14:06.221ZDEBGtest_vpcs (dns): dns response additional_records = [Record { name_labels: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal"), dns_class: IN, ttl: 0, rdata: AAAA(AAAA(::1)) }] kind = dns peer_addr = [::1]:46583 query = LowerQuery { name: LowerName(Name("_dendrite._tcp.control-plane.oxide.internal.")), original: Query { name: Name("_dendrite._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN } } records = [Record { name_labels: Name("_dendrite._tcp.control-plane.oxide.internal."), dns_class: IN, ttl: 0, rdata: SRV(SRV { priority: 0, weight: 0, port: 53072, target: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal") }) }] req_id = 73e410bc-b7ca-4a64-b1eb-882316cf3490
38912026-01-27T01:14:06.221ZDEBGtest_vpcs (BackgroundTasks): roles background_task = blueprint_rendezvous roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
38922026-01-27T01:14:06.228ZDEBGtest_vpcs (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = blueprint_rendezvous resource = Fleet result = Ok(())
38932026-01-27T01:14:06.229ZTRACtest_vpcs (BackgroundTasks): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = blueprint_rendezvous resource = Fleet
38942026-01-27T01:14:06.229ZTRACtest_vpcs (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } background_task = blueprint_rendezvous resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
38952026-01-27T01:14:06.229ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = blueprint_rendezvous resource = Database
38962026-01-27T01:14:06.229ZDEBGtest_vpcs (BackgroundTasks): roles background_task = blueprint_rendezvous roles = RoleSet { roles: {} }
38972026-01-27T01:14:06.229ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = blueprint_rendezvous resource = Database result = Ok(())
38982026-01-27T01:14:06.232ZDEBGtest_vpcs (SEC): saga log event new_state = N010 succeeded sec_id = 913233fe-92a8-4635-9572-183f495429c4
38992026-01-27T01:14:06.232ZDEBGtest_vpcs (SecStore): recording saga event event_type = Succeeded(Array [Object {"key": String("9702b4b6-b761-4a78-93c1-48a3b0004b27"), "lookup_type": Object {"ByName": String("default")}, "parent": Object {"key": String("a1a9a9c7-9e7e-48b3-8937-c3723503857b"), "lookup_type": Object {"ByName": String("springfield-squidport")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}}, Object {"dns_name": String("default"), "firewall_gen": Number(1), "identity": Object {"description": String("Default VPC"), "id": String("9702b4b6-b761-4a78-93c1-48a3b0004b27"), "name": String("default"), "time_created": String("2026-01-27T01:14:06.121281Z"), "time_deleted": Null, "time_modified": String("2026-01-27T01:14:06.121281Z")}, "ipv6_prefix": String("fd6f:1fa5:6c45::/48"), "project_id": String("a1a9a9c7-9e7e-48b3-8937-c3723503857b"), "subnet_gen": Number(1), "system_router_id": String("9b4d23dd-a0db-427f-957b-c661053a0cc4"), "vni": Number(16560289)}]) node_id = 10 saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
39002026-01-27T01:14:06.238ZDEBGtest_vpcs (DnsResolver): lookup_all_socket_v6 srv dns_name = _dendrite._tcp.control-plane.oxide.internal response = SrvLookup(Lookup { query: Query { name: Name("_dendrite._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN }, records: [Record { name_labels: Name("_dendrite._tcp.control-plane.oxide.internal."), dns_class: IN, ttl: 0, rdata: SRV(SRV { priority: 0, weight: 0, port: 53072, target: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal.") }) }, Record { name_labels: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."), dns_class: IN, ttl: 0, rdata: AAAA(AAAA(::1)) }], valid_until: Instant { tv_sec: 10288, tv_nsec: 44258350 } })
39012026-01-27T01:14:06.238ZTRACtest_vpcs (DnsResolver): lookup_service_targets: looking up SRV target
39022026-01-27T01:14:06.240ZDEBGtest_vpcs (BackgroundTasks): roles background_task = blueprint_rendezvous roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
39032026-01-27T01:14:06.249ZDEBGtest_vpcs (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = blueprint_rendezvous resource = Fleet result = Ok(())
39042026-01-27T01:14:06.249ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = blueprint_rendezvous resource = Database
39052026-01-27T01:14:06.249ZDEBGtest_vpcs (BackgroundTasks): roles background_task = blueprint_rendezvous roles = RoleSet { roles: {} }
39062026-01-27T01:14:06.250ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = blueprint_rendezvous resource = Database result = Ok(())
39072026-01-27T01:14:06.253ZDEBGtest_vpcs (SEC): saga log event new_state = N011 started sec_id = 913233fe-92a8-4635-9572-183f495429c4
39082026-01-27T01:14:06.254ZDEBGtest_vpcs (SecStore): recording saga event event_type = Started node_id = 11 saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
39092026-01-27T01:14:06.263ZTRACtest_vpcs (dns): buffer buffer = Length: 108 (0x6c) bytes\n0000: b2 bb 01 00 00 01 00 00 00 00 00 01 2d 64 65 6e ............-den\n0010: 64 72 69 74 65 2d 62 36 64 36 35 33 34 31 2d 31 drite-b6d65341-1\n0020: 36 37 63 2d 34 31 64 66 2d 39 62 35 63 2d 34 31 67c-41df-9b5c-41\n0030: 63 64 65 64 39 39 63 32 32 39 04 68 6f 73 74 0d cded99c229.host.\n0040: 63 6f 6e 74 72 6f 6c 2d 70 6c 61 6e 65 05 6f 78 control-plane.ox\n0050: 69 64 65 08 69 6e 74 65 72 6e 61 6c 00 00 1c 00 ide.internal....\n0060: 01 00 00 29 04 d0 00 00 00 00 00 00 ...)........ kind = dns peer_addr = [::1]:3258 req_id = 5f2d02ac-df24-4864-80f0-77358192e070
39102026-01-27T01:14:06.263ZDEBGtest_vpcs (dns): message_request kind = dns mr = MessageRequest {\n header: Header {\n id: 45755,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n queries: Queries {\n queries: [\n LowerQuery {\n name: LowerName(\n Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."),\n query_type: AAAA,\n query_class: IN,\n },\n },\n ],\n original: [\n 45,\n 100,\n 101,\n 110,\n 100,\n 114,\n 105,\n 116,\n 101,\n 45,\n 98,\n 54,\n 100,\n 54,\n 53,\n 51,\n 52,\n 49,\n 45,\n 49,\n 54,\n 55,\n 99,\n 45,\n 52,\n 49,\n 100,\n 102,\n 45,\n 57,\n 98,\n 53,\n 99,\n 45,\n 52,\n 49,\n 99,\n 100,\n 101,\n 100,\n 57,\n 57,\n 99,\n 50,\n 50,\n 57,\n 4,\n 104,\n 111,\n 115,\n 116,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 28,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n flags: EdnsFlags {\n dnssec_ok: false,\n z: 0,\n },\n max_payload: 1232,\n options: OPT {\n options: [],\n },\n },\n ),\n} peer_addr = [::1]:3258 req_id = 5f2d02ac-df24-4864-80f0-77358192e070
39112026-01-27T01:14:06.263ZDEBGtest_vpcs (store): query key key = dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host
39122026-01-27T01:14:06.263ZDEBGtest_vpcs (dns): dns response additional_records = [] kind = dns peer_addr = [::1]:3258 query = LowerQuery { name: LowerName(Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal.")), original: Query { name: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."), query_type: AAAA, query_class: IN } } records = [Record { name_labels: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."), dns_class: IN, ttl: 0, rdata: AAAA(AAAA(::1)) }] req_id = 5f2d02ac-df24-4864-80f0-77358192e070
39132026-01-27T01:14:06.337ZTRACtest_vpcs (DpdClient): client request background_task = multicast_reconciler body = None method = GET uri = http://[::1]:53072/switch/identifiers
39142026-01-27T01:14:06.340ZTRACtest_vpcs (SagaExecutor): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: a1a9a9c7-9e7e-48b3-8937-c3723503857b, lookup_type: ByName("springfield-squidport") }, key: 9702b4b6-b761-4a78-93c1-48a3b0004b27, lookup_type: ByName("default") } saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57 saga_name = project-create saga_node = VpcCreateRouter silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
39152026-01-27T01:14:06.340ZTRACtest_vpcs (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. } authenticated = true resource_id = a1a9a9c7-9e7e-48b3-8937-c3723503857b resource_type = Project saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57 saga_name = project-create saga_node = VpcCreateRouter silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
39162026-01-27T01:14:06.340ZTRACtest_vpcs (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57 saga_name = project-create saga_node = VpcCreateRouter silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
39172026-01-27T01:14:06.341ZDEBGtest_vpcs (SagaExecutor): roles authenticated = true roles = RoleSet { roles: {} } saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57 saga_name = project-create saga_node = VpcCreateRouter silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
39182026-01-27T01:14:06.341ZDEBGtest_vpcs (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database result = Ok(()) saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57 saga_name = project-create saga_node = VpcCreateRouter silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
39192026-01-27T01:14:06.343ZTRACtest_vpcs (BackgroundTasks): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = blueprint_rendezvous resource = Fleet
39202026-01-27T01:14:06.343ZTRACtest_vpcs (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } background_task = blueprint_rendezvous resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
39212026-01-27T01:14:06.344ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = blueprint_rendezvous resource = Database
39222026-01-27T01:14:06.344ZDEBGtest_vpcs (BackgroundTasks): roles background_task = blueprint_rendezvous roles = RoleSet { roles: {} }
39232026-01-27T01:14:06.344ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = blueprint_rendezvous resource = Database result = Ok(())
39242026-01-27T01:14:06.348ZTRACtest_vpcs (DpdClient): client response background_task = multicast_reconciler result = Ok(Response { url: "http://[::1]:53072/switch/identifiers", status: 200, headers: {"content-type": "application/json", "x-request-id": "b2bddeaf-4cee-4b5e-b7d6-fe1b4bc10d22", "content-length": "206", "date": "Tue, 27 Jan 2026 01:14:06 GMT"} })
39252026-01-27T01:14:06.348ZTRACtest_vpcs (BackgroundTasks): searching for multicast groups background_task = multicast_reconciler state = Creating
39262026-01-27T01:14:06.348ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = multicast_reconciler resource = Database
39272026-01-27T01:14:06.348ZDEBGtest_vpcs (BackgroundTasks): roles background_task = multicast_reconciler roles = RoleSet { roles: {} }
39282026-01-27T01:14:06.351ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = multicast_reconciler resource = Database result = Ok(())
39292026-01-27T01:14:06.353ZDEBGtest_vpcs (BackgroundTasks): roles background_task = blueprint_rendezvous roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
39302026-01-27T01:14:06.360ZDEBGtest_vpcs (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = blueprint_rendezvous resource = Fleet result = Ok(())
39312026-01-27T01:14:06.360ZTRACtest_vpcs (BackgroundTasks): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = blueprint_rendezvous resource = Fleet
39322026-01-27T01:14:06.360ZTRACtest_vpcs (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } background_task = blueprint_rendezvous resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
39332026-01-27T01:14:06.360ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = blueprint_rendezvous resource = Database
39342026-01-27T01:14:06.360ZDEBGtest_vpcs (BackgroundTasks): roles background_task = blueprint_rendezvous roles = RoleSet { roles: {} }
39352026-01-27T01:14:06.361ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = blueprint_rendezvous resource = Database result = Ok(())
39362026-01-27T01:14:06.362ZTRACtest_vpcs (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. } authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57 saga_name = project-create saga_node = VpcCreateRouter silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
39372026-01-27T01:14:06.363ZTRACtest_vpcs (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57 saga_name = project-create saga_node = VpcCreateRouter silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
39382026-01-27T01:14:06.363ZDEBGtest_vpcs (SagaExecutor): roles authenticated = true roles = RoleSet { roles: {} } saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57 saga_name = project-create saga_node = VpcCreateRouter silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
39392026-01-27T01:14:06.363ZDEBGtest_vpcs (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database result = Ok(()) saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57 saga_name = project-create saga_node = VpcCreateRouter silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
39402026-01-27T01:14:06.370ZDEBGtest_vpcs (BackgroundTasks): roles background_task = blueprint_rendezvous roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
39412026-01-27T01:14:06.376ZDEBGtest_vpcs (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = blueprint_rendezvous resource = Fleet result = Ok(())
39422026-01-27T01:14:06.376ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = blueprint_rendezvous resource = Database
39432026-01-27T01:14:06.376ZDEBGtest_vpcs (BackgroundTasks): roles background_task = blueprint_rendezvous roles = RoleSet { roles: {} }
39442026-01-27T01:14:06.377ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = blueprint_rendezvous resource = Database result = Ok(())
39452026-01-27T01:14:06.399ZTRACtest_vpcs (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. } authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57 saga_name = project-create saga_node = VpcCreateRouter silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
39462026-01-27T01:14:06.399ZTRACtest_vpcs (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57 saga_name = project-create saga_node = VpcCreateRouter silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
39472026-01-27T01:14:06.399ZDEBGtest_vpcs (SagaExecutor): roles authenticated = true roles = RoleSet { roles: {} } saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57 saga_name = project-create saga_node = VpcCreateRouter silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
39482026-01-27T01:14:06.400ZDEBGtest_vpcs (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database result = Ok(()) saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57 saga_name = project-create saga_node = VpcCreateRouter silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
39492026-01-27T01:14:06.402ZINFOtest_vpcs (BackgroundTasks): ensured all Crucible datasets present in inventory have database records background_task = blueprint_rendezvous num_already_exist = 0 num_inserted = 0 num_not_in_inventory = 0
39502026-01-27T01:14:06.402ZTRACtest_vpcs (BackgroundTasks): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = blueprint_rendezvous resource = Fleet
39512026-01-27T01:14:06.403ZTRACtest_vpcs (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } background_task = blueprint_rendezvous resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
39522026-01-27T01:14:06.403ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = blueprint_rendezvous resource = Database
39532026-01-27T01:14:06.403ZDEBGtest_vpcs (BackgroundTasks): roles background_task = blueprint_rendezvous roles = RoleSet { roles: {} }
39542026-01-27T01:14:06.405ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = blueprint_rendezvous resource = Database result = Ok(())
39552026-01-27T01:14:06.420ZDEBGtest_vpcs (BackgroundTasks): roles background_task = blueprint_rendezvous roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
39562026-01-27T01:14:06.425ZDEBGtest_vpcs (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = blueprint_rendezvous resource = Fleet result = Ok(())
39572026-01-27T01:14:06.426ZTRACtest_vpcs (BackgroundTasks): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = blueprint_rendezvous resource = Fleet
39582026-01-27T01:14:06.426ZTRACtest_vpcs (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } background_task = blueprint_rendezvous resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
39592026-01-27T01:14:06.426ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = blueprint_rendezvous resource = Database
39602026-01-27T01:14:06.426ZDEBGtest_vpcs (BackgroundTasks): roles background_task = blueprint_rendezvous roles = RoleSet { roles: {} }
39612026-01-27T01:14:06.426ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = blueprint_rendezvous resource = Database result = Ok(())
39622026-01-27T01:14:06.428ZDEBGtest_vpcs (SagaExecutor): roles authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57 saga_name = project-create saga_node = VpcCreateRouter silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
39632026-01-27T01:14:06.447ZDEBGtest_vpcs (SagaExecutor): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: a1a9a9c7-9e7e-48b3-8937-c3723503857b, lookup_type: ByName("springfield-squidport") }, key: 9702b4b6-b761-4a78-93c1-48a3b0004b27, lookup_type: ByName("default") } result = Ok(()) saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57 saga_name = project-create saga_node = VpcCreateRouter silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
39642026-01-27T01:14:06.447ZTRACtest_vpcs (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57 saga_name = project-create saga_node = VpcCreateRouter silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
39652026-01-27T01:14:06.447ZDEBGtest_vpcs (SagaExecutor): roles authenticated = true roles = RoleSet { roles: {} } saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57 saga_name = project-create saga_node = VpcCreateRouter silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
39662026-01-27T01:14:06.450ZDEBGtest_vpcs (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database result = Ok(()) saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57 saga_name = project-create saga_node = VpcCreateRouter silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
39672026-01-27T01:14:06.453ZTRACtest_vpcs (BackgroundTasks): found multicast groups background_task = multicast_reconciler count = 0 state = Creating
39682026-01-27T01:14:06.453ZTRACtest_vpcs (BackgroundTasks): reconciling member state changes background_task = multicast_reconciler
39692026-01-27T01:14:06.453ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = multicast_reconciler resource = Database
39702026-01-27T01:14:06.453ZDEBGtest_vpcs (BackgroundTasks): roles background_task = multicast_reconciler roles = RoleSet { roles: {} }
39712026-01-27T01:14:06.454ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = multicast_reconciler resource = Database result = Ok(())
39722026-01-27T01:14:06.456ZDEBGtest_vpcs (BackgroundTasks): roles background_task = blueprint_rendezvous roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
39732026-01-27T01:14:06.461ZDEBGtest_vpcs (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = blueprint_rendezvous resource = Fleet result = Ok(())
39742026-01-27T01:14:06.461ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = blueprint_rendezvous resource = Database
39752026-01-27T01:14:06.461ZDEBGtest_vpcs (BackgroundTasks): roles background_task = blueprint_rendezvous roles = RoleSet { roles: {} }
39762026-01-27T01:14:06.462ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = blueprint_rendezvous resource = Database result = Ok(())
39772026-01-27T01:14:06.470ZDEBGtest_vpcs (BackgroundTasks): member state reconciliation completed background_task = multicast_reconciler members_processed = 0
39782026-01-27T01:14:06.470ZTRACtest_vpcs (BackgroundTasks): cleaning up deleted multicast members background_task = multicast_reconciler
39792026-01-27T01:14:06.470ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = multicast_reconciler resource = Database
39802026-01-27T01:14:06.470ZDEBGtest_vpcs (BackgroundTasks): roles background_task = multicast_reconciler roles = RoleSet { roles: {} }
39812026-01-27T01:14:06.472ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = multicast_reconciler resource = Database result = Ok(())
39822026-01-27T01:14:06.490ZDEBGtest_vpcs (BackgroundTasks): activating background_task = inventory_loader iteration = 3 reason = Timeout
39832026-01-27T01:14:06.490ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = inventory_loader resource = Inventory
39842026-01-27T01:14:06.491ZTRACtest_vpcs (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } background_task = inventory_loader resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
39852026-01-27T01:14:06.491ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = inventory_loader resource = Database
39862026-01-27T01:14:06.491ZDEBGtest_vpcs (BackgroundTasks): roles background_task = inventory_loader roles = RoleSet { roles: {} }
39872026-01-27T01:14:06.492ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = inventory_loader resource = Database result = Ok(())
39882026-01-27T01:14:06.497ZINFOtest_vpcs (BackgroundTasks): all LocalStorage datasets reconciled background_task = blueprint_rendezvous num_already_exist = 0 num_already_tombstoned = 0 num_inserted = 0 num_not_in_inventory = 0 num_tombstoned = 0
39892026-01-27T01:14:06.497ZDEBGtest_vpcs (BackgroundTasks): activation complete background_task = blueprint_rendezvous elapsed = 283.29989ms iteration = 2 status = {"blueprint_id":"c01a6e26-b5bc-40f6-ba41-c1d23b303d2d","inventory_collection_id":"26e04365-9d11-40b8-b64d-d52efd2ebbc3","stats":{"crucible_dataset":{"num_already_exist":0,"num_inserted":0,"num_not_in_inventory":0},"debug_dataset":{"num_already_exist":0,"num_already_tombstoned":0,"num_inserted":0,"num_not_in_inventory":0,"num_tombstoned":0},"local_storage_dataset":{"num_already_exist":0,"num_already_tombstoned":0,"num_inserted":0,"num_not_in_inventory":0,"num_tombstoned":0}}}
39902026-01-27T01:14:06.516ZDEBGtest_vpcs (BackgroundTasks): roles background_task = inventory_loader roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
39912026-01-27T01:14:06.537ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = inventory_loader resource = Inventory result = Ok(())
39922026-01-27T01:14:06.538ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = inventory_loader resource = Database
39932026-01-27T01:14:06.538ZDEBGtest_vpcs (BackgroundTasks): roles background_task = inventory_loader roles = RoleSet { roles: {} }
39942026-01-27T01:14:06.538ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = inventory_loader resource = Database result = Ok(())
39952026-01-27T01:14:06.550ZDEBGtest_vpcs (BackgroundTasks): latest inventory collection is unchanged background_task = inventory_loader original_id = 26e04365-9d11-40b8-b64d-d52efd2ebbc3 original_time_started = 2026-01-27 01:14:00.923174 UTC
39962026-01-27T01:14:06.550ZDEBGtest_vpcs (BackgroundTasks): activation complete background_task = inventory_loader elapsed = 60.19701ms iteration = 3 status = {"Loaded":{"collection_id":"26e04365-9d11-40b8-b64d-d52efd2ebbc3","time_loaded":"2026-01-27T01:14:06.490663666Z","time_started":"2026-01-27T01:14:00.923174Z"}}
39972026-01-27T01:14:06.564ZDEBGtest_vpcs (SEC): saga log event new_state = N011 succeeded sec_id = 913233fe-92a8-4635-9572-183f495429c4
39982026-01-27T01:14:06.564ZDEBGtest_vpcs (SecStore): recording saga event event_type = Succeeded(Object {"key": String("9b4d23dd-a0db-427f-957b-c661053a0cc4"), "lookup_type": Object {"ById": String("9b4d23dd-a0db-427f-957b-c661053a0cc4")}, "parent": Object {"key": String("9702b4b6-b761-4a78-93c1-48a3b0004b27"), "lookup_type": Object {"ByName": String("default")}, "parent": Object {"key": String("a1a9a9c7-9e7e-48b3-8937-c3723503857b"), "lookup_type": Object {"ByName": String("springfield-squidport")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}}}) node_id = 11 saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
39992026-01-27T01:14:06.584ZDEBGtest_vpcs (SEC): saga log event new_state = N012 started sec_id = 913233fe-92a8-4635-9572-183f495429c4
40002026-01-27T01:14:06.585ZDEBGtest_vpcs (SecStore): recording saga event event_type = Started node_id = 12 saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
40012026-01-27T01:14:06.593ZTRACtest_vpcs (SagaExecutor): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: a1a9a9c7-9e7e-48b3-8937-c3723503857b, lookup_type: ByName("springfield-squidport") }, key: 9702b4b6-b761-4a78-93c1-48a3b0004b27, lookup_type: ByName("default") }, key: 9b4d23dd-a0db-427f-957b-c661053a0cc4, lookup_type: ById(9b4d23dd-a0db-427f-957b-c661053a0cc4) } saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57 saga_name = project-create saga_node = VpcCreateV4Route silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
40022026-01-27T01:14:06.593ZTRACtest_vpcs (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. } authenticated = true resource_id = a1a9a9c7-9e7e-48b3-8937-c3723503857b resource_type = Project saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57 saga_name = project-create saga_node = VpcCreateV4Route silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
40032026-01-27T01:14:06.593ZTRACtest_vpcs (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57 saga_name = project-create saga_node = VpcCreateV4Route silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
40042026-01-27T01:14:06.593ZDEBGtest_vpcs (SagaExecutor): roles authenticated = true roles = RoleSet { roles: {} } saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57 saga_name = project-create saga_node = VpcCreateV4Route silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
40052026-01-27T01:14:06.594ZDEBGtest_vpcs (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database result = Ok(()) saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57 saga_name = project-create saga_node = VpcCreateV4Route silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
40062026-01-27T01:14:06.602ZDEBGtest_vpcs (BackgroundTasks): multicast group member complete deletion finished background_task = multicast_reconciler left_and_time_deleted_members_deleted = 0
40072026-01-27T01:14:06.602ZTRACtest_vpcs (BackgroundTasks): checking for empty multicast groups to implicitly delete background_task = multicast_reconciler
40082026-01-27T01:14:06.603ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = multicast_reconciler resource = Database
40092026-01-27T01:14:06.603ZDEBGtest_vpcs (BackgroundTasks): roles background_task = multicast_reconciler roles = RoleSet { roles: {} }
40102026-01-27T01:14:06.605ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = multicast_reconciler resource = Database result = Ok(())
40112026-01-27T01:14:06.606ZTRACtest_vpcs (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. } authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57 saga_name = project-create saga_node = VpcCreateV4Route silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
40122026-01-27T01:14:06.606ZTRACtest_vpcs (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57 saga_name = project-create saga_node = VpcCreateV4Route silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
40132026-01-27T01:14:06.606ZDEBGtest_vpcs (SagaExecutor): roles authenticated = true roles = RoleSet { roles: {} } saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57 saga_name = project-create saga_node = VpcCreateV4Route silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
40142026-01-27T01:14:06.607ZDEBGtest_vpcs (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database result = Ok(()) saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57 saga_name = project-create saga_node = VpcCreateV4Route silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
40152026-01-27T01:14:06.613ZTRACtest_vpcs (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. } authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57 saga_name = project-create saga_node = VpcCreateV4Route silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
40162026-01-27T01:14:06.614ZTRACtest_vpcs (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57 saga_name = project-create saga_node = VpcCreateV4Route silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
40172026-01-27T01:14:06.614ZDEBGtest_vpcs (SagaExecutor): roles authenticated = true roles = RoleSet { roles: {} } saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57 saga_name = project-create saga_node = VpcCreateV4Route silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
40182026-01-27T01:14:06.614ZDEBGtest_vpcs (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database result = Ok(()) saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57 saga_name = project-create saga_node = VpcCreateV4Route silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
40192026-01-27T01:14:06.626ZDEBGtest_vpcs (SagaExecutor): roles authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57 saga_name = project-create saga_node = VpcCreateV4Route silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
40202026-01-27T01:14:06.639ZDEBGtest_vpcs (SagaExecutor): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: a1a9a9c7-9e7e-48b3-8937-c3723503857b, lookup_type: ByName("springfield-squidport") }, key: 9702b4b6-b761-4a78-93c1-48a3b0004b27, lookup_type: ByName("default") }, key: 9b4d23dd-a0db-427f-957b-c661053a0cc4, lookup_type: ById(9b4d23dd-a0db-427f-957b-c661053a0cc4) } result = Ok(()) saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57 saga_name = project-create saga_node = VpcCreateV4Route silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
40212026-01-27T01:14:06.640ZTRACtest_vpcs (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57 saga_name = project-create saga_node = VpcCreateV4Route silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
40222026-01-27T01:14:06.640ZDEBGtest_vpcs (SagaExecutor): roles authenticated = true roles = RoleSet { roles: {} } saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57 saga_name = project-create saga_node = VpcCreateV4Route silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
40232026-01-27T01:14:06.641ZDEBGtest_vpcs (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database result = Ok(()) saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57 saga_name = project-create saga_node = VpcCreateV4Route silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
40242026-01-27T01:14:06.642ZTRACtest_vpcs (results-sink): batch interval expired, but no samples to insert collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
40252026-01-27T01:14:06.643ZTRACtest_vpcs (results-sink-cluster): batch interval expired, but no samples to insert collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
40262026-01-27T01:14:06.657ZDEBGtest_vpcs (BackgroundTasks): activating background_task = fm_sitrep_loader iteration = 2 reason = Timeout
40272026-01-27T01:14:06.692ZTRACtest_vpcs (BackgroundTasks): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = fm_sitrep_loader resource = Fleet
40282026-01-27T01:14:06.692ZTRACtest_vpcs (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } background_task = fm_sitrep_loader resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
40292026-01-27T01:14:06.692ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = fm_sitrep_loader resource = Database
40302026-01-27T01:14:06.692ZDEBGtest_vpcs (BackgroundTasks): roles background_task = fm_sitrep_loader roles = RoleSet { roles: {} }
40312026-01-27T01:14:06.694ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = fm_sitrep_loader resource = Database result = Ok(())
40322026-01-27T01:14:06.700ZDEBGtest_vpcs (BackgroundTasks): activating background_task = fm_sitrep_gc iteration = 2 reason = Timeout
40332026-01-27T01:14:06.703ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = fm_sitrep_gc resource = Database
40342026-01-27T01:14:06.704ZDEBGtest_vpcs (BackgroundTasks): roles background_task = fm_sitrep_gc roles = RoleSet { roles: {} }
40352026-01-27T01:14:06.705ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = fm_sitrep_gc resource = Database result = Ok(())
40362026-01-27T01:14:06.712ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = fm_sitrep_gc resource = Fleet
40372026-01-27T01:14:06.712ZTRACtest_vpcs (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } background_task = fm_sitrep_gc resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
40382026-01-27T01:14:06.712ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = fm_sitrep_gc resource = Database
40392026-01-27T01:14:06.712ZDEBGtest_vpcs (BackgroundTasks): roles background_task = fm_sitrep_gc roles = RoleSet { roles: {} }
40402026-01-27T01:14:06.713ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = fm_sitrep_gc resource = Database result = Ok(())
40412026-01-27T01:14:06.714ZDEBGtest_vpcs (BackgroundTasks): roles background_task = fm_sitrep_loader roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
40422026-01-27T01:14:06.721ZDEBGtest_vpcs (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = fm_sitrep_loader resource = Fleet result = Ok(())
40432026-01-27T01:14:06.721ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = fm_sitrep_loader resource = Database
40442026-01-27T01:14:06.721ZDEBGtest_vpcs (BackgroundTasks): roles background_task = fm_sitrep_loader roles = RoleSet { roles: {} }
40452026-01-27T01:14:06.721ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = fm_sitrep_loader resource = Database result = Ok(())
40462026-01-27T01:14:06.727ZTRACtest_vpcs (BackgroundTasks): searching for multicast groups background_task = multicast_reconciler state = Active
40472026-01-27T01:14:06.728ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = multicast_reconciler resource = Database
40482026-01-27T01:14:06.728ZDEBGtest_vpcs (BackgroundTasks): roles background_task = multicast_reconciler roles = RoleSet { roles: {} }
40492026-01-27T01:14:06.729ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = multicast_reconciler resource = Database result = Ok(())
40502026-01-27T01:14:06.734ZDEBGtest_vpcs (BackgroundTasks): roles background_task = fm_sitrep_gc roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
40512026-01-27T01:14:06.738ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = fm_sitrep_gc resource = Fleet result = Ok(())
40522026-01-27T01:14:06.742ZDEBGtest_vpcs (BackgroundTasks): activation complete background_task = fm_sitrep_loader elapsed = 84.749731ms iteration = 2 status = "NoSitrep"
40532026-01-27T01:14:06.742ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = fm_sitrep_gc resource = Database
40542026-01-27T01:14:06.743ZDEBGtest_vpcs (BackgroundTasks): roles background_task = fm_sitrep_gc roles = RoleSet { roles: {} }
40552026-01-27T01:14:06.743ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = fm_sitrep_gc resource = Database result = Ok(())
40562026-01-27T01:14:06.747ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = fm_sitrep_gc resource = Fleet
40572026-01-27T01:14:06.747ZTRACtest_vpcs (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } background_task = fm_sitrep_gc resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
40582026-01-27T01:14:06.747ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = fm_sitrep_gc resource = Database
40592026-01-27T01:14:06.747ZDEBGtest_vpcs (BackgroundTasks): roles background_task = fm_sitrep_gc roles = RoleSet { roles: {} }
40602026-01-27T01:14:06.748ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = fm_sitrep_gc resource = Database result = Ok(())
40612026-01-27T01:14:06.750ZINFOtest_vpcs (oximeter-agent): refreshing list of producers from Nexus collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 file = oximeter/collector/src/agent.rs:557
40622026-01-27T01:14:06.750ZDEBGtest_vpcs (oximeter): client request body = None method = GET uri = http://127.0.0.1:46983/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
40632026-01-27T01:14:06.751ZTRACtest_vpcs (dropshot_internal): incoming request local_addr = 127.0.0.1:46983 method = GET remote_addr = 127.0.0.1:62470 req_id = c1ab1dc7-7db4-4740-a51b-41f0165b23c6 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
40642026-01-27T01:14:06.751ZDEBGtest_vpcs (dropshot_internal): determined request API version local_addr = 127.0.0.1:46983 method = GET remote_addr = 127.0.0.1:62470 req_id = c1ab1dc7-7db4-4740-a51b-41f0165b23c6 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending version = 1.0.0
40652026-01-27T01:14:06.752ZTRACtest_vpcs (dropshot_internal): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) authenticated = true local_addr = 127.0.0.1:46983 method = GET remote_addr = 127.0.0.1:62470 req_id = c1ab1dc7-7db4-4740-a51b-41f0165b23c6 resource = Database type = user_builtin uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending user_builtin_id = 001de000-05e4-4000-8000-000000000002
40662026-01-27T01:14:06.752ZDEBGtest_vpcs (dropshot_internal): roles authenticated = true local_addr = 127.0.0.1:46983 method = GET remote_addr = 127.0.0.1:62470 req_id = c1ab1dc7-7db4-4740-a51b-41f0165b23c6 roles = RoleSet { roles: {} } type = user_builtin uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending user_builtin_id = 001de000-05e4-4000-8000-000000000002
40672026-01-27T01:14:06.753ZDEBGtest_vpcs (dropshot_internal): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) authenticated = true local_addr = 127.0.0.1:46983 method = GET remote_addr = 127.0.0.1:62470 req_id = c1ab1dc7-7db4-4740-a51b-41f0165b23c6 resource = Database result = Ok(()) type = user_builtin uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending user_builtin_id = 001de000-05e4-4000-8000-000000000002
40682026-01-27T01:14:06.757ZDEBGtest_vpcs (BackgroundTasks): roles background_task = fm_sitrep_gc roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
40692026-01-27T01:14:06.761ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = fm_sitrep_gc resource = Fleet result = Ok(())
40702026-01-27T01:14:06.766ZDEBGtest_vpcs (SEC): saga log event new_state = N012 succeeded sec_id = 913233fe-92a8-4635-9572-183f495429c4
40712026-01-27T01:14:06.766ZDEBGtest_vpcs (SecStore): recording saga event event_type = Succeeded(Null) node_id = 12 saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
40722026-01-27T01:14:06.767ZINFOtest_vpcs (dropshot_internal): request completed latency_us = 16498 local_addr = 127.0.0.1:46983 method = GET remote_addr = 127.0.0.1:62470 req_id = c1ab1dc7-7db4-4740-a51b-41f0165b23c6 response_code = 200 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
40732026-01-27T01:14:06.769ZDEBGtest_vpcs (oximeter): client response result = Ok(Response { url: "http://127.0.0.1:46983/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending", status: 200, headers: {"content-type": "application/json", "x-request-id": "c1ab1dc7-7db4-4740-a51b-41f0165b23c6", "content-length": "405", "date": "Tue, 27 Jan 2026 01:14:06 GMT"} })
40742026-01-27T01:14:06.769ZDEBGtest_vpcs (oximeter): client request body = None method = GET uri = http://127.0.0.1:46983/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
40752026-01-27T01:14:06.770ZTRACtest_vpcs (dropshot_internal): incoming request local_addr = 127.0.0.1:46983 method = GET remote_addr = 127.0.0.1:62470 req_id = 32203cc2-a35d-4276-8eaf-9294f7d56e15 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
40762026-01-27T01:14:06.770ZDEBGtest_vpcs (dropshot_internal): determined request API version local_addr = 127.0.0.1:46983 method = GET remote_addr = 127.0.0.1:62470 req_id = 32203cc2-a35d-4276-8eaf-9294f7d56e15 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D version = 1.0.0
40772026-01-27T01:14:06.770ZTRACtest_vpcs (dropshot_internal): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) authenticated = true local_addr = 127.0.0.1:46983 method = GET remote_addr = 127.0.0.1:62470 req_id = 32203cc2-a35d-4276-8eaf-9294f7d56e15 resource = Database type = user_builtin uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D user_builtin_id = 001de000-05e4-4000-8000-000000000002
40782026-01-27T01:14:06.770ZDEBGtest_vpcs (dropshot_internal): roles authenticated = true local_addr = 127.0.0.1:46983 method = GET remote_addr = 127.0.0.1:62470 req_id = 32203cc2-a35d-4276-8eaf-9294f7d56e15 roles = RoleSet { roles: {} } type = user_builtin uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D user_builtin_id = 001de000-05e4-4000-8000-000000000002
40792026-01-27T01:14:06.771ZDEBGtest_vpcs (dropshot_internal): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) authenticated = true local_addr = 127.0.0.1:46983 method = GET remote_addr = 127.0.0.1:62470 req_id = 32203cc2-a35d-4276-8eaf-9294f7d56e15 resource = Database result = Ok(()) type = user_builtin uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D user_builtin_id = 001de000-05e4-4000-8000-000000000002
40802026-01-27T01:14:06.773ZDEBGtest_vpcs (SEC): saga log event new_state = N013 started sec_id = 913233fe-92a8-4635-9572-183f495429c4
40812026-01-27T01:14:06.773ZDEBGtest_vpcs (SecStore): recording saga event event_type = Started node_id = 13 saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
40822026-01-27T01:14:06.778ZINFOtest_vpcs (dropshot_internal): request completed latency_us = 7947 local_addr = 127.0.0.1:46983 method = GET remote_addr = 127.0.0.1:62470 req_id = 32203cc2-a35d-4276-8eaf-9294f7d56e15 response_code = 200 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
40832026-01-27T01:14:06.779ZTRACtest_vpcs (SagaExecutor): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: a1a9a9c7-9e7e-48b3-8937-c3723503857b, lookup_type: ByName("springfield-squidport") }, key: 9702b4b6-b761-4a78-93c1-48a3b0004b27, lookup_type: ByName("default") }, key: 9b4d23dd-a0db-427f-957b-c661053a0cc4, lookup_type: ById(9b4d23dd-a0db-427f-957b-c661053a0cc4) } saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57 saga_name = project-create saga_node = VpcCreateV6Route silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
40842026-01-27T01:14:06.779ZTRACtest_vpcs (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. } authenticated = true resource_id = a1a9a9c7-9e7e-48b3-8937-c3723503857b resource_type = Project saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57 saga_name = project-create saga_node = VpcCreateV6Route silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
40852026-01-27T01:14:06.780ZTRACtest_vpcs (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57 saga_name = project-create saga_node = VpcCreateV6Route silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
40862026-01-27T01:14:06.780ZDEBGtest_vpcs (SagaExecutor): roles authenticated = true roles = RoleSet { roles: {} } saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57 saga_name = project-create saga_node = VpcCreateV6Route silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
40872026-01-27T01:14:06.781ZDEBGtest_vpcs (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database result = Ok(()) saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57 saga_name = project-create saga_node = VpcCreateV6Route silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
40882026-01-27T01:14:06.783ZDEBGtest_vpcs (oximeter): client response result = Ok(Response { url: "http://127.0.0.1:46983/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D", status: 200, headers: {"content-type": "application/json", "x-request-id": "32203cc2-a35d-4276-8eaf-9294f7d56e15", "content-length": "29", "date": "Tue, 27 Jan 2026 01:14:06 GMT"} })
40892026-01-27T01:14:06.783ZTRACtest_vpcs (oximeter-agent): ignoring request to update existing metric producer, since the endpoint information is the same as the existing collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = 913233fe-92a8-4635-9572-183f495429c4
40902026-01-27T01:14:06.783ZDEBGtest_vpcs (oximeter-agent): registered new metric producer address = [::1]:65095 collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
40912026-01-27T01:14:06.783ZINFOtest_vpcs (oximeter-agent): refreshed list of producers from Nexus collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 file = oximeter/collector/src/agent.rs:632 n_current_tasks = 2 n_pruned_tasks = 0
40922026-01-27T01:14:06.856ZTRACtest_vpcs (collection-task): top of inner collection loop, waiting for next request collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de producer_ip = ::1 producer_port = 65095
40932026-01-27T01:14:06.857ZTRACtest_vpcs (BackgroundTasks): found multicast groups background_task = multicast_reconciler count = 0 state = Active
40942026-01-27T01:14:06.857ZTRACtest_vpcs (BackgroundTasks): searching for multicast groups background_task = multicast_reconciler state = Deleting
40952026-01-27T01:14:06.857ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = multicast_reconciler resource = Database
40962026-01-27T01:14:06.858ZDEBGtest_vpcs (BackgroundTasks): roles background_task = multicast_reconciler roles = RoleSet { roles: {} }
40972026-01-27T01:14:06.859ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = multicast_reconciler resource = Database result = Ok(())
40982026-01-27T01:14:06.862ZINFOtest_vpcs (BackgroundTasks): deleted 0 of 0 sitreps sitreps background_task = fm_sitrep_gc case_ereports_deleted = 0 cases_deleted = 0 ids = [] sitreps_deleted = 0
40992026-01-27T01:14:06.862ZTRACtest_vpcs (BackgroundTasks): all 0 orphaned sitreps in this batch have already been deleted background_task = fm_sitrep_gc
41002026-01-27T01:14:06.862ZINFOtest_vpcs (BackgroundTasks): sitrep garbage collection found 0 orphaned sitreps, deleted 0 background_task = fm_sitrep_gc
41012026-01-27T01:14:06.863ZDEBGtest_vpcs (BackgroundTasks): activation complete background_task = fm_sitrep_gc elapsed = 162.736116ms iteration = 2 status = {"errors":[],"orphaned_sitreps_deleted":0,"orphaned_sitreps_found":0}
41022026-01-27T01:14:06.864ZTRACtest_vpcs (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. } authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57 saga_name = project-create saga_node = VpcCreateV6Route silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
41032026-01-27T01:14:06.864ZTRACtest_vpcs (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57 saga_name = project-create saga_node = VpcCreateV6Route silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
41042026-01-27T01:14:06.865ZDEBGtest_vpcs (SagaExecutor): roles authenticated = true roles = RoleSet { roles: {} } saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57 saga_name = project-create saga_node = VpcCreateV6Route silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
41052026-01-27T01:14:06.866ZDEBGtest_vpcs (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database result = Ok(()) saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57 saga_name = project-create saga_node = VpcCreateV6Route silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
41062026-01-27T01:14:06.872ZDEBGtest_vpcs (collection-task): reporting oximeter self-collection statistics collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de producer_ip = ::1 producer_port = 65095
41072026-01-27T01:14:06.874ZDEBGtest_vpcs (collection-task): sent timer-based collection request to the collection task collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de producer_ip = ::1 producer_port = 65095
41082026-01-27T01:14:06.874ZDEBGtest_vpcs (collection-task): collecting from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de producer_ip = ::1 producer_port = 65095
41092026-01-27T01:14:06.877ZTRACtest_vpcs (collection-task): sent collection request to producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de producer_ip = ::1 producer_port = 65095
41102026-01-27T01:14:06.882ZDEBGtest_vpcs (collection-task): collected results from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 n_results = 1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de producer_ip = ::1 producer_port = 65095
41112026-01-27T01:14:06.882ZTRACtest_vpcs (collection-task): forwarded results to main collection loop collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de producer_ip = ::1 producer_port = 65095
41122026-01-27T01:14:06.882ZTRACtest_vpcs (collection-task): top of inner collection loop, waiting for next request collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de producer_ip = ::1 producer_port = 65095
41132026-01-27T01:14:06.884ZTRACtest_vpcs (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. } authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57 saga_name = project-create saga_node = VpcCreateV6Route silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
41142026-01-27T01:14:06.884ZTRACtest_vpcs (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57 saga_name = project-create saga_node = VpcCreateV6Route silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
41152026-01-27T01:14:06.884ZDEBGtest_vpcs (SagaExecutor): roles authenticated = true roles = RoleSet { roles: {} } saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57 saga_name = project-create saga_node = VpcCreateV6Route silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
41162026-01-27T01:14:06.885ZDEBGtest_vpcs (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database result = Ok(()) saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57 saga_name = project-create saga_node = VpcCreateV6Route silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
41172026-01-27T01:14:06.905ZDEBGtest_vpcs (SagaExecutor): roles authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57 saga_name = project-create saga_node = VpcCreateV6Route silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
41182026-01-27T01:14:06.920ZDEBGtest_vpcs (SagaExecutor): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: a1a9a9c7-9e7e-48b3-8937-c3723503857b, lookup_type: ByName("springfield-squidport") }, key: 9702b4b6-b761-4a78-93c1-48a3b0004b27, lookup_type: ByName("default") }, key: 9b4d23dd-a0db-427f-957b-c661053a0cc4, lookup_type: ById(9b4d23dd-a0db-427f-957b-c661053a0cc4) } result = Ok(()) saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57 saga_name = project-create saga_node = VpcCreateV6Route silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
41192026-01-27T01:14:06.920ZTRACtest_vpcs (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57 saga_name = project-create saga_node = VpcCreateV6Route silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
41202026-01-27T01:14:06.920ZDEBGtest_vpcs (SagaExecutor): roles authenticated = true roles = RoleSet { roles: {} } saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57 saga_name = project-create saga_node = VpcCreateV6Route silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
41212026-01-27T01:14:06.920ZDEBGtest_vpcs (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database result = Ok(()) saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57 saga_name = project-create saga_node = VpcCreateV6Route silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
41222026-01-27T01:14:06.967ZTRACtest_vpcs (BackgroundTasks): found multicast groups background_task = multicast_reconciler count = 0 state = Deleting
41232026-01-27T01:14:06.967ZTRACtest_vpcs (BackgroundTasks): multicast RPW reconciliation cycle completed active_groups_verified = 0 background_task = multicast_reconciler error_count = 0 external_groups_created = 0 external_groups_deleted = 0 member_lifecycle_transitions = 0 orphaned_member_cleanup = 0 total_dpd_operations = 0
41242026-01-27T01:14:06.968ZTRACtest_vpcs (BackgroundTasks): multicast RPW reconciliation pass completed - dataplane consistent background_task = multicast_reconciler
41252026-01-27T01:14:06.970ZDEBGtest_vpcs (BackgroundTasks): activation complete background_task = multicast_reconciler elapsed = 757.265068ms iteration = 3 status = {"disabled":false,"empty_groups_marked":0,"errors":[],"groups_created":0,"groups_deleted":0,"groups_verified":0,"members_deleted":0,"members_processed":0}
41262026-01-27T01:14:07.019ZDEBGtest_vpcs (SEC): saga log event new_state = N013 succeeded sec_id = 913233fe-92a8-4635-9572-183f495429c4
41272026-01-27T01:14:07.019ZDEBGtest_vpcs (SecStore): recording saga event event_type = Succeeded(Null) node_id = 13 saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
41282026-01-27T01:14:07.044ZDEBGtest_vpcs (SEC): saga log event new_state = N014 started sec_id = 913233fe-92a8-4635-9572-183f495429c4
41292026-01-27T01:14:07.044ZDEBGtest_vpcs (SecStore): recording saga event event_type = Started node_id = 14 saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
41302026-01-27T01:14:07.056ZTRACtest_vpcs (SagaExecutor): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: a1a9a9c7-9e7e-48b3-8937-c3723503857b, lookup_type: ByName("springfield-squidport") }, key: 9702b4b6-b761-4a78-93c1-48a3b0004b27, lookup_type: ByName("default") } saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57 saga_name = project-create saga_node = VpcCreateSubnet silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
41312026-01-27T01:14:07.057ZTRACtest_vpcs (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. } authenticated = true resource_id = a1a9a9c7-9e7e-48b3-8937-c3723503857b resource_type = Project saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57 saga_name = project-create saga_node = VpcCreateSubnet silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
41322026-01-27T01:14:07.057ZTRACtest_vpcs (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57 saga_name = project-create saga_node = VpcCreateSubnet silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
41332026-01-27T01:14:07.057ZDEBGtest_vpcs (SagaExecutor): roles authenticated = true roles = RoleSet { roles: {} } saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57 saga_name = project-create saga_node = VpcCreateSubnet silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
41342026-01-27T01:14:07.057ZDEBGtest_vpcs (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database result = Ok(()) saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57 saga_name = project-create saga_node = VpcCreateSubnet silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
41352026-01-27T01:14:07.064ZTRACtest_vpcs (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. } authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57 saga_name = project-create saga_node = VpcCreateSubnet silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
41362026-01-27T01:14:07.064ZTRACtest_vpcs (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57 saga_name = project-create saga_node = VpcCreateSubnet silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
41372026-01-27T01:14:07.064ZDEBGtest_vpcs (SagaExecutor): roles authenticated = true roles = RoleSet { roles: {} } saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57 saga_name = project-create saga_node = VpcCreateSubnet silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
41382026-01-27T01:14:07.067ZDEBGtest_vpcs (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database result = Ok(()) saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57 saga_name = project-create saga_node = VpcCreateSubnet silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
41392026-01-27T01:14:07.073ZTRACtest_vpcs (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. } authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57 saga_name = project-create saga_node = VpcCreateSubnet silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
41402026-01-27T01:14:07.074ZTRACtest_vpcs (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57 saga_name = project-create saga_node = VpcCreateSubnet silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
41412026-01-27T01:14:07.074ZDEBGtest_vpcs (SagaExecutor): roles authenticated = true roles = RoleSet { roles: {} } saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57 saga_name = project-create saga_node = VpcCreateSubnet silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
41422026-01-27T01:14:07.075ZDEBGtest_vpcs (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database result = Ok(()) saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57 saga_name = project-create saga_node = VpcCreateSubnet silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
41432026-01-27T01:14:07.082ZDEBGtest_vpcs (SagaExecutor): roles authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57 saga_name = project-create saga_node = VpcCreateSubnet silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
41442026-01-27T01:14:07.093ZDEBGtest_vpcs (SagaExecutor): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: a1a9a9c7-9e7e-48b3-8937-c3723503857b, lookup_type: ByName("springfield-squidport") }, key: 9702b4b6-b761-4a78-93c1-48a3b0004b27, lookup_type: ByName("default") } result = Ok(()) saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57 saga_name = project-create saga_node = VpcCreateSubnet silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
41452026-01-27T01:14:07.101ZDEBGtest_vpcs (SEC): saga log event new_state = N014 succeeded sec_id = 913233fe-92a8-4635-9572-183f495429c4
41462026-01-27T01:14:07.101ZDEBGtest_vpcs (SecStore): recording saga event event_type = Succeeded(Array [Object {"key": String("8876f6e2-bc47-4ea3-bd82-a5551e4427e8"), "lookup_type": Object {"ById": String("8876f6e2-bc47-4ea3-bd82-a5551e4427e8")}, "parent": Object {"key": String("9702b4b6-b761-4a78-93c1-48a3b0004b27"), "lookup_type": Object {"ByName": String("default")}, "parent": Object {"key": String("a1a9a9c7-9e7e-48b3-8937-c3723503857b"), "lookup_type": Object {"ByName": String("springfield-squidport")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}}}, Object {"custom_router_id": Null, "identity": Object {"description": String("The default subnet for default"), "id": String("8876f6e2-bc47-4ea3-bd82-a5551e4427e8"), "name": String("default"), "time_created": String("2026-01-27T01:14:07.056719Z"), "time_deleted": Null, "time_modified": String("2026-01-27T01:14:07.056719Z")}, "ipv4_block": String("172.30.0.0/22"), "ipv6_block": String("fd6f:1fa5:6c45::/64"), "rcgen": Number(1), "vpc_id": String("9702b4b6-b761-4a78-93c1-48a3b0004b27")}]) node_id = 14 saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
41472026-01-27T01:14:07.107ZDEBGtest_vpcs (SEC): saga log event new_state = N015 started sec_id = 913233fe-92a8-4635-9572-183f495429c4
41482026-01-27T01:14:07.108ZDEBGtest_vpcs (SecStore): recording saga event event_type = Started node_id = 15 saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
41492026-01-27T01:14:07.114ZTRACtest_vpcs (SagaExecutor): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: a1a9a9c7-9e7e-48b3-8937-c3723503857b, lookup_type: ByName("springfield-squidport") }, key: 9702b4b6-b761-4a78-93c1-48a3b0004b27, lookup_type: ByName("default") }, key: 9b4d23dd-a0db-427f-957b-c661053a0cc4, lookup_type: ById(9b4d23dd-a0db-427f-957b-c661053a0cc4) } saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57 saga_name = project-create saga_node = VpcCreateSubnetRoute silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
41502026-01-27T01:14:07.115ZTRACtest_vpcs (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. } authenticated = true resource_id = a1a9a9c7-9e7e-48b3-8937-c3723503857b resource_type = Project saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57 saga_name = project-create saga_node = VpcCreateSubnetRoute silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
41512026-01-27T01:14:07.115ZTRACtest_vpcs (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57 saga_name = project-create saga_node = VpcCreateSubnetRoute silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
41522026-01-27T01:14:07.115ZDEBGtest_vpcs (SagaExecutor): roles authenticated = true roles = RoleSet { roles: {} } saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57 saga_name = project-create saga_node = VpcCreateSubnetRoute silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
41532026-01-27T01:14:07.115ZDEBGtest_vpcs (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database result = Ok(()) saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57 saga_name = project-create saga_node = VpcCreateSubnetRoute silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
41542026-01-27T01:14:07.122ZTRACtest_vpcs (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. } authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57 saga_name = project-create saga_node = VpcCreateSubnetRoute silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
41552026-01-27T01:14:07.122ZTRACtest_vpcs (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57 saga_name = project-create saga_node = VpcCreateSubnetRoute silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
41562026-01-27T01:14:07.122ZDEBGtest_vpcs (SagaExecutor): roles authenticated = true roles = RoleSet { roles: {} } saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57 saga_name = project-create saga_node = VpcCreateSubnetRoute silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
41572026-01-27T01:14:07.124ZDEBGtest_vpcs (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database result = Ok(()) saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57 saga_name = project-create saga_node = VpcCreateSubnetRoute silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
41582026-01-27T01:14:07.130ZTRACtest_vpcs (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. } authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57 saga_name = project-create saga_node = VpcCreateSubnetRoute silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
41592026-01-27T01:14:07.130ZTRACtest_vpcs (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57 saga_name = project-create saga_node = VpcCreateSubnetRoute silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
41602026-01-27T01:14:07.130ZDEBGtest_vpcs (SagaExecutor): roles authenticated = true roles = RoleSet { roles: {} } saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57 saga_name = project-create saga_node = VpcCreateSubnetRoute silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
41612026-01-27T01:14:07.131ZDEBGtest_vpcs (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database result = Ok(()) saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57 saga_name = project-create saga_node = VpcCreateSubnetRoute silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
41622026-01-27T01:14:07.138ZDEBGtest_vpcs (SagaExecutor): roles authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57 saga_name = project-create saga_node = VpcCreateSubnetRoute silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
41632026-01-27T01:14:07.148ZDEBGtest_vpcs (SagaExecutor): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: a1a9a9c7-9e7e-48b3-8937-c3723503857b, lookup_type: ByName("springfield-squidport") }, key: 9702b4b6-b761-4a78-93c1-48a3b0004b27, lookup_type: ByName("default") }, key: 9b4d23dd-a0db-427f-957b-c661053a0cc4, lookup_type: ById(9b4d23dd-a0db-427f-957b-c661053a0cc4) } result = Ok(()) saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57 saga_name = project-create saga_node = VpcCreateSubnetRoute silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
41642026-01-27T01:14:07.148ZTRACtest_vpcs (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57 saga_name = project-create saga_node = VpcCreateSubnetRoute silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
41652026-01-27T01:14:07.149ZDEBGtest_vpcs (SagaExecutor): roles authenticated = true roles = RoleSet { roles: {} } saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57 saga_name = project-create saga_node = VpcCreateSubnetRoute silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
41662026-01-27T01:14:07.149ZDEBGtest_vpcs (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database result = Ok(()) saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57 saga_name = project-create saga_node = VpcCreateSubnetRoute silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
41672026-01-27T01:14:07.158ZDEBGtest_vpcs (SEC): saga log event new_state = N015 succeeded sec_id = 913233fe-92a8-4635-9572-183f495429c4
41682026-01-27T01:14:07.158ZDEBGtest_vpcs (SecStore): recording saga event event_type = Succeeded(Object {"key": String("70322159-3612-4366-a5c5-0de230edee74"), "lookup_type": Object {"ById": String("8876f6e2-bc47-4ea3-bd82-a5551e4427e8")}, "parent": Object {"key": String("9b4d23dd-a0db-427f-957b-c661053a0cc4"), "lookup_type": Object {"ById": String("9b4d23dd-a0db-427f-957b-c661053a0cc4")}, "parent": Object {"key": String("9702b4b6-b761-4a78-93c1-48a3b0004b27"), "lookup_type": Object {"ByName": String("default")}, "parent": Object {"key": String("a1a9a9c7-9e7e-48b3-8937-c3723503857b"), "lookup_type": Object {"ByName": String("springfield-squidport")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}}}}) node_id = 15 saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
41692026-01-27T01:14:07.164ZDEBGtest_vpcs (SEC): saga log event new_state = N016 started sec_id = 913233fe-92a8-4635-9572-183f495429c4
41702026-01-27T01:14:07.164ZDEBGtest_vpcs (SecStore): recording saga event event_type = Started node_id = 16 saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
41712026-01-27T01:14:07.169ZDEBGtest_vpcs (nexus): default firewall rules for vpc default rules = [VpcFirewallRule { identity: VpcFirewallRuleIdentity { id: d7390906-29d6-4f4b-9d97-88893a590dba, name: Name(Name("allow-internal-inbound")), description: "allow inbound traffic to all instances within the VPC if originated within the VPC", time_created: 2026-01-27T01:14:07.169050657Z, time_modified: 2026-01-27T01:14:07.169050657Z, time_deleted: None }, vpc_id: 9702b4b6-b761-4a78-93c1-48a3b0004b27, status: VpcFirewallRuleStatus(Enabled), direction: VpcFirewallRuleDirection(Inbound), targets: [VpcFirewallRuleTarget(Vpc(Name("default")))], filter_hosts: Some([VpcFirewallRuleHostFilter(Vpc(Name("default")))]), filter_ports: None, filter_protocols: None, action: VpcFirewallRuleAction(Allow), priority: VpcFirewallRulePriority(VpcFirewallRulePriority(65534)) }, VpcFirewallRule { identity: VpcFirewallRuleIdentity { id: 7f70193c-b41c-4531-bcda-b2a064abe782, name: Name(Name("allow-ssh")), description: "allow inbound TCP connections on port 22 from anywhere", time_created: 2026-01-27T01:14:07.169070015Z, time_modified: 2026-01-27T01:14:07.169070015Z, time_deleted: None }, vpc_id: 9702b4b6-b761-4a78-93c1-48a3b0004b27, status: VpcFirewallRuleStatus(Enabled), direction: VpcFirewallRuleDirection(Inbound), targets: [VpcFirewallRuleTarget(Vpc(Name("default")))], filter_hosts: None, filter_ports: Some([L4PortRange(L4PortRange { first: L4Port(22), last: L4Port(22) })]), filter_protocols: Some([VpcFirewallRuleProtocol(Tcp)]), action: VpcFirewallRuleAction(Allow), priority: VpcFirewallRulePriority(VpcFirewallRulePriority(65534)) }, VpcFirewallRule { identity: VpcFirewallRuleIdentity { id: f7debd9d-bf4f-4ca8-8c18-f9d78a7fd783, name: Name(Name("allow-icmp")), description: "allow inbound ICMP traffic from anywhere", time_created: 2026-01-27T01:14:07.169078853Z, time_modified: 2026-01-27T01:14:07.169078853Z, time_deleted: None }, vpc_id: 9702b4b6-b761-4a78-93c1-48a3b0004b27, status: VpcFirewallRuleStatus(Enabled), direction: VpcFirewallRuleDirection(Inbound), targets: [VpcFirewallRuleTarget(Vpc(Name("default")))], filter_hosts: None, filter_ports: None, filter_protocols: Some([VpcFirewallRuleProtocol(Icmp(None))]), action: VpcFirewallRuleAction(Allow), priority: VpcFirewallRulePriority(VpcFirewallRulePriority(65534)) }]
41722026-01-27T01:14:07.169ZTRACtest_vpcs (SagaExecutor): authorize begin action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: a1a9a9c7-9e7e-48b3-8937-c3723503857b, lookup_type: ByName("springfield-squidport") }, key: 9702b4b6-b761-4a78-93c1-48a3b0004b27, lookup_type: ByName("default") } saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57 saga_name = project-create saga_node = VpcUpdateFirewall silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
41732026-01-27T01:14:07.169ZTRACtest_vpcs (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. } authenticated = true resource_id = a1a9a9c7-9e7e-48b3-8937-c3723503857b resource_type = Project saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57 saga_name = project-create saga_node = VpcUpdateFirewall silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
41742026-01-27T01:14:07.169ZTRACtest_vpcs (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57 saga_name = project-create saga_node = VpcUpdateFirewall silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
41752026-01-27T01:14:07.169ZDEBGtest_vpcs (SagaExecutor): roles authenticated = true roles = RoleSet { roles: {} } saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57 saga_name = project-create saga_node = VpcUpdateFirewall silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
41762026-01-27T01:14:07.170ZDEBGtest_vpcs (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database result = Ok(()) saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57 saga_name = project-create saga_node = VpcUpdateFirewall silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
41772026-01-27T01:14:07.175ZTRACtest_vpcs (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. } authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57 saga_name = project-create saga_node = VpcUpdateFirewall silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
41782026-01-27T01:14:07.175ZTRACtest_vpcs (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57 saga_name = project-create saga_node = VpcUpdateFirewall silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
41792026-01-27T01:14:07.176ZDEBGtest_vpcs (SagaExecutor): roles authenticated = true roles = RoleSet { roles: {} } saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57 saga_name = project-create saga_node = VpcUpdateFirewall silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
41802026-01-27T01:14:07.176ZDEBGtest_vpcs (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database result = Ok(()) saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57 saga_name = project-create saga_node = VpcUpdateFirewall silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
41812026-01-27T01:14:07.182ZTRACtest_vpcs (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. } authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57 saga_name = project-create saga_node = VpcUpdateFirewall silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
41822026-01-27T01:14:07.182ZTRACtest_vpcs (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57 saga_name = project-create saga_node = VpcUpdateFirewall silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
41832026-01-27T01:14:07.182ZDEBGtest_vpcs (SagaExecutor): roles authenticated = true roles = RoleSet { roles: {} } saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57 saga_name = project-create saga_node = VpcUpdateFirewall silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
41842026-01-27T01:14:07.183ZDEBGtest_vpcs (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database result = Ok(()) saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57 saga_name = project-create saga_node = VpcUpdateFirewall silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
41852026-01-27T01:14:07.189ZDEBGtest_vpcs (SagaExecutor): roles authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57 saga_name = project-create saga_node = VpcUpdateFirewall silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
41862026-01-27T01:14:07.197ZDEBGtest_vpcs (SagaExecutor): authorize result action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: a1a9a9c7-9e7e-48b3-8937-c3723503857b, lookup_type: ByName("springfield-squidport") }, key: 9702b4b6-b761-4a78-93c1-48a3b0004b27, lookup_type: ByName("default") } result = Ok(()) saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57 saga_name = project-create saga_node = VpcUpdateFirewall silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
41872026-01-27T01:14:07.197ZTRACtest_vpcs (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57 saga_name = project-create saga_node = VpcUpdateFirewall silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
41882026-01-27T01:14:07.197ZDEBGtest_vpcs (SagaExecutor): roles authenticated = true roles = RoleSet { roles: {} } saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57 saga_name = project-create saga_node = VpcUpdateFirewall silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
41892026-01-27T01:14:07.197ZDEBGtest_vpcs (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database result = Ok(()) saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57 saga_name = project-create saga_node = VpcUpdateFirewall silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
41902026-01-27T01:14:07.334ZDEBGtest_vpcs (SEC): saga log event new_state = N016 succeeded sec_id = 913233fe-92a8-4635-9572-183f495429c4
41912026-01-27T01:14:07.335ZDEBGtest_vpcs (SecStore): recording saga event event_type = Succeeded(Array [Object {"action": String("allow"), "direction": String("inbound"), "filter_hosts": Array [Object {"type": String("vpc"), "value": String("default")}], "filter_ports": Null, "filter_protocols": Null, "identity": Object {"description": String("allow inbound traffic to all instances within the VPC if originated within the VPC"), "id": String("d7390906-29d6-4f4b-9d97-88893a590dba"), "name": String("allow-internal-inbound"), "time_created": String("2026-01-27T01:14:07.169050657Z"), "time_deleted": Null, "time_modified": String("2026-01-27T01:14:07.169050657Z")}, "priority": Number(65534), "status": String("enabled"), "targets": Array [Object {"type": String("vpc"), "value": String("default")}], "vpc_id": String("9702b4b6-b761-4a78-93c1-48a3b0004b27")}, Object {"action": String("allow"), "direction": String("inbound"), "filter_hosts": Null, "filter_ports": Array [String("22")], "filter_protocols": Array [Object {"type": String("tcp")}], "identity": Object {"description": String("allow inbound TCP connections on port 22 from anywhere"), "id": String("7f70193c-b41c-4531-bcda-b2a064abe782"), "name": String("allow-ssh"), "time_created": String("2026-01-27T01:14:07.169070015Z"), "time_deleted": Null, "time_modified": String("2026-01-27T01:14:07.169070015Z")}, "priority": Number(65534), "status": String("enabled"), "targets": Array [Object {"type": String("vpc"), "value": String("default")}], "vpc_id": String("9702b4b6-b761-4a78-93c1-48a3b0004b27")}, Object {"action": String("allow"), "direction": String("inbound"), "filter_hosts": Null, "filter_ports": Null, "filter_protocols": Array [Object {"type": String("icmp"), "value": Null}], "identity": Object {"description": String("allow inbound ICMP traffic from anywhere"), "id": String("f7debd9d-bf4f-4ca8-8c18-f9d78a7fd783"), "name": String("allow-icmp"), "time_created": String("2026-01-27T01:14:07.169078853Z"), "time_deleted": Null, "time_modified": String("2026-01-27T01:14:07.169078853Z")}, "priority": Number(65534), "status": String("enabled"), "targets": Array [Object {"type": String("vpc"), "value": String("default")}], "vpc_id": String("9702b4b6-b761-4a78-93c1-48a3b0004b27")}]) node_id = 16 saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
41922026-01-27T01:14:07.341ZDEBGtest_vpcs (SEC): saga log event new_state = N017 started sec_id = 913233fe-92a8-4635-9572-183f495429c4
41932026-01-27T01:14:07.341ZDEBGtest_vpcs (SecStore): recording saga event event_type = Started node_id = 17 saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
41942026-01-27T01:14:07.348ZTRACtest_vpcs (SagaExecutor): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: a1a9a9c7-9e7e-48b3-8937-c3723503857b, lookup_type: ByName("springfield-squidport") }, key: 9702b4b6-b761-4a78-93c1-48a3b0004b27, lookup_type: ByName("default") } saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57 saga_name = project-create saga_node = VpcCreateGateway silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
41952026-01-27T01:14:07.349ZTRACtest_vpcs (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. } authenticated = true resource_id = a1a9a9c7-9e7e-48b3-8937-c3723503857b resource_type = Project saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57 saga_name = project-create saga_node = VpcCreateGateway silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
41962026-01-27T01:14:07.349ZTRACtest_vpcs (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57 saga_name = project-create saga_node = VpcCreateGateway silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
41972026-01-27T01:14:07.349ZDEBGtest_vpcs (SagaExecutor): roles authenticated = true roles = RoleSet { roles: {} } saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57 saga_name = project-create saga_node = VpcCreateGateway silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
41982026-01-27T01:14:07.350ZDEBGtest_vpcs (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database result = Ok(()) saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57 saga_name = project-create saga_node = VpcCreateGateway silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
41992026-01-27T01:14:07.359ZTRACtest_vpcs (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. } authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57 saga_name = project-create saga_node = VpcCreateGateway silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
42002026-01-27T01:14:07.359ZTRACtest_vpcs (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57 saga_name = project-create saga_node = VpcCreateGateway silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
42012026-01-27T01:14:07.360ZDEBGtest_vpcs (SagaExecutor): roles authenticated = true roles = RoleSet { roles: {} } saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57 saga_name = project-create saga_node = VpcCreateGateway silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
42022026-01-27T01:14:07.361ZDEBGtest_vpcs (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database result = Ok(()) saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57 saga_name = project-create saga_node = VpcCreateGateway silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
42032026-01-27T01:14:07.370ZTRACtest_vpcs (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. } authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57 saga_name = project-create saga_node = VpcCreateGateway silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
42042026-01-27T01:14:07.370ZTRACtest_vpcs (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57 saga_name = project-create saga_node = VpcCreateGateway silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
42052026-01-27T01:14:07.370ZDEBGtest_vpcs (SagaExecutor): roles authenticated = true roles = RoleSet { roles: {} } saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57 saga_name = project-create saga_node = VpcCreateGateway silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
42062026-01-27T01:14:07.371ZDEBGtest_vpcs (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database result = Ok(()) saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57 saga_name = project-create saga_node = VpcCreateGateway silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
42072026-01-27T01:14:07.379ZDEBGtest_vpcs (SagaExecutor): roles authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57 saga_name = project-create saga_node = VpcCreateGateway silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
42082026-01-27T01:14:07.397ZDEBGtest_vpcs (SagaExecutor): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: a1a9a9c7-9e7e-48b3-8937-c3723503857b, lookup_type: ByName("springfield-squidport") }, key: 9702b4b6-b761-4a78-93c1-48a3b0004b27, lookup_type: ByName("default") } result = Ok(()) saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57 saga_name = project-create saga_node = VpcCreateGateway silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
42092026-01-27T01:14:07.397ZTRACtest_vpcs (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57 saga_name = project-create saga_node = VpcCreateGateway silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
42102026-01-27T01:14:07.397ZDEBGtest_vpcs (SagaExecutor): roles authenticated = true roles = RoleSet { roles: {} } saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57 saga_name = project-create saga_node = VpcCreateGateway silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
42112026-01-27T01:14:07.399ZDEBGtest_vpcs (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database result = Ok(()) saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57 saga_name = project-create saga_node = VpcCreateGateway silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
42122026-01-27T01:14:07.405ZTRACtest_vpcs (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57 saga_name = project-create saga_node = VpcCreateGateway silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
42132026-01-27T01:14:07.405ZDEBGtest_vpcs (SagaExecutor): roles authenticated = true roles = RoleSet { roles: {} } saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57 saga_name = project-create saga_node = VpcCreateGateway silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
42142026-01-27T01:14:07.407ZDEBGtest_vpcs (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database result = Ok(()) saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57 saga_name = project-create saga_node = VpcCreateGateway silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
42152026-01-27T01:14:07.414ZTRACtest_vpcs (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57 saga_name = project-create saga_node = VpcCreateGateway silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
42162026-01-27T01:14:07.414ZDEBGtest_vpcs (SagaExecutor): roles authenticated = true roles = RoleSet { roles: {} } saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57 saga_name = project-create saga_node = VpcCreateGateway silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
42172026-01-27T01:14:07.415ZDEBGtest_vpcs (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database result = Ok(()) saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57 saga_name = project-create saga_node = VpcCreateGateway silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
42182026-01-27T01:14:07.474ZDEBGtest_vpcs (BackgroundTasks): activating background_task = reconfigurator_config_watcher iteration = 4 reason = Timeout
42192026-01-27T01:14:07.474ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = reconfigurator_config_watcher resource = BlueprintConfig
42202026-01-27T01:14:07.474ZTRACtest_vpcs (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } background_task = reconfigurator_config_watcher resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
42212026-01-27T01:14:07.474ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = reconfigurator_config_watcher resource = Database
42222026-01-27T01:14:07.474ZDEBGtest_vpcs (BackgroundTasks): roles background_task = reconfigurator_config_watcher roles = RoleSet { roles: {} }
42232026-01-27T01:14:07.475ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = reconfigurator_config_watcher resource = Database result = Ok(())
42242026-01-27T01:14:07.479ZDEBGtest_vpcs (BackgroundTasks): roles background_task = reconfigurator_config_watcher roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
42252026-01-27T01:14:07.487ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = reconfigurator_config_watcher resource = BlueprintConfig result = Ok(())
42262026-01-27T01:14:07.487ZTRACtest_vpcs (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = reconfigurator_config_watcher resource = Database
42272026-01-27T01:14:07.487ZDEBGtest_vpcs (BackgroundTasks): roles background_task = reconfigurator_config_watcher roles = RoleSet { roles: {} }
42282026-01-27T01:14:07.488ZDEBGtest_vpcs (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = reconfigurator_config_watcher resource = Database result = Ok(())
42292026-01-27T01:14:07.493ZDEBGtest_vpcs (BackgroundTasks): reconfigurator config load complete background_task = reconfigurator_config_watcher switches = Loaded(ReconfiguratorConfigView { version: 1, config: ReconfiguratorConfig { planner_enabled: false, planner_config: PlannerConfig { add_zones_with_mupdate_override: false }, tuf_repo_pruner_enabled: true }, time_modified: 2026-01-27T01:13:51.285464Z })
42302026-01-27T01:14:07.493ZDEBGtest_vpcs (BackgroundTasks): activation complete background_task = reconfigurator_config_watcher elapsed = 19.429377ms iteration = 4 status = {"config_updated":false}
42312026-01-27T01:14:07.568ZWARNtest_vpcs (SagaExecutor): Default ip pool lookup failed: Object (of type ByOther("default unicast IP pool for current silo")) not found: ip-pool. Default gateway has no ip pool association authenticated = true saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57 saga_name = project-create saga_node = VpcCreateGateway silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
42322026-01-27T01:14:07.568ZDEBGtest_vpcs (SEC): saga log event new_state = N017 succeeded sec_id = 913233fe-92a8-4635-9572-183f495429c4
42332026-01-27T01:14:07.568ZDEBGtest_vpcs (SecStore): recording saga event event_type = Succeeded(Object {"key": String("3b9499d6-e746-4ec4-846d-b9447f3c858f"), "lookup_type": Object {"ById": String("3b9499d6-e746-4ec4-846d-b9447f3c858f")}, "parent": Object {"key": String("9702b4b6-b761-4a78-93c1-48a3b0004b27"), "lookup_type": Object {"ByName": String("default")}, "parent": Object {"key": String("a1a9a9c7-9e7e-48b3-8937-c3723503857b"), "lookup_type": Object {"ByName": String("springfield-squidport")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}}}) node_id = 17 saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
42342026-01-27T01:14:07.576ZDEBGtest_vpcs (SEC): saga log event new_state = N018 started sec_id = 913233fe-92a8-4635-9572-183f495429c4
42352026-01-27T01:14:07.577ZDEBGtest_vpcs (SecStore): recording saga event event_type = Started node_id = 18 saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
42362026-01-27T01:14:07.584ZTRACtest_vpcs (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57 saga_name = project-create saga_node = VpcNotifySleds silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
42372026-01-27T01:14:07.584ZDEBGtest_vpcs (SagaExecutor): roles authenticated = true roles = RoleSet { roles: {} } saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57 saga_name = project-create saga_node = VpcNotifySleds silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
42382026-01-27T01:14:07.586ZDEBGtest_vpcs (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database result = Ok(()) saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57 saga_name = project-create saga_node = VpcNotifySleds silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
42392026-01-27T01:14:07.590ZTRACtest_vpcs (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57 saga_name = project-create saga_node = VpcNotifySleds silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
42402026-01-27T01:14:07.590ZDEBGtest_vpcs (SagaExecutor): roles authenticated = true roles = RoleSet { roles: {} } saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57 saga_name = project-create saga_node = VpcNotifySleds silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
42412026-01-27T01:14:07.591ZDEBGtest_vpcs (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database result = Ok(()) saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57 saga_name = project-create saga_node = VpcNotifySleds silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
42422026-01-27T01:14:07.595ZTRACtest_vpcs (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57 saga_name = project-create saga_node = VpcNotifySleds silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
42432026-01-27T01:14:07.595ZDEBGtest_vpcs (SagaExecutor): roles authenticated = true roles = RoleSet { roles: {} } saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57 saga_name = project-create saga_node = VpcNotifySleds silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
42442026-01-27T01:14:07.596ZDEBGtest_vpcs (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database result = Ok(()) saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57 saga_name = project-create saga_node = VpcNotifySleds silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
42452026-01-27T01:14:07.601ZTRACtest_vpcs (SagaExecutor): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: a1a9a9c7-9e7e-48b3-8937-c3723503857b, lookup_type: ById(a1a9a9c7-9e7e-48b3-8937-c3723503857b) }, key: 9702b4b6-b761-4a78-93c1-48a3b0004b27, lookup_type: ByName("default") } saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57 saga_name = project-create saga_node = VpcNotifySleds silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
42462026-01-27T01:14:07.602ZTRACtest_vpcs (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. } authenticated = true resource_id = a1a9a9c7-9e7e-48b3-8937-c3723503857b resource_type = Project saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57 saga_name = project-create saga_node = VpcNotifySleds silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
42472026-01-27T01:14:07.602ZTRACtest_vpcs (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57 saga_name = project-create saga_node = VpcNotifySleds silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
42482026-01-27T01:14:07.602ZDEBGtest_vpcs (SagaExecutor): roles authenticated = true roles = RoleSet { roles: {} } saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57 saga_name = project-create saga_node = VpcNotifySleds silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
42492026-01-27T01:14:07.603ZDEBGtest_vpcs (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database result = Ok(()) saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57 saga_name = project-create saga_node = VpcNotifySleds silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
42502026-01-27T01:14:07.609ZTRACtest_vpcs (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. } authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57 saga_name = project-create saga_node = VpcNotifySleds silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
42512026-01-27T01:14:07.609ZTRACtest_vpcs (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57 saga_name = project-create saga_node = VpcNotifySleds silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
42522026-01-27T01:14:07.609ZDEBGtest_vpcs (SagaExecutor): roles authenticated = true roles = RoleSet { roles: {} } saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57 saga_name = project-create saga_node = VpcNotifySleds silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
42532026-01-27T01:14:07.610ZDEBGtest_vpcs (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database result = Ok(()) saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57 saga_name = project-create saga_node = VpcNotifySleds silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
42542026-01-27T01:14:07.617ZTRACtest_vpcs (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. } authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57 saga_name = project-create saga_node = VpcNotifySleds silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
42552026-01-27T01:14:07.617ZTRACtest_vpcs (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57 saga_name = project-create saga_node = VpcNotifySleds silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
42562026-01-27T01:14:07.617ZDEBGtest_vpcs (SagaExecutor): roles authenticated = true roles = RoleSet { roles: {} } saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57 saga_name = project-create saga_node = VpcNotifySleds silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
42572026-01-27T01:14:07.618ZDEBGtest_vpcs (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database result = Ok(()) saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57 saga_name = project-create saga_node = VpcNotifySleds silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
42582026-01-27T01:14:07.625ZDEBGtest_vpcs (SagaExecutor): roles authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57 saga_name = project-create saga_node = VpcNotifySleds silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
42592026-01-27T01:14:07.638ZDEBGtest_vpcs (SagaExecutor): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: a1a9a9c7-9e7e-48b3-8937-c3723503857b, lookup_type: ById(a1a9a9c7-9e7e-48b3-8937-c3723503857b) }, key: 9702b4b6-b761-4a78-93c1-48a3b0004b27, lookup_type: ByName("default") } result = Ok(()) saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57 saga_name = project-create saga_node = VpcNotifySleds silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
42602026-01-27T01:14:07.638ZTRACtest_vpcs (SagaExecutor): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: a1a9a9c7-9e7e-48b3-8937-c3723503857b, lookup_type: ById(a1a9a9c7-9e7e-48b3-8937-c3723503857b) }, key: 9702b4b6-b761-4a78-93c1-48a3b0004b27, lookup_type: ByName("default") } saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57 saga_name = project-create saga_node = VpcNotifySleds silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
42612026-01-27T01:14:07.638ZTRACtest_vpcs (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. } authenticated = true resource_id = a1a9a9c7-9e7e-48b3-8937-c3723503857b resource_type = Project saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57 saga_name = project-create saga_node = VpcNotifySleds silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
42622026-01-27T01:14:07.638ZTRACtest_vpcs (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57 saga_name = project-create saga_node = VpcNotifySleds silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
42632026-01-27T01:14:07.638ZDEBGtest_vpcs (SagaExecutor): roles authenticated = true roles = RoleSet { roles: {} } saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57 saga_name = project-create saga_node = VpcNotifySleds silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
42642026-01-27T01:14:07.639ZDEBGtest_vpcs (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database result = Ok(()) saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57 saga_name = project-create saga_node = VpcNotifySleds silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
42652026-01-27T01:14:07.640ZDEBGtest_vpcs (results-sink): inserting 2 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
42662026-01-27T01:14:07.640ZDEBGtest_vpcs (results-sink-cluster): inserting 2 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
42672026-01-27T01:14:07.641ZDEBGtest_vpcs (clickhouse-client): unrolling 2 total samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 719060a6-12ac-470c-bb91-e566c7f997b2
42682026-01-27T01:14:07.644ZDEBGtest_vpcs (clickhouse-client): retrieving timeseries schema from database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 719060a6-12ac-470c-bb91-e566c7f997b2
42692026-01-27T01:14:07.644ZTRACtest_vpcs (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 719060a6-12ac-470c-bb91-e566c7f997b2 sql = SELECT * FROM oximeter.timeseries_schema WHERE timeseries_name NOT IN ('collection_target:cpus_provisioned', 'collection_target:ram_provisioned', 'collection_target:virtual_disk_space_provisioned', 'http_service:request_latency_histogram', 'oximeter_collector:collections') FORMAT Native;
42702026-01-27T01:14:07.649ZTRACtest_vpcs (clickhouse-client): no new timeseries schema in database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 719060a6-12ac-470c-bb91-e566c7f997b2
42712026-01-27T01:14:07.649ZDEBGtest_vpcs (clickhouse-client): new timeseries schema collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 719060a6-12ac-470c-bb91-e566c7f997b2 schema = TimeseriesSchema { timeseries_name: TimeseriesName("integration_target:integration_metric"), description: TimeseriesDescription { target: "", metric: "" }, field_schema: {FieldSchema { name: "metric_name", field_type: String, source: Metric, description: "" }, FieldSchema { name: "target_name", field_type: String, source: Target, description: "" }}, datum_type: I64, version: 1, authz_scope: Fleet, units: Count, created: 2026-01-27T01:14:07.643957757Z } timeseries_name = integration_target:integration_metric
42722026-01-27T01:14:07.649ZDEBGtest_vpcs (clickhouse-client): inserting 1 new timeseries schema collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 719060a6-12ac-470c-bb91-e566c7f997b2
42732026-01-27T01:14:07.649ZTRACtest_vpcs (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 719060a6-12ac-470c-bb91-e566c7f997b2 n_columns = 6 n_rows = 1 sql = INSERT INTO oximeter.timeseries_schema FORMAT Native
42742026-01-27T01:14:07.650ZTRACtest_vpcs (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. } authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57 saga_name = project-create saga_node = VpcNotifySleds silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
42752026-01-27T01:14:07.650ZTRACtest_vpcs (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57 saga_name = project-create saga_node = VpcNotifySleds silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
42762026-01-27T01:14:07.650ZDEBGtest_vpcs (SagaExecutor): roles authenticated = true roles = RoleSet { roles: {} } saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57 saga_name = project-create saga_node = VpcNotifySleds silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
42772026-01-27T01:14:07.651ZDEBGtest_vpcs (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database result = Ok(()) saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57 saga_name = project-create saga_node = VpcNotifySleds silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
42782026-01-27T01:14:07.656ZTRACtest_vpcs (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 719060a6-12ac-470c-bb91-e566c7f997b2 n_columns = 4 n_rows = 2 sql = INSERT INTO oximeter.fields_ipaddr FORMAT Native
42792026-01-27T01:14:07.659ZTRACtest_vpcs (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. } authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57 saga_name = project-create saga_node = VpcNotifySleds silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
42802026-01-27T01:14:07.659ZTRACtest_vpcs (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57 saga_name = project-create saga_node = VpcNotifySleds silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
42812026-01-27T01:14:07.659ZDEBGtest_vpcs (SagaExecutor): roles authenticated = true roles = RoleSet { roles: {} } saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57 saga_name = project-create saga_node = VpcNotifySleds silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
42822026-01-27T01:14:07.661ZDEBGtest_vpcs (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database result = Ok(()) saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57 saga_name = project-create saga_node = VpcNotifySleds silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
42832026-01-27T01:14:07.671ZDEBGtest_vpcs (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 719060a6-12ac-470c-bb91-e566c7f997b2 n_rows = 2 table_name = fields_ipaddr
42842026-01-27T01:14:07.672ZTRACtest_vpcs (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 719060a6-12ac-470c-bb91-e566c7f997b2 n_columns = 4 n_rows = 3 sql = INSERT INTO oximeter.fields_string FORMAT Native
42852026-01-27T01:14:07.676ZDEBGtest_vpcs (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 719060a6-12ac-470c-bb91-e566c7f997b2 n_rows = 3 table_name = fields_string
42862026-01-27T01:14:07.676ZTRACtest_vpcs (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 719060a6-12ac-470c-bb91-e566c7f997b2 n_columns = 4 n_rows = 2 sql = INSERT INTO oximeter.fields_u16 FORMAT Native
42872026-01-27T01:14:07.679ZDEBGtest_vpcs (SagaExecutor): roles authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57 saga_name = project-create saga_node = VpcNotifySleds silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
42882026-01-27T01:14:07.692ZDEBGtest_vpcs (SagaExecutor): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: a1a9a9c7-9e7e-48b3-8937-c3723503857b, lookup_type: ById(a1a9a9c7-9e7e-48b3-8937-c3723503857b) }, key: 9702b4b6-b761-4a78-93c1-48a3b0004b27, lookup_type: ByName("default") } result = Ok(()) saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57 saga_name = project-create saga_node = VpcNotifySleds silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
42892026-01-27T01:14:07.692ZTRACtest_vpcs (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57 saga_name = project-create saga_node = VpcNotifySleds silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
42902026-01-27T01:14:07.692ZDEBGtest_vpcs (SagaExecutor): roles authenticated = true roles = RoleSet { roles: {} } saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57 saga_name = project-create saga_node = VpcNotifySleds silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
42912026-01-27T01:14:07.693ZDEBGtest_vpcs (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database result = Ok(()) saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57 saga_name = project-create saga_node = VpcNotifySleds silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
42922026-01-27T01:14:07.695ZDEBGtest_vpcs (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 719060a6-12ac-470c-bb91-e566c7f997b2 n_rows = 2 table_name = fields_u16
42932026-01-27T01:14:07.695ZTRACtest_vpcs (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 719060a6-12ac-470c-bb91-e566c7f997b2 n_columns = 4 n_rows = 2 sql = INSERT INTO oximeter.fields_uuid FORMAT Native
42942026-01-27T01:14:07.699ZDEBGtest_vpcs (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 719060a6-12ac-470c-bb91-e566c7f997b2 n_rows = 2 table_name = fields_uuid
42952026-01-27T01:14:07.699ZTRACtest_vpcs (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 719060a6-12ac-470c-bb91-e566c7f997b2 n_columns = 5 n_rows = 1 sql = INSERT INTO oximeter.measurements_cumulativeu64 FORMAT Native
42962026-01-27T01:14:07.702ZDEBGtest_vpcs (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 719060a6-12ac-470c-bb91-e566c7f997b2 n_rows = 1 table_name = measurements_cumulativeu64
42972026-01-27T01:14:07.702ZTRACtest_vpcs (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 719060a6-12ac-470c-bb91-e566c7f997b2 n_columns = 4 n_rows = 1 sql = INSERT INTO oximeter.measurements_i64 FORMAT Native
42982026-01-27T01:14:07.706ZDEBGtest_vpcs (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 719060a6-12ac-470c-bb91-e566c7f997b2 n_rows = 1 table_name = measurements_i64
42992026-01-27T01:14:07.707ZTRACtest_vpcs (results-sink): successfully inserted samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
43002026-01-27T01:14:07.709ZDEBGtest_vpcs (nexus): resolved names for firewall rules instance_interfaces = {} subnet_interfaces = {} subnet_networks = {} vpc_interfaces = {}
43012026-01-27T01:14:07.709ZDEBGtest_vpcs (nexus): resolved firewall rules for sled agents sled_agent_rules = []
43022026-01-27T01:14:07.709ZDEBGtest_vpcs (nexus): resolved 0 rules for sleds
43032026-01-27T01:14:07.738ZDEBGtest_vpcs (nexus): resolved sleds for vpc default vpc_to_sled = []
43042026-01-27T01:14:07.739ZDEBGtest_vpcs (nexus): sending firewall rules to sled agents
43052026-01-27T01:14:07.739ZINFOtest_vpcs (nexus): updated firewall rules on 0 sleds
43062026-01-27T01:14:07.739ZTRACtest_vpcs (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57 saga_name = project-create saga_node = VpcNotifySleds silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
43072026-01-27T01:14:07.739ZDEBGtest_vpcs (SagaExecutor): roles authenticated = true roles = RoleSet { roles: {} } saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57 saga_name = project-create saga_node = VpcNotifySleds silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
43082026-01-27T01:14:07.739ZDEBGtest_vpcs (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database result = Ok(()) saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57 saga_name = project-create saga_node = VpcNotifySleds silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
43092026-01-27T01:14:07.742ZWARNtest_vpcs (results-sink-cluster): failed to insert some results into metric DB collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 error = Failed to check out connection to database: No backends found for this service file = oximeter/collector/src/results_sink.rs:92
43102026-01-27T01:14:07.746ZDEBGtest_vpcs (SEC): saga log event new_state = N018 succeeded sec_id = 913233fe-92a8-4635-9572-183f495429c4
43112026-01-27T01:14:07.746ZDEBGtest_vpcs (SecStore): recording saga event event_type = Succeeded(Null) node_id = 18 saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
43122026-01-27T01:14:07.753ZDEBGtest_vpcs (SEC): saga log event new_state = N019 started sec_id = 913233fe-92a8-4635-9572-183f495429c4
43132026-01-27T01:14:07.753ZDEBGtest_vpcs (SecStore): recording saga event event_type = Started node_id = 19 saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
43142026-01-27T01:14:07.759ZDEBGtest_vpcs (SEC): saga log event new_state = N019 succeeded sec_id = 913233fe-92a8-4635-9572-183f495429c4
43152026-01-27T01:14:07.759ZDEBGtest_vpcs (SecStore): recording saga event event_type = Succeeded(Null) node_id = 19 saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
43162026-01-27T01:14:07.765ZDEBGtest_vpcs (SEC): saga log event new_state = N021 started sec_id = 913233fe-92a8-4635-9572-183f495429c4
43172026-01-27T01:14:07.766ZDEBGtest_vpcs (SecStore): recording saga event event_type = Started node_id = 21 saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
43182026-01-27T01:14:07.772ZDEBGtest_vpcs (SEC): saga log event new_state = N021 succeeded sec_id = 913233fe-92a8-4635-9572-183f495429c4
43192026-01-27T01:14:07.772ZDEBGtest_vpcs (SecStore): recording saga event event_type = Succeeded(Null) node_id = 21 saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
43202026-01-27T01:14:07.778ZINFOtest_vpcs (SEC): update for saga cached state new_state = Done saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57 sec_id = 913233fe-92a8-4635-9572-183f495429c4
43212026-01-27T01:14:07.779ZINFOtest_vpcs (SecStore): updating state new_state = done saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
43222026-01-27T01:14:07.785ZDEBGtest_vpcs (collection-task): sent timer-based collection request to the collection task collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de producer_ip = ::1 producer_port = 65095
43232026-01-27T01:14:07.786ZDEBGtest_vpcs (collection-task): collecting from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de producer_ip = ::1 producer_port = 65095
43242026-01-27T01:14:07.788ZINFOtest_vpcs (SEC): saga finished result = success saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57 saga_name = project-create sec_id = 913233fe-92a8-4635-9572-183f495429c4
43252026-01-27T01:14:07.789ZINFOtest_vpcs (SagaQuiesceHandle): tracked saga has finished saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
43262026-01-27T01:14:07.790ZINFOtest_vpcs (SagaExecutor): saga finished saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57 saga_name = project-create saga_result = SagaResult { saga_id: 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57, saga_log: SagaLog { saga_id: 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57, unwinding: false, events: [N020 started, N020 succeeded, N000 started, N000 succeeded, N001 started, N001 succeeded, N002 started, N002 succeeded, N003 started, N003 succeeded, N004 started, N004 succeeded, N005 started, N005 succeeded, N006 started, N006 succeeded, N007 started, N007 succeeded, N008 started, N008 succeeded, N009 started, N009 succeeded, N010 started, N010 succeeded, N011 started, N011 succeeded, N012 started, N012 succeeded, N013 started, N013 succeeded, N014 started, N014 succeeded, N015 started, N015 succeeded, N016 started, N016 succeeded, N017 started, N017 succeeded, N018 started, N018 succeeded, N019 started, N019 succeeded, N021 started, N021 succeeded], node_status: {0: Succeeded(Array [Object {"key": String("a1a9a9c7-9e7e-48b3-8937-c3723503857b"), "lookup_type": Object {"ByName": String("springfield-squidport")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}, Object {"identity": Object {"description": String("a pier"), "id": String("a1a9a9c7-9e7e-48b3-8937-c3723503857b"), "name": String("springfield-squidport"), "time_created": String("2026-01-27T01:14:05.528374Z"), "time_deleted": Null, "time_modified": String("2026-01-27T01:14:05.528374Z")}, "rcgen": Number(1), "silo_id": String("001de000-5110-4000-8000-000000000000")}]), 1: Succeeded(Object {"authz_project": Object {"key": String("a1a9a9c7-9e7e-48b3-8937-c3723503857b"), "lookup_type": Object {"ByName": String("springfield-squidport")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}, "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}, "credential_id": Null, "device_token_expiration": Null}, Object {"mapped_fleet_roles": Object {}}]}}, "vpc_create": Object {"description": String("Default VPC"), "dns_name": String("default"), "ipv6_prefix": String("fd6f:1fa5:6c45::/48"), "name": String("default")}}), 2: Succeeded(Null), 3: Succeeded(String("9702b4b6-b761-4a78-93c1-48a3b0004b27")), 4: Succeeded(String("9b4d23dd-a0db-427f-957b-c661053a0cc4")), 5: Succeeded(String("02ab13cb-7e3c-4290-85f5-7c4e1cfdbc3f")), 6: Succeeded(String("9b7b7a26-0077-4905-8449-e7599aee34cf")), 7: Succeeded(String("70322159-3612-4366-a5c5-0de230edee74")), 8: Succeeded(String("8876f6e2-bc47-4ea3-bd82-a5551e4427e8")), 9: Succeeded(String("3b9499d6-e746-4ec4-846d-b9447f3c858f")), 10: Succeeded(Array [Object {"key": String("9702b4b6-b761-4a78-93c1-48a3b0004b27"), "lookup_type": Object {"ByName": String("default")}, "parent": Object {"key": String("a1a9a9c7-9e7e-48b3-8937-c3723503857b"), "lookup_type": Object {"ByName": String("springfield-squidport")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}}, Object {"dns_name": String("default"), "firewall_gen": Number(1), "identity": Object {"description": String("Default VPC"), "id": String("9702b4b6-b761-4a78-93c1-48a3b0004b27"), "name": String("default"), "time_created": String("2026-01-27T01:14:06.121281Z"), "time_deleted": Null, "time_modified": String("2026-01-27T01:14:06.121281Z")}, "ipv6_prefix": String("fd6f:1fa5:6c45::/48"), "project_id": String("a1a9a9c7-9e7e-48b3-8937-c3723503857b"), "subnet_gen": Number(1), "system_router_id": String("9b4d23dd-a0db-427f-957b-c661053a0cc4"), "vni": Number(16560289)}]), 11: Succeeded(Object {"key": String("9b4d23dd-a0db-427f-957b-c661053a0cc4"), "lookup_type": Object {"ById": String("9b4d23dd-a0db-427f-957b-c661053a0cc4")}, "parent": Object {"key": String("9702b4b6-b761-4a78-93c1-48a3b0004b27"), "lookup_type": Object {"ByName": String("default")}, "parent": Object {"key": String("a1a9a9c7-9e7e-48b3-8937-c3723503857b"), "lookup_type": Object {"ByName": String("springfield-squidport")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}}}), 12: Succeeded(Null), 13: Succeeded(Null), 14: Succeeded(Array [Object {"key": String("8876f6e2-bc47-4ea3-bd82-a5551e4427e8"), "lookup_type": Object {"ById": String("8876f6e2-bc47-4ea3-bd82-a5551e4427e8")}, "parent": Object {"key": String("9702b4b6-b761-4a78-93c1-48a3b0004b27"), "lookup_type": Object {"ByName": String("default")}, "parent": Object {"key": String("a1a9a9c7-9e7e-48b3-8937-c3723503857b"), "lookup_type": Object {"ByName": String("springfield-squidport")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}}}, Object {"custom_router_id": Null, "identity": Object {"description": String("The default subnet for default"), "id": String("8876f6e2-bc47-4ea3-bd82-a5551e4427e8"), "name": String("default"), "time_created": String("2026-01-27T01:14:07.056719Z"), "time_deleted": Null, "time_modified": String("2026-01-27T01:14:07.056719Z")}, "ipv4_block": String("172.30.0.0/22"), "ipv6_block": String("fd6f:1fa5:6c45::/64"), "rcgen": Number(1), "vpc_id": String("9702b4b6-b761-4a78-93c1-48a3b0004b27")}]), 15: Succeeded(Object {"key": String("70322159-3612-4366-a5c5-0de230edee74"), "lookup_type": Object {"ById": String("8876f6e2-bc47-4ea3-bd82-a5551e4427e8")}, "parent": Object {"key": String("9b4d23dd-a0db-427f-957b-c661053a0cc4"), "lookup_type": Object {"ById": String("9b4d23dd-a0db-427f-957b-c661053a0cc4")}, "parent": Object {"key": String("9702b4b6-b761-4a78-93c1-48a3b0004b27"), "lookup_type": Object {"ByName": String("default")}, "parent": Object {"key": String("a1a9a9c7-9e7e-48b3-8937-c3723503857b"), "lookup_type": Object {"ByName": String("springfield-squidport")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}}}}), 16: Succeeded(Array [Object {"action": String("allow"), "direction": String("inbound"), "filter_hosts": Array [Object {"type": String("vpc"), "value": String("default")}], "filter_ports": Null, "filter_protocols": Null, "identity": Object {"description": String("allow inbound traffic to all instances within the VPC if originated within the VPC"), "id": String("d7390906-29d6-4f4b-9d97-88893a590dba"), "name": String("allow-internal-inbound"), "time_created": String("2026-01-27T01:14:07.169050657Z"), "time_deleted": Null, "time_modified": String("2026-01-27T01:14:07.169050657Z")}, "priority": Number(65534), "status": String("enabled"), "targets": Array [Object {"type": String("vpc"), "value": String("default")}], "vpc_id": String("9702b4b6-b761-4a78-93c1-48a3b0004b27")}, Object {"action": String("allow"), "direction": String("inbound"), "filter_hosts": Null, "filter_ports": Array [String("22")], "filter_protocols": Array [Object {"type": String("tcp")}], "identity": Object {"description": String("allow inbound TCP connections on port 22 from anywhere"), "id": String("7f70193c-b41c-4531-bcda-b2a064abe782"), "name": String("allow-ssh"), "time_created": String("2026-01-27T01:14:07.169070015Z"), "time_deleted": Null, "time_modified": String("2026-01-27T01:14:07.169070015Z")}, "priority": Number(65534), "status": String("enabled"), "targets": Array [Object {"type": String("vpc"), "value": String("default")}], "vpc_id": String("9702b4b6-b761-4a78-93c1-48a3b0004b27")}, Object {"action": String("allow"), "direction": String("inbound"), "filter_hosts": Null, "filter_ports": Null, "filter_protocols": Array [Object {"type": String("icmp"), "value": Null}], "identity": Object {"description": String("allow inbound ICMP traffic from anywhere"), "id": String("f7debd9d-bf4f-4ca8-8c18-f9d78a7fd783"), "name": String("allow-icmp"), "time_created": String("2026-01-27T01:14:07.169078853Z"), "time_deleted": Null, "time_modified": String("2026-01-27T01:14:07.169078853Z")}, "priority": Number(65534), "status": String("enabled"), "targets": Array [Object {"type": String("vpc"), "value": String("default")}], "vpc_id": String("9702b4b6-b761-4a78-93c1-48a3b0004b27")}]), 17: Succeeded(Object {"key": String("3b9499d6-e746-4ec4-846d-b9447f3c858f"), "lookup_type": Object {"ById": String("3b9499d6-e746-4ec4-846d-b9447f3c858f")}, "parent": Object {"key": String("9702b4b6-b761-4a78-93c1-48a3b0004b27"), "lookup_type": Object {"ByName": String("default")}, "parent": Object {"key": String("a1a9a9c7-9e7e-48b3-8937-c3723503857b"), "lookup_type": Object {"ByName": String("springfield-squidport")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}}}), 18: Succeeded(Null), 19: Succeeded(Null), 20: Succeeded(Null), 21: Succeeded(Null)} }, kind: Ok(SagaResultOk { saga_output: Null, node_outputs: {"default_internet_gateway_id": String("3b9499d6-e746-4ec4-846d-b9447f3c858f"), "default_subnet_id": String("8876f6e2-bc47-4ea3-bd82-a5551e4427e8"), "default_v4_route_id": String("02ab13cb-7e3c-4290-85f5-7c4e1cfdbc3f"), "default_v6_route_id": String("9b7b7a26-0077-4905-8449-e7599aee34cf"), "firewall": Array [Object {"action": String("allow"), "direction": String("inbound"), "filter_hosts": Array [Object {"type": String("vpc"), "value": String("default")}], "filter_ports": Null, "filter_protocols": Null, "identity": Object {"description": String("allow inbound traffic to all instances within the VPC if originated within the VPC"), "id": String("d7390906-29d6-4f4b-9d97-88893a590dba"), "name": String("allow-internal-inbound"), "time_created": String("2026-01-27T01:14:07.169050657Z"), "time_deleted": Null, "time_modified": String("2026-01-27T01:14:07.169050657Z")}, "priority": Number(65534), "status": String("enabled"), "targets": Array [Object {"type": String("vpc"), "value": String("default")}], "vpc_id": String("9702b4b6-b761-4a78-93c1-48a3b0004b27")}, Object {"action": String("allow"), "direction": String("inbound"), "filter_hosts": Null, "filter_ports": Array [String("22")], "filter_protocols": Array [Object {"type": String("tcp")}], "identity": Object {"description": String("allow inbound TCP connections on port 22 from anywhere"), "id": String("7f70193c-b41c-4531-bcda-b2a064abe782"), "name": String("allow-ssh"), "time_created": String("2026-01-27T01:14:07.169070015Z"), "time_deleted": Null, "time_modified": String("2026-01-27T01:14:07.169070015Z")}, "priority": Number(65534), "status": String("enabled"), "targets": Array [Object {"type": String("vpc"), "value": String("default")}], "vpc_id": String("9702b4b6-b761-4a78-93c1-48a3b0004b27")}, Object {"action": String("allow"), "direction": String("inbound"), "filter_hosts": Null, "filter_ports": Null, "filter_protocols": Array [Object {"type": String("icmp"), "value": Null}], "identity": Object {"description": String("allow inbound ICMP traffic from anywhere"), "id": String("f7debd9d-bf4f-4ca8-8c18-f9d78a7fd783"), "name": String("allow-icmp"), "time_created": String("2026-01-27T01:14:07.169078853Z"), "time_deleted": Null, "time_modified": String("2026-01-27T01:14:07.169078853Z")}, "priority": Number(65534), "status": String("enabled"), "targets": Array [Object {"type": String("vpc"), "value": String("default")}], "vpc_id": String("9702b4b6-b761-4a78-93c1-48a3b0004b27")}], "gateway": Object {"key": String("3b9499d6-e746-4ec4-846d-b9447f3c858f"), "lookup_type": Object {"ById": String("3b9499d6-e746-4ec4-846d-b9447f3c858f")}, "parent": Object {"key": String("9702b4b6-b761-4a78-93c1-48a3b0004b27"), "lookup_type": Object {"ByName": String("default")}, "parent": Object {"key": String("a1a9a9c7-9e7e-48b3-8937-c3723503857b"), "lookup_type": Object {"ByName": String("springfield-squidport")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}}}, "no_result": Null, "project": Array [Object {"key": String("a1a9a9c7-9e7e-48b3-8937-c3723503857b"), "lookup_type": Object {"ByName": String("springfield-squidport")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}, Object {"identity": Object {"description": String("a pier"), "id": String("a1a9a9c7-9e7e-48b3-8937-c3723503857b"), "name": String("springfield-squidport"), "time_created": String("2026-01-27T01:14:05.528374Z"), "time_deleted": Null, "time_modified": String("2026-01-27T01:14:05.528374Z")}, "rcgen": Number(1), "silo_id": String("001de000-5110-4000-8000-000000000000")}], "route": Object {"key": String("70322159-3612-4366-a5c5-0de230edee74"), "lookup_type": Object {"ById": String("8876f6e2-bc47-4ea3-bd82-a5551e4427e8")}, "parent": Object {"key": String("9b4d23dd-a0db-427f-957b-c661053a0cc4"), "lookup_type": Object {"ById": String("9b4d23dd-a0db-427f-957b-c661053a0cc4")}, "parent": Object {"key": String("9702b4b6-b761-4a78-93c1-48a3b0004b27"), "lookup_type": Object {"ByName": String("default")}, "parent": Object {"key": String("a1a9a9c7-9e7e-48b3-8937-c3723503857b"), "lookup_type": Object {"ByName": String("springfield-squidport")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}}}}, "route4": Null, "route6": Null, "router": Object {"key": String("9b4d23dd-a0db-427f-957b-c661053a0cc4"), "lookup_type": Object {"ById": String("9b4d23dd-a0db-427f-957b-c661053a0cc4")}, "parent": Object {"key": String("9702b4b6-b761-4a78-93c1-48a3b0004b27"), "lookup_type": Object {"ByName": String("default")}, "parent": Object {"key": String("a1a9a9c7-9e7e-48b3-8937-c3723503857b"), "lookup_type": Object {"ByName": String("springfield-squidport")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}}}, "subnet": Array [Object {"key": String("8876f6e2-bc47-4ea3-bd82-a5551e4427e8"), "lookup_type": Object {"ById": String("8876f6e2-bc47-4ea3-bd82-a5551e4427e8")}, "parent": Object {"key": String("9702b4b6-b761-4a78-93c1-48a3b0004b27"), "lookup_type": Object {"ByName": String("default")}, "parent": Object {"key": String("a1a9a9c7-9e7e-48b3-8937-c3723503857b"), "lookup_type": Object {"ByName": String("springfield-squidport")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}}}, Object {"custom_router_id": Null, "identity": Object {"description": String("The default subnet for default"), "id": String("8876f6e2-bc47-4ea3-bd82-a5551e4427e8"), "name": String("default"), "time_created": String("2026-01-27T01:14:07.056719Z"), "time_deleted": Null, "time_modified": String("2026-01-27T01:14:07.056719Z")}, "ipv4_block": String("172.30.0.0/22"), "ipv6_block": String("fd6f:1fa5:6c45::/64"), "rcgen": Number(1), "vpc_id": String("9702b4b6-b761-4a78-93c1-48a3b0004b27")}], "subnet_route_id": String("70322159-3612-4366-a5c5-0de230edee74"), "system_router_id": String("9b4d23dd-a0db-427f-957b-c661053a0cc4"), "vpc": Null, "vpc_create_params": Object {"authz_project": Object {"key": String("a1a9a9c7-9e7e-48b3-8937-c3723503857b"), "lookup_type": Object {"ByName": String("springfield-squidport")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}, "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}, "credential_id": Null, "device_token_expiration": Null}, Object {"mapped_fleet_roles": Object {}}]}}, "vpc_create": Object {"description": String("Default VPC"), "dns_name": String("default"), "ipv6_prefix": String("fd6f:1fa5:6c45::/48"), "name": String("default")}}, "vpc_id": String("9702b4b6-b761-4a78-93c1-48a3b0004b27")} }) }
43272026-01-27T01:14:07.791ZTRACtest_vpcs (dropshot_external): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true local_addr = 127.0.0.1:50372 method = POST remote_addr = 127.0.0.1:38658 req_id = 080f25fb-73f3-4a96-a048-da3d85194d7a resource = AuditLog silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user uri = /v1/projects
43282026-01-27T01:14:07.791ZTRACtest_vpcs (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. } authenticated = true local_addr = 127.0.0.1:50372 method = POST remote_addr = 127.0.0.1:38658 req_id = 080f25fb-73f3-4a96-a048-da3d85194d7a resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user uri = /v1/projects
43292026-01-27T01:14:07.792ZTRACtest_vpcs (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true local_addr = 127.0.0.1:50372 method = POST remote_addr = 127.0.0.1:38658 req_id = 080f25fb-73f3-4a96-a048-da3d85194d7a resource = Database silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user uri = /v1/projects
43302026-01-27T01:14:07.792ZDEBGtest_vpcs (dropshot_external): roles authenticated = true local_addr = 127.0.0.1:50372 method = POST remote_addr = 127.0.0.1:38658 req_id = 080f25fb-73f3-4a96-a048-da3d85194d7a roles = RoleSet { roles: {} } silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user uri = /v1/projects
43312026-01-27T01:14:07.792ZDEBGtest_vpcs (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true local_addr = 127.0.0.1:50372 method = POST remote_addr = 127.0.0.1:38658 req_id = 080f25fb-73f3-4a96-a048-da3d85194d7a resource = Database result = Ok(()) silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user uri = /v1/projects
43322026-01-27T01:14:07.794ZTRACtest_vpcs (collection-task): sent collection request to producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de producer_ip = ::1 producer_port = 65095
43332026-01-27T01:14:07.795ZDEBGtest_vpcs (collection-task): collected results from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 n_results = 1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de producer_ip = ::1 producer_port = 65095
43342026-01-27T01:14:07.795ZTRACtest_vpcs (collection-task): forwarded results to main collection loop collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de producer_ip = ::1 producer_port = 65095
43352026-01-27T01:14:07.795ZTRACtest_vpcs (collection-task): top of inner collection loop, waiting for next request collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de producer_ip = ::1 producer_port = 65095
43362026-01-27T01:14:07.801ZDEBGtest_vpcs (dropshot_external): roles authenticated = true local_addr = 127.0.0.1:50372 method = POST remote_addr = 127.0.0.1:38658 req_id = 080f25fb-73f3-4a96-a048-da3d85194d7a roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} } silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user uri = /v1/projects
43372026-01-27T01:14:07.804ZDEBGtest_vpcs (dropshot_external): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true local_addr = 127.0.0.1:50372 method = POST remote_addr = 127.0.0.1:38658 req_id = 080f25fb-73f3-4a96-a048-da3d85194d7a resource = AuditLog result = Ok(()) silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user uri = /v1/projects
43382026-01-27T01:14:07.804ZTRACtest_vpcs (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true local_addr = 127.0.0.1:50372 method = POST remote_addr = 127.0.0.1:38658 req_id = 080f25fb-73f3-4a96-a048-da3d85194d7a resource = Database silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user uri = /v1/projects
43392026-01-27T01:14:07.804ZDEBGtest_vpcs (dropshot_external): roles authenticated = true local_addr = 127.0.0.1:50372 method = POST remote_addr = 127.0.0.1:38658 req_id = 080f25fb-73f3-4a96-a048-da3d85194d7a roles = RoleSet { roles: {} } silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user uri = /v1/projects
43402026-01-27T01:14:07.805ZDEBGtest_vpcs (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true local_addr = 127.0.0.1:50372 method = POST remote_addr = 127.0.0.1:38658 req_id = 080f25fb-73f3-4a96-a048-da3d85194d7a resource = Database result = Ok(()) silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user uri = /v1/projects
43412026-01-27T01:14:07.885ZINFOtest_vpcs (dropshot_external): request completed latency_us = 3027490 local_addr = 127.0.0.1:50372 method = POST remote_addr = 127.0.0.1:38658 req_id = 080f25fb-73f3-4a96-a048-da3d85194d7a response_code = 201 uri = /v1/projects
43422026-01-27T01:14:07.886ZINFOtest_vpcs (external client test context): client received response status = 201
43432026-01-27T01:14:07.886ZINFOtest_vpcs (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:50372/v1/projects
43442026-01-27T01:14:07.886ZTRACtest_vpcs (dropshot_external): incoming request local_addr = 127.0.0.1:50372 method = POST remote_addr = 127.0.0.1:38658 req_id = 2c4023ef-c6a2-448b-9a04-47ec3b9e1661 uri = /v1/projects
43452026-01-27T01:14:07.887ZDEBGtest_vpcs (dropshot_external): determined request API version local_addr = 127.0.0.1:50372 method = POST remote_addr = 127.0.0.1:38658 req_id = 2c4023ef-c6a2-448b-9a04-47ec3b9e1661 uri = /v1/projects version = 2026012300.0.0
43462026-01-27T01:14:07.887ZTRACtest_vpcs (dropshot_external): authn: trying Spoof local_addr = 127.0.0.1:50372 method = POST remote_addr = 127.0.0.1:38658 req_id = 2c4023ef-c6a2-448b-9a04-47ec3b9e1661 uri = /v1/projects
43472026-01-27T01:14:07.887ZDEBGtest_vpcs (dropshot_external): looking up silo for user local_addr = 127.0.0.1:50372 method = POST remote_addr = 127.0.0.1:38658 req_id = 2c4023ef-c6a2-448b-9a04-47ec3b9e1661 silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/projects
43482026-01-27T01:14:07.888ZTRACtest_vpcs (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. }) resource = Database
43492026-01-27T01:14:07.888ZDEBGtest_vpcs (ExternalAuthn): roles roles = RoleSet { roles: {} }
43502026-01-27T01:14:07.889ZDEBGtest_vpcs (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. }) resource = Database result = Ok(())
43512026-01-27T01:14:07.897ZTRACtest_vpcs (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. }) resource = Database
43522026-01-27T01:14:07.897ZDEBGtest_vpcs (ExternalAuthn): roles roles = RoleSet { roles: {} }
43532026-01-27T01:14:07.898ZDEBGtest_vpcs (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. }) resource = Database result = Ok(())
43542026-01-27T01:14:07.905ZTRACtest_vpcs (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007 (silo_user), lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
43552026-01-27T01:14:07.905ZTRACtest_vpcs (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
43562026-01-27T01:14:07.905ZTRACtest_vpcs (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. }) resource = Database
43572026-01-27T01:14:07.905ZDEBGtest_vpcs (ExternalAuthn): roles roles = RoleSet { roles: {} }
43582026-01-27T01:14:07.906ZDEBGtest_vpcs (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. }) resource = Database result = Ok(())
43592026-01-27T01:14:07.910ZTRACtest_vpcs (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
43602026-01-27T01:14:07.911ZTRACtest_vpcs (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. }) resource = Database
43612026-01-27T01:14:07.911ZDEBGtest_vpcs (ExternalAuthn): roles roles = RoleSet { roles: {} }
43622026-01-27T01:14:07.912ZDEBGtest_vpcs (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. }) resource = Database result = Ok(())
43632026-01-27T01:14:07.917ZDEBGtest_vpcs (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
43642026-01-27T01:14:07.922ZDEBGtest_vpcs (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007 (silo_user), lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
43652026-01-27T01:14:07.922ZTRACtest_vpcs (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. }) resource = Database
43662026-01-27T01:14:07.923ZDEBGtest_vpcs (ExternalAuthn): roles roles = RoleSet { roles: {} }
43672026-01-27T01:14:07.923ZDEBGtest_vpcs (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. }) resource = Database result = Ok(())
43682026-01-27T01:14:07.929ZTRACtest_vpcs (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
43692026-01-27T01:14:07.930ZTRACtest_vpcs (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
43702026-01-27T01:14:07.930ZTRACtest_vpcs (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. }) resource = Database
43712026-01-27T01:14:07.930ZDEBGtest_vpcs (ExternalAuthn): roles roles = RoleSet { roles: {} }
43722026-01-27T01:14:07.931ZDEBGtest_vpcs (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. }) resource = Database result = Ok(())
43732026-01-27T01:14:07.936ZTRACtest_vpcs (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
43742026-01-27T01:14:07.937ZTRACtest_vpcs (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. }) resource = Database
43752026-01-27T01:14:07.937ZDEBGtest_vpcs (ExternalAuthn): roles roles = RoleSet { roles: {} }
43762026-01-27T01:14:07.937ZDEBGtest_vpcs (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. }) resource = Database result = Ok(())
43772026-01-27T01:14:07.943ZDEBGtest_vpcs (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
43782026-01-27T01:14:07.949ZDEBGtest_vpcs (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
43792026-01-27T01:14:07.950ZTRACtest_vpcs (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }, device_token_expiration: None, credential_id: None }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [Spoof] }) local_addr = 127.0.0.1:50372 method = POST remote_addr = 127.0.0.1:38658 req_id = 2c4023ef-c6a2-448b-9a04-47ec3b9e1661 uri = /v1/projects
43802026-01-27T01:14:07.950ZTRACtest_vpcs (dropshot_external): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true local_addr = 127.0.0.1:50372 method = POST remote_addr = 127.0.0.1:38658 req_id = 2c4023ef-c6a2-448b-9a04-47ec3b9e1661 resource = AuditLog silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user uri = /v1/projects
43812026-01-27T01:14:07.951ZTRACtest_vpcs (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. } authenticated = true local_addr = 127.0.0.1:50372 method = POST remote_addr = 127.0.0.1:38658 req_id = 2c4023ef-c6a2-448b-9a04-47ec3b9e1661 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user uri = /v1/projects
43822026-01-27T01:14:07.951ZTRACtest_vpcs (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true local_addr = 127.0.0.1:50372 method = POST remote_addr = 127.0.0.1:38658 req_id = 2c4023ef-c6a2-448b-9a04-47ec3b9e1661 resource = Database silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user uri = /v1/projects
43832026-01-27T01:14:07.951ZDEBGtest_vpcs (dropshot_external): roles authenticated = true local_addr = 127.0.0.1:50372 method = POST remote_addr = 127.0.0.1:38658 req_id = 2c4023ef-c6a2-448b-9a04-47ec3b9e1661 roles = RoleSet { roles: {} } silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user uri = /v1/projects
43842026-01-27T01:14:07.952ZDEBGtest_vpcs (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true local_addr = 127.0.0.1:50372 method = POST remote_addr = 127.0.0.1:38658 req_id = 2c4023ef-c6a2-448b-9a04-47ec3b9e1661 resource = Database result = Ok(()) silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user uri = /v1/projects
43852026-01-27T01:14:07.960ZDEBGtest_vpcs (dropshot_external): roles authenticated = true local_addr = 127.0.0.1:50372 method = POST remote_addr = 127.0.0.1:38658 req_id = 2c4023ef-c6a2-448b-9a04-47ec3b9e1661 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} } silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user uri = /v1/projects
43862026-01-27T01:14:07.963ZDEBGtest_vpcs (dropshot_external): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true local_addr = 127.0.0.1:50372 method = POST remote_addr = 127.0.0.1:38658 req_id = 2c4023ef-c6a2-448b-9a04-47ec3b9e1661 resource = AuditLog result = Ok(()) silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user uri = /v1/projects
43872026-01-27T01:14:07.963ZTRACtest_vpcs (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true local_addr = 127.0.0.1:50372 method = POST remote_addr = 127.0.0.1:38658 req_id = 2c4023ef-c6a2-448b-9a04-47ec3b9e1661 resource = Database silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user uri = /v1/projects
43882026-01-27T01:14:07.963ZDEBGtest_vpcs (dropshot_external): roles authenticated = true local_addr = 127.0.0.1:50372 method = POST remote_addr = 127.0.0.1:38658 req_id = 2c4023ef-c6a2-448b-9a04-47ec3b9e1661 roles = RoleSet { roles: {} } silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user uri = /v1/projects
43892026-01-27T01:14:07.964ZDEBGtest_vpcs (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true local_addr = 127.0.0.1:50372 method = POST remote_addr = 127.0.0.1:38658 req_id = 2c4023ef-c6a2-448b-9a04-47ec3b9e1661 resource = Database result = Ok(()) silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user uri = /v1/projects
43902026-01-27T01:14:07.969ZTRACtest_vpcs (dropshot_external): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true local_addr = 127.0.0.1:50372 method = POST remote_addr = 127.0.0.1:38658 req_id = 2c4023ef-c6a2-448b-9a04-47ec3b9e1661 resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user uri = /v1/projects
43912026-01-27T01:14:07.969ZTRACtest_vpcs (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. } authenticated = true local_addr = 127.0.0.1:50372 method = POST remote_addr = 127.0.0.1:38658 req_id = 2c4023ef-c6a2-448b-9a04-47ec3b9e1661 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user uri = /v1/projects
43922026-01-27T01:14:07.969ZTRACtest_vpcs (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true local_addr = 127.0.0.1:50372 method = POST remote_addr = 127.0.0.1:38658 req_id = 2c4023ef-c6a2-448b-9a04-47ec3b9e1661 resource = Database silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user uri = /v1/projects
43932026-01-27T01:14:07.969ZDEBGtest_vpcs (dropshot_external): roles authenticated = true local_addr = 127.0.0.1:50372 method = POST remote_addr = 127.0.0.1:38658 req_id = 2c4023ef-c6a2-448b-9a04-47ec3b9e1661 roles = RoleSet { roles: {} } silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user uri = /v1/projects
43942026-01-27T01:14:07.970ZDEBGtest_vpcs (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true local_addr = 127.0.0.1:50372 method = POST remote_addr = 127.0.0.1:38658 req_id = 2c4023ef-c6a2-448b-9a04-47ec3b9e1661 resource = Database result = Ok(()) silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user uri = /v1/projects
43952026-01-27T01:14:07.976ZTRACtest_vpcs (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. } authenticated = true local_addr = 127.0.0.1:50372 method = POST remote_addr = 127.0.0.1:38658 req_id = 2c4023ef-c6a2-448b-9a04-47ec3b9e1661 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user uri = /v1/projects
43962026-01-27T01:14:07.976ZTRACtest_vpcs (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true local_addr = 127.0.0.1:50372 method = POST remote_addr = 127.0.0.1:38658 req_id = 2c4023ef-c6a2-448b-9a04-47ec3b9e1661 resource = Database silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user uri = /v1/projects
43972026-01-27T01:14:07.976ZDEBGtest_vpcs (dropshot_external): roles authenticated = true local_addr = 127.0.0.1:50372 method = POST remote_addr = 127.0.0.1:38658 req_id = 2c4023ef-c6a2-448b-9a04-47ec3b9e1661 roles = RoleSet { roles: {} } silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user uri = /v1/projects
43982026-01-27T01:14:07.977ZDEBGtest_vpcs (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true local_addr = 127.0.0.1:50372 method = POST remote_addr = 127.0.0.1:38658 req_id = 2c4023ef-c6a2-448b-9a04-47ec3b9e1661 resource = Database result = Ok(()) silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user uri = /v1/projects
43992026-01-27T01:14:07.982ZDEBGtest_vpcs (dropshot_external): roles authenticated = true local_addr = 127.0.0.1:50372 method = POST remote_addr = 127.0.0.1:38658 req_id = 2c4023ef-c6a2-448b-9a04-47ec3b9e1661 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user uri = /v1/projects
44002026-01-27T01:14:07.987ZDEBGtest_vpcs (dropshot_external): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true local_addr = 127.0.0.1:50372 method = POST remote_addr = 127.0.0.1:38658 req_id = 2c4023ef-c6a2-448b-9a04-47ec3b9e1661 resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(()) silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user uri = /v1/projects
44012026-01-27T01:14:07.988ZINFOtest_vpcs (SagaQuiesceHandle): tracking newly created saga saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
44022026-01-27T01:14:07.988ZINFOtest_vpcs (SagaExecutor): preparing saga saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11 saga_name = project-create
44032026-01-27T01:14:07.988ZINFOtest_vpcs (SEC): saga create dag = {"end_node":21,"graph":{"edge_property":"directed","edges":[[0,1,null],[1,2,null],[3,4,null],[4,5,null],[5,6,null],[6,7,null],[7,8,null],[8,9,null],[9,10,null],[10,11,null],[11,12,null],[12,13,null],[13,14,null],[14,15,null],[15,16,null],[16,17,null],[17,18,null],[2,3,null],[18,19,null],[20,0,null],[19,21,null]],"node_holes":[],"nodes":[{"Action":{"action_name":"project_create.project_create_record","label":"ProjectCreateRecord","name":"project"}},{"Action":{"action_name":"project_create.project_create_vpc_params","label":"ProjectCreateVpcParams","name":"vpc_create_params"}},{"SubsagaStart":{"params_node_name":"vpc_create_params","saga_name":"vpc-create"}},{"Action":{"action_name":"common.uuid_generate","label":"GenerateVpcId","name":"vpc_id"}},{"Action":{"action_name":"common.uuid_generate","label":"GenerateSystemRouterId","name":"system_router_id"}},{"Action":{"action_name":"common.uuid_generate","label":"GenerateDefaultV4RouteId","name":"default_v4_route_id"}},{"Action":{"action_name":"common.uuid_generate","label":"GenerateDefaultV6RouteId","name":"default_v6_route_id"}},{"Action":{"action_name":"common.uuid_generate","label":"GenerateSubnetRouteId","name":"subnet_route_id"}},{"Action":{"action_name":"common.uuid_generate","label":"GenerateDefaultSubnetId","name":"default_subnet_id"}},{"Action":{"action_name":"common.uuid_generate","label":"GenerateDefaultInternetGatewayId","name":"default_internet_gateway_id"}},{"Action":{"action_name":"vpc_create.vpc_create_vpc","label":"VpcCreateVpc","name":"vpc"}},{"Action":{"action_name":"vpc_create.vpc_create_router","label":"VpcCreateRouter","name":"router"}},{"Action":{"action_name":"vpc_create.vpc_create_v4_route","label":"VpcCreateV4Route","name":"route4"}},{"Action":{"action_name":"vpc_create.vpc_create_v6_route","label":"VpcCreateV6Route","name":"route6"}},{"Action":{"action_name":"vpc_create.vpc_create_subnet","label":"VpcCreateSubnet","name":"subnet"}},{"Action":{"action_name":"vpc_create.vpc_create_subnet_route","label":"VpcCreateSubnetRoute","name":"route"}},{"Action":{"action_name":"vpc_create.vpc_update_firewall","label":"VpcUpdateFirewall","name":"firewall"}},{"Action":{"action_name":"vpc_create.vpc_create_gateway","label":"VpcCreateGateway","name":"gateway"}},{"Action":{"action_name":"vpc_create.vpc_notify_sleds","label":"VpcNotifySleds","name":"no_result"}},{"SubsagaEnd":{"name":"vpc"}},{"Start":{"params":{"authz_silo":{"key":"001de000-5110-4000-8000-000000000000","lookup_type":{"ById":"001de000-5110-4000-8000-000000000000"},"parent":null},"project_create":{"description":"a pier","name":"peeky-park"},"serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}},"credential_id":null,"device_token_expiration":null},{"mapped_fleet_roles":{}}]}}}}},"End"]},"saga_name":"project-create","start_node":20} saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11 saga_name = project-create sec_id = 913233fe-92a8-4635-9572-183f495429c4
44042026-01-27T01:14:07.988ZINFOtest_vpcs (SecStore): creating saga saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11 saga_name = project-create
44052026-01-27T01:14:07.994ZINFOtest_vpcs (SagaExecutor): starting saga saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11 saga_name = project-create
44062026-01-27T01:14:07.994ZINFOtest_vpcs (SEC): saga start saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11 saga_name = project-create sec_id = 913233fe-92a8-4635-9572-183f495429c4
44072026-01-27T01:14:07.994ZDEBGtest_vpcs (SEC): saga log event new_state = N020 started sec_id = 913233fe-92a8-4635-9572-183f495429c4
44082026-01-27T01:14:07.994ZDEBGtest_vpcs (SecStore): recording saga event event_type = Started node_id = 20 saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
44092026-01-27T01:14:07.999ZDEBGtest_vpcs (SEC): saga log event new_state = N020 succeeded sec_id = 913233fe-92a8-4635-9572-183f495429c4
44102026-01-27T01:14:07.999ZDEBGtest_vpcs (SecStore): recording saga event event_type = Succeeded(Null) node_id = 20 saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
44112026-01-27T01:14:08.005ZDEBGtest_vpcs (SEC): saga log event new_state = N000 started sec_id = 913233fe-92a8-4635-9572-183f495429c4
44122026-01-27T01:14:08.005ZDEBGtest_vpcs (SecStore): recording saga event event_type = Started node_id = 0 saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
44132026-01-27T01:14:08.010ZTRACtest_vpcs (SagaExecutor): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11 saga_name = project-create saga_node = ProjectCreateRecord silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
44142026-01-27T01:14:08.010ZTRACtest_vpcs (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. } authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11 saga_name = project-create saga_node = ProjectCreateRecord silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
44152026-01-27T01:14:08.010ZTRACtest_vpcs (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11 saga_name = project-create saga_node = ProjectCreateRecord silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
44162026-01-27T01:14:08.010ZDEBGtest_vpcs (SagaExecutor): roles authenticated = true roles = RoleSet { roles: {} } saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11 saga_name = project-create saga_node = ProjectCreateRecord silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
44172026-01-27T01:14:08.011ZDEBGtest_vpcs (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database result = Ok(()) saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11 saga_name = project-create saga_node = ProjectCreateRecord silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
44182026-01-27T01:14:08.017ZTRACtest_vpcs (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. } authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11 saga_name = project-create saga_node = ProjectCreateRecord silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
44192026-01-27T01:14:08.017ZTRACtest_vpcs (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11 saga_name = project-create saga_node = ProjectCreateRecord silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
44202026-01-27T01:14:08.017ZDEBGtest_vpcs (SagaExecutor): roles authenticated = true roles = RoleSet { roles: {} } saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11 saga_name = project-create saga_node = ProjectCreateRecord silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
44212026-01-27T01:14:08.018ZDEBGtest_vpcs (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database result = Ok(()) saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11 saga_name = project-create saga_node = ProjectCreateRecord silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
44222026-01-27T01:14:08.023ZDEBGtest_vpcs (SagaExecutor): roles authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11 saga_name = project-create saga_node = ProjectCreateRecord silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
44232026-01-27T01:14:08.029ZDEBGtest_vpcs (SagaExecutor): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(()) saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11 saga_name = project-create saga_node = ProjectCreateRecord silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
44242026-01-27T01:14:08.029ZTRACtest_vpcs (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11 saga_name = project-create saga_node = ProjectCreateRecord silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
44252026-01-27T01:14:08.030ZDEBGtest_vpcs (SagaExecutor): roles authenticated = true roles = RoleSet { roles: {} } saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11 saga_name = project-create saga_node = ProjectCreateRecord silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
44262026-01-27T01:14:08.030ZDEBGtest_vpcs (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database result = Ok(()) saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11 saga_name = project-create saga_node = ProjectCreateRecord silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
44272026-01-27T01:14:08.048ZDEBGtest_vpcs (SEC): saga log event new_state = N000 succeeded sec_id = 913233fe-92a8-4635-9572-183f495429c4
44282026-01-27T01:14:08.048ZDEBGtest_vpcs (SecStore): recording saga event event_type = Succeeded(Array [Object {"key": String("87aaa4f1-0672-47bd-b399-8861de8da8e7"), "lookup_type": Object {"ByName": String("peeky-park")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}, Object {"identity": Object {"description": String("a pier"), "id": String("87aaa4f1-0672-47bd-b399-8861de8da8e7"), "name": String("peeky-park"), "time_created": String("2026-01-27T01:14:08.010405Z"), "time_deleted": Null, "time_modified": String("2026-01-27T01:14:08.010405Z")}, "rcgen": Number(1), "silo_id": String("001de000-5110-4000-8000-000000000000")}]) node_id = 0 saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
44292026-01-27T01:14:08.054ZDEBGtest_vpcs (SEC): saga log event new_state = N001 started sec_id = 913233fe-92a8-4635-9572-183f495429c4
44302026-01-27T01:14:08.054ZDEBGtest_vpcs (SecStore): recording saga event event_type = Started node_id = 1 saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
44312026-01-27T01:14:08.060ZDEBGtest_vpcs (SEC): saga log event new_state = N001 succeeded sec_id = 913233fe-92a8-4635-9572-183f495429c4
44322026-01-27T01:14:08.060ZDEBGtest_vpcs (SecStore): recording saga event event_type = Succeeded(Object {"authz_project": Object {"key": String("87aaa4f1-0672-47bd-b399-8861de8da8e7"), "lookup_type": Object {"ByName": String("peeky-park")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}, "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}, "credential_id": Null, "device_token_expiration": Null}, Object {"mapped_fleet_roles": Object {}}]}}, "vpc_create": Object {"description": String("Default VPC"), "dns_name": String("default"), "ipv6_prefix": String("fd4f:f905:66ff::/48"), "name": String("default")}}) node_id = 1 saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
44332026-01-27T01:14:08.065ZDEBGtest_vpcs (SEC): saga log event new_state = N002 started sec_id = 913233fe-92a8-4635-9572-183f495429c4
44342026-01-27T01:14:08.065ZDEBGtest_vpcs (SecStore): recording saga event event_type = Started node_id = 2 saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
44352026-01-27T01:14:08.072ZDEBGtest_vpcs (SEC): saga log event new_state = N002 succeeded sec_id = 913233fe-92a8-4635-9572-183f495429c4
44362026-01-27T01:14:08.072ZDEBGtest_vpcs (SecStore): recording saga event event_type = Succeeded(Null) node_id = 2 saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
44372026-01-27T01:14:08.078ZDEBGtest_vpcs (SEC): saga log event new_state = N003 started sec_id = 913233fe-92a8-4635-9572-183f495429c4
44382026-01-27T01:14:08.078ZDEBGtest_vpcs (SecStore): recording saga event event_type = Started node_id = 3 saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
44392026-01-27T01:14:08.084ZDEBGtest_vpcs (SEC): saga log event new_state = N003 succeeded sec_id = 913233fe-92a8-4635-9572-183f495429c4
44402026-01-27T01:14:08.084ZDEBGtest_vpcs (SecStore): recording saga event event_type = Succeeded(String("f8e83d21-ccf9-418f-8d28-ef8fd953b403")) node_id = 3 saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
44412026-01-27T01:14:08.089ZDEBGtest_vpcs (SEC): saga log event new_state = N004 started sec_id = 913233fe-92a8-4635-9572-183f495429c4
44422026-01-27T01:14:08.089ZDEBGtest_vpcs (SecStore): recording saga event event_type = Started node_id = 4 saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
44432026-01-27T01:14:08.095ZDEBGtest_vpcs (SEC): saga log event new_state = N004 succeeded sec_id = 913233fe-92a8-4635-9572-183f495429c4
44442026-01-27T01:14:08.095ZDEBGtest_vpcs (SecStore): recording saga event event_type = Succeeded(String("6f241441-d4fd-4437-8ab8-d9c03a5832e5")) node_id = 4 saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
44452026-01-27T01:14:08.100ZDEBGtest_vpcs (SEC): saga log event new_state = N005 started sec_id = 913233fe-92a8-4635-9572-183f495429c4
44462026-01-27T01:14:08.100ZDEBGtest_vpcs (SecStore): recording saga event event_type = Started node_id = 5 saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
44472026-01-27T01:14:08.116ZDEBGtest_vpcs (SEC): saga log event new_state = N005 succeeded sec_id = 913233fe-92a8-4635-9572-183f495429c4
44482026-01-27T01:14:08.116ZDEBGtest_vpcs (SecStore): recording saga event event_type = Succeeded(String("a5817081-3c59-4ea3-bdad-a2d0ab0a5ba8")) node_id = 5 saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
44492026-01-27T01:14:08.122ZDEBGtest_vpcs (SEC): saga log event new_state = N006 started sec_id = 913233fe-92a8-4635-9572-183f495429c4
44502026-01-27T01:14:08.122ZDEBGtest_vpcs (SecStore): recording saga event event_type = Started node_id = 6 saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
44512026-01-27T01:14:08.127ZDEBGtest_vpcs (SEC): saga log event new_state = N006 succeeded sec_id = 913233fe-92a8-4635-9572-183f495429c4
44522026-01-27T01:14:08.127ZDEBGtest_vpcs (SecStore): recording saga event event_type = Succeeded(String("658602dc-bb9c-41aa-a110-25ca7f2e4f51")) node_id = 6 saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
44532026-01-27T01:14:08.132ZDEBGtest_vpcs (SEC): saga log event new_state = N007 started sec_id = 913233fe-92a8-4635-9572-183f495429c4
44542026-01-27T01:14:08.132ZDEBGtest_vpcs (SecStore): recording saga event event_type = Started node_id = 7 saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
44552026-01-27T01:14:08.137ZDEBGtest_vpcs (SEC): saga log event new_state = N007 succeeded sec_id = 913233fe-92a8-4635-9572-183f495429c4
44562026-01-27T01:14:08.137ZDEBGtest_vpcs (SecStore): recording saga event event_type = Succeeded(String("1a75a3ca-5545-42be-b4cb-8883d818a039")) node_id = 7 saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
44572026-01-27T01:14:08.142ZDEBGtest_vpcs (SEC): saga log event new_state = N008 started sec_id = 913233fe-92a8-4635-9572-183f495429c4
44582026-01-27T01:14:08.143ZDEBGtest_vpcs (SecStore): recording saga event event_type = Started node_id = 8 saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
44592026-01-27T01:14:08.147ZDEBGtest_vpcs (SEC): saga log event new_state = N008 succeeded sec_id = 913233fe-92a8-4635-9572-183f495429c4
44602026-01-27T01:14:08.147ZDEBGtest_vpcs (SecStore): recording saga event event_type = Succeeded(String("0d13bfa0-224d-4f5f-872e-6bda5c7f29ea")) node_id = 8 saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
44612026-01-27T01:14:08.153ZDEBGtest_vpcs (SEC): saga log event new_state = N009 started sec_id = 913233fe-92a8-4635-9572-183f495429c4
44622026-01-27T01:14:08.153ZDEBGtest_vpcs (SecStore): recording saga event event_type = Started node_id = 9 saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
44632026-01-27T01:14:08.159ZDEBGtest_vpcs (SEC): saga log event new_state = N009 succeeded sec_id = 913233fe-92a8-4635-9572-183f495429c4
44642026-01-27T01:14:08.159ZDEBGtest_vpcs (SecStore): recording saga event event_type = Succeeded(String("1579c14d-e5cd-40f7-a168-ce2924cd16a7")) node_id = 9 saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
44652026-01-27T01:14:08.165ZDEBGtest_vpcs (SEC): saga log event new_state = N010 started sec_id = 913233fe-92a8-4635-9572-183f495429c4
44662026-01-27T01:14:08.165ZDEBGtest_vpcs (SecStore): recording saga event event_type = Started node_id = 10 saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
44672026-01-27T01:14:08.171ZTRACtest_vpcs (SagaExecutor): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 87aaa4f1-0672-47bd-b399-8861de8da8e7, lookup_type: ByName("peeky-park") } saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11 saga_name = project-create saga_node = VpcCreateVpc silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
44682026-01-27T01:14:08.171ZTRACtest_vpcs (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. } authenticated = true resource_id = 87aaa4f1-0672-47bd-b399-8861de8da8e7 resource_type = Project saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11 saga_name = project-create saga_node = VpcCreateVpc silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
44692026-01-27T01:14:08.171ZTRACtest_vpcs (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11 saga_name = project-create saga_node = VpcCreateVpc silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
44702026-01-27T01:14:08.171ZDEBGtest_vpcs (SagaExecutor): roles authenticated = true roles = RoleSet { roles: {} } saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11 saga_name = project-create saga_node = VpcCreateVpc silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
44712026-01-27T01:14:08.172ZDEBGtest_vpcs (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database result = Ok(()) saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11 saga_name = project-create saga_node = VpcCreateVpc silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
44722026-01-27T01:14:08.177ZTRACtest_vpcs (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. } authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11 saga_name = project-create saga_node = VpcCreateVpc silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
44732026-01-27T01:14:08.178ZTRACtest_vpcs (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11 saga_name = project-create saga_node = VpcCreateVpc silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
44742026-01-27T01:14:08.178ZDEBGtest_vpcs (SagaExecutor): roles authenticated = true roles = RoleSet { roles: {} } saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11 saga_name = project-create saga_node = VpcCreateVpc silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
44752026-01-27T01:14:08.179ZDEBGtest_vpcs (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database result = Ok(()) saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11 saga_name = project-create saga_node = VpcCreateVpc silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
44762026-01-27T01:14:08.185ZTRACtest_vpcs (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. } authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11 saga_name = project-create saga_node = VpcCreateVpc silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
44772026-01-27T01:14:08.185ZTRACtest_vpcs (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11 saga_name = project-create saga_node = VpcCreateVpc silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
44782026-01-27T01:14:08.185ZDEBGtest_vpcs (SagaExecutor): roles authenticated = true roles = RoleSet { roles: {} } saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11 saga_name = project-create saga_node = VpcCreateVpc silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
44792026-01-27T01:14:08.187ZDEBGtest_vpcs (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database result = Ok(()) saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11 saga_name = project-create saga_node = VpcCreateVpc silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
44802026-01-27T01:14:08.193ZDEBGtest_vpcs (SagaExecutor): roles authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11 saga_name = project-create saga_node = VpcCreateVpc silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
44812026-01-27T01:14:08.202ZDEBGtest_vpcs (SagaExecutor): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 87aaa4f1-0672-47bd-b399-8861de8da8e7, lookup_type: ByName("peeky-park") } result = Ok(()) saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11 saga_name = project-create saga_node = VpcCreateVpc silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
44822026-01-27T01:14:08.202ZTRACtest_vpcs (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11 saga_name = project-create saga_node = VpcCreateVpc silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
44832026-01-27T01:14:08.202ZDEBGtest_vpcs (SagaExecutor): roles authenticated = true roles = RoleSet { roles: {} } saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11 saga_name = project-create saga_node = VpcCreateVpc silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
44842026-01-27T01:14:08.202ZDEBGtest_vpcs (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database result = Ok(()) saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11 saga_name = project-create saga_node = VpcCreateVpc silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
44852026-01-27T01:14:08.215ZDEBGtest_vpcs (SEC): saga log event new_state = N010 succeeded sec_id = 913233fe-92a8-4635-9572-183f495429c4
44862026-01-27T01:14:08.215ZDEBGtest_vpcs (SecStore): recording saga event event_type = Succeeded(Array [Object {"key": String("f8e83d21-ccf9-418f-8d28-ef8fd953b403"), "lookup_type": Object {"ByName": String("default")}, "parent": Object {"key": String("87aaa4f1-0672-47bd-b399-8861de8da8e7"), "lookup_type": Object {"ByName": String("peeky-park")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}}, Object {"dns_name": String("default"), "firewall_gen": Number(1), "identity": Object {"description": String("Default VPC"), "id": String("f8e83d21-ccf9-418f-8d28-ef8fd953b403"), "name": String("default"), "time_created": String("2026-01-27T01:14:08.171344Z"), "time_deleted": Null, "time_modified": String("2026-01-27T01:14:08.171344Z")}, "ipv6_prefix": String("fd4f:f905:66ff::/48"), "project_id": String("87aaa4f1-0672-47bd-b399-8861de8da8e7"), "subnet_gen": Number(1), "system_router_id": String("6f241441-d4fd-4437-8ab8-d9c03a5832e5"), "vni": Number(9338389)}]) node_id = 10 saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
44872026-01-27T01:14:08.223ZDEBGtest_vpcs (SEC): saga log event new_state = N011 started sec_id = 913233fe-92a8-4635-9572-183f495429c4
44882026-01-27T01:14:08.223ZDEBGtest_vpcs (SecStore): recording saga event event_type = Started node_id = 11 saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
44892026-01-27T01:14:08.230ZTRACtest_vpcs (SagaExecutor): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 87aaa4f1-0672-47bd-b399-8861de8da8e7, lookup_type: ByName("peeky-park") }, key: f8e83d21-ccf9-418f-8d28-ef8fd953b403, lookup_type: ByName("default") } saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11 saga_name = project-create saga_node = VpcCreateRouter silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
44902026-01-27T01:14:08.231ZTRACtest_vpcs (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. } authenticated = true resource_id = 87aaa4f1-0672-47bd-b399-8861de8da8e7 resource_type = Project saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11 saga_name = project-create saga_node = VpcCreateRouter silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
44912026-01-27T01:14:08.231ZTRACtest_vpcs (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11 saga_name = project-create saga_node = VpcCreateRouter silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
44922026-01-27T01:14:08.231ZDEBGtest_vpcs (SagaExecutor): roles authenticated = true roles = RoleSet { roles: {} } saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11 saga_name = project-create saga_node = VpcCreateRouter silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
44932026-01-27T01:14:08.233ZDEBGtest_vpcs (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database result = Ok(()) saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11 saga_name = project-create saga_node = VpcCreateRouter silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
44942026-01-27T01:14:08.239ZTRACtest_vpcs (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. } authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11 saga_name = project-create saga_node = VpcCreateRouter silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
44952026-01-27T01:14:08.239ZTRACtest_vpcs (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11 saga_name = project-create saga_node = VpcCreateRouter silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
44962026-01-27T01:14:08.239ZDEBGtest_vpcs (SagaExecutor): roles authenticated = true roles = RoleSet { roles: {} } saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11 saga_name = project-create saga_node = VpcCreateRouter silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
44972026-01-27T01:14:08.240ZDEBGtest_vpcs (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database result = Ok(()) saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11 saga_name = project-create saga_node = VpcCreateRouter silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
44982026-01-27T01:14:08.250ZTRACtest_vpcs (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. } authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11 saga_name = project-create saga_node = VpcCreateRouter silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
44992026-01-27T01:14:08.250ZTRACtest_vpcs (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11 saga_name = project-create saga_node = VpcCreateRouter silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
45002026-01-27T01:14:08.250ZDEBGtest_vpcs (SagaExecutor): roles authenticated = true roles = RoleSet { roles: {} } saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11 saga_name = project-create saga_node = VpcCreateRouter silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
45012026-01-27T01:14:08.251ZDEBGtest_vpcs (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database result = Ok(()) saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11 saga_name = project-create saga_node = VpcCreateRouter silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
45022026-01-27T01:14:08.257ZDEBGtest_vpcs (SagaExecutor): roles authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11 saga_name = project-create saga_node = VpcCreateRouter silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
45032026-01-27T01:14:08.267ZDEBGtest_vpcs (SagaExecutor): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 87aaa4f1-0672-47bd-b399-8861de8da8e7, lookup_type: ByName("peeky-park") }, key: f8e83d21-ccf9-418f-8d28-ef8fd953b403, lookup_type: ByName("default") } result = Ok(()) saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11 saga_name = project-create saga_node = VpcCreateRouter silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
45042026-01-27T01:14:08.267ZTRACtest_vpcs (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11 saga_name = project-create saga_node = VpcCreateRouter silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
45052026-01-27T01:14:08.267ZDEBGtest_vpcs (SagaExecutor): roles authenticated = true roles = RoleSet { roles: {} } saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11 saga_name = project-create saga_node = VpcCreateRouter silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
45062026-01-27T01:14:08.268ZDEBGtest_vpcs (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database result = Ok(()) saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11 saga_name = project-create saga_node = VpcCreateRouter silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
45072026-01-27T01:14:08.338ZDEBGtest_vpcs (SEC): saga log event new_state = N011 succeeded sec_id = 913233fe-92a8-4635-9572-183f495429c4
45082026-01-27T01:14:08.338ZDEBGtest_vpcs (SecStore): recording saga event event_type = Succeeded(Object {"key": String("6f241441-d4fd-4437-8ab8-d9c03a5832e5"), "lookup_type": Object {"ById": String("6f241441-d4fd-4437-8ab8-d9c03a5832e5")}, "parent": Object {"key": String("f8e83d21-ccf9-418f-8d28-ef8fd953b403"), "lookup_type": Object {"ByName": String("default")}, "parent": Object {"key": String("87aaa4f1-0672-47bd-b399-8861de8da8e7"), "lookup_type": Object {"ByName": String("peeky-park")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}}}) node_id = 11 saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
45092026-01-27T01:14:08.355ZDEBGtest_vpcs (SEC): saga log event new_state = N012 started sec_id = 913233fe-92a8-4635-9572-183f495429c4
45102026-01-27T01:14:08.356ZDEBGtest_vpcs (SecStore): recording saga event event_type = Started node_id = 12 saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
45112026-01-27T01:14:08.362ZTRACtest_vpcs (SagaExecutor): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 87aaa4f1-0672-47bd-b399-8861de8da8e7, lookup_type: ByName("peeky-park") }, key: f8e83d21-ccf9-418f-8d28-ef8fd953b403, lookup_type: ByName("default") }, key: 6f241441-d4fd-4437-8ab8-d9c03a5832e5, lookup_type: ById(6f241441-d4fd-4437-8ab8-d9c03a5832e5) } saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11 saga_name = project-create saga_node = VpcCreateV4Route silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
45122026-01-27T01:14:08.362ZTRACtest_vpcs (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. } authenticated = true resource_id = 87aaa4f1-0672-47bd-b399-8861de8da8e7 resource_type = Project saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11 saga_name = project-create saga_node = VpcCreateV4Route silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
45132026-01-27T01:14:08.362ZTRACtest_vpcs (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11 saga_name = project-create saga_node = VpcCreateV4Route silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
45142026-01-27T01:14:08.362ZDEBGtest_vpcs (SagaExecutor): roles authenticated = true roles = RoleSet { roles: {} } saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11 saga_name = project-create saga_node = VpcCreateV4Route silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
45152026-01-27T01:14:08.363ZDEBGtest_vpcs (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database result = Ok(()) saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11 saga_name = project-create saga_node = VpcCreateV4Route silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
45162026-01-27T01:14:08.369ZTRACtest_vpcs (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. } authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11 saga_name = project-create saga_node = VpcCreateV4Route silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
45172026-01-27T01:14:08.369ZTRACtest_vpcs (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11 saga_name = project-create saga_node = VpcCreateV4Route silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
45182026-01-27T01:14:08.369ZDEBGtest_vpcs (SagaExecutor): roles authenticated = true roles = RoleSet { roles: {} } saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11 saga_name = project-create saga_node = VpcCreateV4Route silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
45192026-01-27T01:14:08.370ZDEBGtest_vpcs (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database result = Ok(()) saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11 saga_name = project-create saga_node = VpcCreateV4Route silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
45202026-01-27T01:14:08.376ZTRACtest_vpcs (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. } authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11 saga_name = project-create saga_node = VpcCreateV4Route silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
45212026-01-27T01:14:08.376ZTRACtest_vpcs (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11 saga_name = project-create saga_node = VpcCreateV4Route silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
45222026-01-27T01:14:08.376ZDEBGtest_vpcs (SagaExecutor): roles authenticated = true roles = RoleSet { roles: {} } saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11 saga_name = project-create saga_node = VpcCreateV4Route silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
45232026-01-27T01:14:08.377ZDEBGtest_vpcs (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database result = Ok(()) saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11 saga_name = project-create saga_node = VpcCreateV4Route silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
45242026-01-27T01:14:08.382ZDEBGtest_vpcs (SagaExecutor): roles authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11 saga_name = project-create saga_node = VpcCreateV4Route silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
45252026-01-27T01:14:08.394ZDEBGtest_vpcs (SagaExecutor): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 87aaa4f1-0672-47bd-b399-8861de8da8e7, lookup_type: ByName("peeky-park") }, key: f8e83d21-ccf9-418f-8d28-ef8fd953b403, lookup_type: ByName("default") }, key: 6f241441-d4fd-4437-8ab8-d9c03a5832e5, lookup_type: ById(6f241441-d4fd-4437-8ab8-d9c03a5832e5) } result = Ok(()) saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11 saga_name = project-create saga_node = VpcCreateV4Route silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
45262026-01-27T01:14:08.394ZTRACtest_vpcs (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11 saga_name = project-create saga_node = VpcCreateV4Route silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
45272026-01-27T01:14:08.394ZDEBGtest_vpcs (SagaExecutor): roles authenticated = true roles = RoleSet { roles: {} } saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11 saga_name = project-create saga_node = VpcCreateV4Route silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
45282026-01-27T01:14:08.394ZDEBGtest_vpcs (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database result = Ok(()) saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11 saga_name = project-create saga_node = VpcCreateV4Route silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
45292026-01-27T01:14:08.403ZDEBGtest_vpcs (SEC): saga log event new_state = N012 succeeded sec_id = 913233fe-92a8-4635-9572-183f495429c4
45302026-01-27T01:14:08.403ZDEBGtest_vpcs (SecStore): recording saga event event_type = Succeeded(Null) node_id = 12 saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
45312026-01-27T01:14:08.409ZDEBGtest_vpcs (SEC): saga log event new_state = N013 started sec_id = 913233fe-92a8-4635-9572-183f495429c4
45322026-01-27T01:14:08.410ZDEBGtest_vpcs (SecStore): recording saga event event_type = Started node_id = 13 saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
45332026-01-27T01:14:08.414ZTRACtest_vpcs (SagaExecutor): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 87aaa4f1-0672-47bd-b399-8861de8da8e7, lookup_type: ByName("peeky-park") }, key: f8e83d21-ccf9-418f-8d28-ef8fd953b403, lookup_type: ByName("default") }, key: 6f241441-d4fd-4437-8ab8-d9c03a5832e5, lookup_type: ById(6f241441-d4fd-4437-8ab8-d9c03a5832e5) } saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11 saga_name = project-create saga_node = VpcCreateV6Route silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
45342026-01-27T01:14:08.415ZTRACtest_vpcs (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. } authenticated = true resource_id = 87aaa4f1-0672-47bd-b399-8861de8da8e7 resource_type = Project saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11 saga_name = project-create saga_node = VpcCreateV6Route silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
45352026-01-27T01:14:08.415ZTRACtest_vpcs (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11 saga_name = project-create saga_node = VpcCreateV6Route silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
45362026-01-27T01:14:08.416ZDEBGtest_vpcs (SagaExecutor): roles authenticated = true roles = RoleSet { roles: {} } saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11 saga_name = project-create saga_node = VpcCreateV6Route silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
45372026-01-27T01:14:08.417ZDEBGtest_vpcs (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database result = Ok(()) saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11 saga_name = project-create saga_node = VpcCreateV6Route silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
45382026-01-27T01:14:08.423ZTRACtest_vpcs (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. } authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11 saga_name = project-create saga_node = VpcCreateV6Route silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
45392026-01-27T01:14:08.423ZTRACtest_vpcs (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11 saga_name = project-create saga_node = VpcCreateV6Route silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
45402026-01-27T01:14:08.423ZDEBGtest_vpcs (SagaExecutor): roles authenticated = true roles = RoleSet { roles: {} } saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11 saga_name = project-create saga_node = VpcCreateV6Route silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
45412026-01-27T01:14:08.425ZDEBGtest_vpcs (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database result = Ok(()) saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11 saga_name = project-create saga_node = VpcCreateV6Route silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
45422026-01-27T01:14:08.432ZTRACtest_vpcs (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. } authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11 saga_name = project-create saga_node = VpcCreateV6Route silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
45432026-01-27T01:14:08.432ZTRACtest_vpcs (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11 saga_name = project-create saga_node = VpcCreateV6Route silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
45442026-01-27T01:14:08.432ZDEBGtest_vpcs (SagaExecutor): roles authenticated = true roles = RoleSet { roles: {} } saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11 saga_name = project-create saga_node = VpcCreateV6Route silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
45452026-01-27T01:14:08.433ZDEBGtest_vpcs (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database result = Ok(()) saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11 saga_name = project-create saga_node = VpcCreateV6Route silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
45462026-01-27T01:14:08.439ZDEBGtest_vpcs (SagaExecutor): roles authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11 saga_name = project-create saga_node = VpcCreateV6Route silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
45472026-01-27T01:14:08.449ZDEBGtest_vpcs (SagaExecutor): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 87aaa4f1-0672-47bd-b399-8861de8da8e7, lookup_type: ByName("peeky-park") }, key: f8e83d21-ccf9-418f-8d28-ef8fd953b403, lookup_type: ByName("default") }, key: 6f241441-d4fd-4437-8ab8-d9c03a5832e5, lookup_type: ById(6f241441-d4fd-4437-8ab8-d9c03a5832e5) } result = Ok(()) saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11 saga_name = project-create saga_node = VpcCreateV6Route silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
45482026-01-27T01:14:08.449ZTRACtest_vpcs (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11 saga_name = project-create saga_node = VpcCreateV6Route silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
45492026-01-27T01:14:08.449ZDEBGtest_vpcs (SagaExecutor): roles authenticated = true roles = RoleSet { roles: {} } saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11 saga_name = project-create saga_node = VpcCreateV6Route silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
45502026-01-27T01:14:08.450ZDEBGtest_vpcs (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database result = Ok(()) saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11 saga_name = project-create saga_node = VpcCreateV6Route silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
45512026-01-27T01:14:08.459ZDEBGtest_vpcs (SEC): saga log event new_state = N013 succeeded sec_id = 913233fe-92a8-4635-9572-183f495429c4
45522026-01-27T01:14:08.460ZDEBGtest_vpcs (SecStore): recording saga event event_type = Succeeded(Null) node_id = 13 saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
45532026-01-27T01:14:08.466ZDEBGtest_vpcs (SEC): saga log event new_state = N014 started sec_id = 913233fe-92a8-4635-9572-183f495429c4
45542026-01-27T01:14:08.466ZDEBGtest_vpcs (SecStore): recording saga event event_type = Started node_id = 14 saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
45552026-01-27T01:14:08.483ZTRACtest_vpcs (SagaExecutor): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 87aaa4f1-0672-47bd-b399-8861de8da8e7, lookup_type: ByName("peeky-park") }, key: f8e83d21-ccf9-418f-8d28-ef8fd953b403, lookup_type: ByName("default") } saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11 saga_name = project-create saga_node = VpcCreateSubnet silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
45562026-01-27T01:14:08.483ZTRACtest_vpcs (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. } authenticated = true resource_id = 87aaa4f1-0672-47bd-b399-8861de8da8e7 resource_type = Project saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11 saga_name = project-create saga_node = VpcCreateSubnet silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
45572026-01-27T01:14:08.483ZTRACtest_vpcs (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11 saga_name = project-create saga_node = VpcCreateSubnet silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
45582026-01-27T01:14:08.483ZDEBGtest_vpcs (SagaExecutor): roles authenticated = true roles = RoleSet { roles: {} } saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11 saga_name = project-create saga_node = VpcCreateSubnet silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
45592026-01-27T01:14:08.484ZDEBGtest_vpcs (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database result = Ok(()) saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11 saga_name = project-create saga_node = VpcCreateSubnet silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
45602026-01-27T01:14:08.490ZTRACtest_vpcs (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. } authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11 saga_name = project-create saga_node = VpcCreateSubnet silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
45612026-01-27T01:14:08.490ZTRACtest_vpcs (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11 saga_name = project-create saga_node = VpcCreateSubnet silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
45622026-01-27T01:14:08.491ZDEBGtest_vpcs (SagaExecutor): roles authenticated = true roles = RoleSet { roles: {} } saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11 saga_name = project-create saga_node = VpcCreateSubnet silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
45632026-01-27T01:14:08.491ZDEBGtest_vpcs (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database result = Ok(()) saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11 saga_name = project-create saga_node = VpcCreateSubnet silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
45642026-01-27T01:14:08.497ZTRACtest_vpcs (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. } authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11 saga_name = project-create saga_node = VpcCreateSubnet silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
45652026-01-27T01:14:08.497ZTRACtest_vpcs (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11 saga_name = project-create saga_node = VpcCreateSubnet silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
45662026-01-27T01:14:08.498ZDEBGtest_vpcs (SagaExecutor): roles authenticated = true roles = RoleSet { roles: {} } saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11 saga_name = project-create saga_node = VpcCreateSubnet silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
45672026-01-27T01:14:08.499ZDEBGtest_vpcs (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database result = Ok(()) saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11 saga_name = project-create saga_node = VpcCreateSubnet silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
45682026-01-27T01:14:08.504ZDEBGtest_vpcs (SagaExecutor): roles authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11 saga_name = project-create saga_node = VpcCreateSubnet silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
45692026-01-27T01:14:08.513ZDEBGtest_vpcs (SagaExecutor): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 87aaa4f1-0672-47bd-b399-8861de8da8e7, lookup_type: ByName("peeky-park") }, key: f8e83d21-ccf9-418f-8d28-ef8fd953b403, lookup_type: ByName("default") } result = Ok(()) saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11 saga_name = project-create saga_node = VpcCreateSubnet silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
45702026-01-27T01:14:08.523ZDEBGtest_vpcs (SEC): saga log event new_state = N014 succeeded sec_id = 913233fe-92a8-4635-9572-183f495429c4
45712026-01-27T01:14:08.524ZDEBGtest_vpcs (SecStore): recording saga event event_type = Succeeded(Array [Object {"key": String("0d13bfa0-224d-4f5f-872e-6bda5c7f29ea"), "lookup_type": Object {"ById": String("0d13bfa0-224d-4f5f-872e-6bda5c7f29ea")}, "parent": Object {"key": String("f8e83d21-ccf9-418f-8d28-ef8fd953b403"), "lookup_type": Object {"ByName": String("default")}, "parent": Object {"key": String("87aaa4f1-0672-47bd-b399-8861de8da8e7"), "lookup_type": Object {"ByName": String("peeky-park")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}}}, Object {"custom_router_id": Null, "identity": Object {"description": String("The default subnet for default"), "id": String("0d13bfa0-224d-4f5f-872e-6bda5c7f29ea"), "name": String("default"), "time_created": String("2026-01-27T01:14:08.483094Z"), "time_deleted": Null, "time_modified": String("2026-01-27T01:14:08.483094Z")}, "ipv4_block": String("172.30.0.0/22"), "ipv6_block": String("fd4f:f905:66ff::/64"), "rcgen": Number(1), "vpc_id": String("f8e83d21-ccf9-418f-8d28-ef8fd953b403")}]) node_id = 14 saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
45722026-01-27T01:14:08.538ZDEBGtest_vpcs (SEC): saga log event new_state = N015 started sec_id = 913233fe-92a8-4635-9572-183f495429c4
45732026-01-27T01:14:08.538ZDEBGtest_vpcs (SecStore): recording saga event event_type = Started node_id = 15 saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
45742026-01-27T01:14:08.546ZTRACtest_vpcs (SagaExecutor): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 87aaa4f1-0672-47bd-b399-8861de8da8e7, lookup_type: ByName("peeky-park") }, key: f8e83d21-ccf9-418f-8d28-ef8fd953b403, lookup_type: ByName("default") }, key: 6f241441-d4fd-4437-8ab8-d9c03a5832e5, lookup_type: ById(6f241441-d4fd-4437-8ab8-d9c03a5832e5) } saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11 saga_name = project-create saga_node = VpcCreateSubnetRoute silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
45752026-01-27T01:14:08.546ZTRACtest_vpcs (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. } authenticated = true resource_id = 87aaa4f1-0672-47bd-b399-8861de8da8e7 resource_type = Project saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11 saga_name = project-create saga_node = VpcCreateSubnetRoute silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
45762026-01-27T01:14:08.546ZTRACtest_vpcs (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11 saga_name = project-create saga_node = VpcCreateSubnetRoute silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
45772026-01-27T01:14:08.546ZDEBGtest_vpcs (SagaExecutor): roles authenticated = true roles = RoleSet { roles: {} } saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11 saga_name = project-create saga_node = VpcCreateSubnetRoute silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
45782026-01-27T01:14:08.547ZDEBGtest_vpcs (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database result = Ok(()) saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11 saga_name = project-create saga_node = VpcCreateSubnetRoute silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
45792026-01-27T01:14:08.556ZTRACtest_vpcs (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. } authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11 saga_name = project-create saga_node = VpcCreateSubnetRoute silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
45802026-01-27T01:14:08.556ZTRACtest_vpcs (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11 saga_name = project-create saga_node = VpcCreateSubnetRoute silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
45812026-01-27T01:14:08.556ZDEBGtest_vpcs (SagaExecutor): roles authenticated = true roles = RoleSet { roles: {} } saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11 saga_name = project-create saga_node = VpcCreateSubnetRoute silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
45822026-01-27T01:14:08.558ZDEBGtest_vpcs (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database result = Ok(()) saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11 saga_name = project-create saga_node = VpcCreateSubnetRoute silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
45832026-01-27T01:14:08.564ZTRACtest_vpcs (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. } authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11 saga_name = project-create saga_node = VpcCreateSubnetRoute silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
45842026-01-27T01:14:08.564ZTRACtest_vpcs (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11 saga_name = project-create saga_node = VpcCreateSubnetRoute silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
45852026-01-27T01:14:08.565ZDEBGtest_vpcs (SagaExecutor): roles authenticated = true roles = RoleSet { roles: {} } saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11 saga_name = project-create saga_node = VpcCreateSubnetRoute silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
45862026-01-27T01:14:08.566ZDEBGtest_vpcs (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database result = Ok(()) saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11 saga_name = project-create saga_node = VpcCreateSubnetRoute silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
45872026-01-27T01:14:08.573ZDEBGtest_vpcs (SagaExecutor): roles authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11 saga_name = project-create saga_node = VpcCreateSubnetRoute silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
45882026-01-27T01:14:08.592ZDEBGtest_vpcs (SagaExecutor): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 87aaa4f1-0672-47bd-b399-8861de8da8e7, lookup_type: ByName("peeky-park") }, key: f8e83d21-ccf9-418f-8d28-ef8fd953b403, lookup_type: ByName("default") }, key: 6f241441-d4fd-4437-8ab8-d9c03a5832e5, lookup_type: ById(6f241441-d4fd-4437-8ab8-d9c03a5832e5) } result = Ok(()) saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11 saga_name = project-create saga_node = VpcCreateSubnetRoute silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
45892026-01-27T01:14:08.592ZTRACtest_vpcs (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11 saga_name = project-create saga_node = VpcCreateSubnetRoute silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
45902026-01-27T01:14:08.593ZDEBGtest_vpcs (SagaExecutor): roles authenticated = true roles = RoleSet { roles: {} } saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11 saga_name = project-create saga_node = VpcCreateSubnetRoute silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
45912026-01-27T01:14:08.593ZDEBGtest_vpcs (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database result = Ok(()) saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11 saga_name = project-create saga_node = VpcCreateSubnetRoute silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
45922026-01-27T01:14:08.604ZDEBGtest_vpcs (SEC): saga log event new_state = N015 succeeded sec_id = 913233fe-92a8-4635-9572-183f495429c4
45932026-01-27T01:14:08.604ZDEBGtest_vpcs (SecStore): recording saga event event_type = Succeeded(Object {"key": String("1a75a3ca-5545-42be-b4cb-8883d818a039"), "lookup_type": Object {"ById": String("0d13bfa0-224d-4f5f-872e-6bda5c7f29ea")}, "parent": Object {"key": String("6f241441-d4fd-4437-8ab8-d9c03a5832e5"), "lookup_type": Object {"ById": String("6f241441-d4fd-4437-8ab8-d9c03a5832e5")}, "parent": Object {"key": String("f8e83d21-ccf9-418f-8d28-ef8fd953b403"), "lookup_type": Object {"ByName": String("default")}, "parent": Object {"key": String("87aaa4f1-0672-47bd-b399-8861de8da8e7"), "lookup_type": Object {"ByName": String("peeky-park")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}}}}) node_id = 15 saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
45942026-01-27T01:14:08.618ZDEBGtest_vpcs (SEC): saga log event new_state = N016 started sec_id = 913233fe-92a8-4635-9572-183f495429c4
45952026-01-27T01:14:08.618ZDEBGtest_vpcs (SecStore): recording saga event event_type = Started node_id = 16 saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
45962026-01-27T01:14:08.624ZDEBGtest_vpcs (nexus): default firewall rules for vpc default rules = [VpcFirewallRule { identity: VpcFirewallRuleIdentity { id: 61c988ec-e614-458f-b8c9-b414ea5e7d95, name: Name(Name("allow-internal-inbound")), description: "allow inbound traffic to all instances within the VPC if originated within the VPC", time_created: 2026-01-27T01:14:08.624749938Z, time_modified: 2026-01-27T01:14:08.624749938Z, time_deleted: None }, vpc_id: f8e83d21-ccf9-418f-8d28-ef8fd953b403, status: VpcFirewallRuleStatus(Enabled), direction: VpcFirewallRuleDirection(Inbound), targets: [VpcFirewallRuleTarget(Vpc(Name("default")))], filter_hosts: Some([VpcFirewallRuleHostFilter(Vpc(Name("default")))]), filter_ports: None, filter_protocols: None, action: VpcFirewallRuleAction(Allow), priority: VpcFirewallRulePriority(VpcFirewallRulePriority(65534)) }, VpcFirewallRule { identity: VpcFirewallRuleIdentity { id: c3f303dc-fa4a-477e-98e8-64a99e1f0334, name: Name(Name("allow-ssh")), description: "allow inbound TCP connections on port 22 from anywhere", time_created: 2026-01-27T01:14:08.624770028Z, time_modified: 2026-01-27T01:14:08.624770028Z, time_deleted: None }, vpc_id: f8e83d21-ccf9-418f-8d28-ef8fd953b403, status: VpcFirewallRuleStatus(Enabled), direction: VpcFirewallRuleDirection(Inbound), targets: [VpcFirewallRuleTarget(Vpc(Name("default")))], filter_hosts: None, filter_ports: Some([L4PortRange(L4PortRange { first: L4Port(22), last: L4Port(22) })]), filter_protocols: Some([VpcFirewallRuleProtocol(Tcp)]), action: VpcFirewallRuleAction(Allow), priority: VpcFirewallRulePriority(VpcFirewallRulePriority(65534)) }, VpcFirewallRule { identity: VpcFirewallRuleIdentity { id: dad3dac5-1bed-4e55-80df-82cd8ea2d7b7, name: Name(Name("allow-icmp")), description: "allow inbound ICMP traffic from anywhere", time_created: 2026-01-27T01:14:08.624778214Z, time_modified: 2026-01-27T01:14:08.624778214Z, time_deleted: None }, vpc_id: f8e83d21-ccf9-418f-8d28-ef8fd953b403, status: VpcFirewallRuleStatus(Enabled), direction: VpcFirewallRuleDirection(Inbound), targets: [VpcFirewallRuleTarget(Vpc(Name("default")))], filter_hosts: None, filter_ports: None, filter_protocols: Some([VpcFirewallRuleProtocol(Icmp(None))]), action: VpcFirewallRuleAction(Allow), priority: VpcFirewallRulePriority(VpcFirewallRulePriority(65534)) }]
45972026-01-27T01:14:08.625ZTRACtest_vpcs (SagaExecutor): authorize begin action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 87aaa4f1-0672-47bd-b399-8861de8da8e7, lookup_type: ByName("peeky-park") }, key: f8e83d21-ccf9-418f-8d28-ef8fd953b403, lookup_type: ByName("default") } saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11 saga_name = project-create saga_node = VpcUpdateFirewall silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
45982026-01-27T01:14:08.625ZTRACtest_vpcs (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. } authenticated = true resource_id = 87aaa4f1-0672-47bd-b399-8861de8da8e7 resource_type = Project saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11 saga_name = project-create saga_node = VpcUpdateFirewall silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
45992026-01-27T01:14:08.625ZTRACtest_vpcs (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11 saga_name = project-create saga_node = VpcUpdateFirewall silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
46002026-01-27T01:14:08.625ZDEBGtest_vpcs (SagaExecutor): roles authenticated = true roles = RoleSet { roles: {} } saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11 saga_name = project-create saga_node = VpcUpdateFirewall silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
46012026-01-27T01:14:08.626ZDEBGtest_vpcs (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database result = Ok(()) saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11 saga_name = project-create saga_node = VpcUpdateFirewall silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
46022026-01-27T01:14:08.631ZDEBGtest_vpcs (results-sink): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
46032026-01-27T01:14:08.631ZDEBGtest_vpcs (results-sink-cluster): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
46042026-01-27T01:14:08.632ZDEBGtest_vpcs (clickhouse-client): unrolling 1 total samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 719060a6-12ac-470c-bb91-e566c7f997b2
46052026-01-27T01:14:08.634ZTRACtest_vpcs (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 719060a6-12ac-470c-bb91-e566c7f997b2 n_columns = 4 n_rows = 2 sql = INSERT INTO oximeter.fields_string FORMAT Native
46062026-01-27T01:14:08.634ZTRACtest_vpcs (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. } authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11 saga_name = project-create saga_node = VpcUpdateFirewall silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
46072026-01-27T01:14:08.634ZTRACtest_vpcs (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11 saga_name = project-create saga_node = VpcUpdateFirewall silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
46082026-01-27T01:14:08.635ZDEBGtest_vpcs (SagaExecutor): roles authenticated = true roles = RoleSet { roles: {} } saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11 saga_name = project-create saga_node = VpcUpdateFirewall silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
46092026-01-27T01:14:08.635ZDEBGtest_vpcs (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database result = Ok(()) saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11 saga_name = project-create saga_node = VpcUpdateFirewall silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
46102026-01-27T01:14:08.641ZDEBGtest_vpcs (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 719060a6-12ac-470c-bb91-e566c7f997b2 n_rows = 2 table_name = fields_string
46112026-01-27T01:14:08.641ZTRACtest_vpcs (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 719060a6-12ac-470c-bb91-e566c7f997b2 n_columns = 4 n_rows = 1 sql = INSERT INTO oximeter.measurements_i64 FORMAT Native
46122026-01-27T01:14:08.644ZTRACtest_vpcs (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. } authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11 saga_name = project-create saga_node = VpcUpdateFirewall silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
46132026-01-27T01:14:08.644ZTRACtest_vpcs (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11 saga_name = project-create saga_node = VpcUpdateFirewall silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
46142026-01-27T01:14:08.644ZDEBGtest_vpcs (SagaExecutor): roles authenticated = true roles = RoleSet { roles: {} } saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11 saga_name = project-create saga_node = VpcUpdateFirewall silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
46152026-01-27T01:14:08.646ZDEBGtest_vpcs (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database result = Ok(()) saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11 saga_name = project-create saga_node = VpcUpdateFirewall silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
46162026-01-27T01:14:08.648ZDEBGtest_vpcs (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 719060a6-12ac-470c-bb91-e566c7f997b2 n_rows = 1 table_name = measurements_i64
46172026-01-27T01:14:08.648ZTRACtest_vpcs (results-sink): successfully inserted samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
46182026-01-27T01:14:08.653ZDEBGtest_vpcs (SagaExecutor): roles authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11 saga_name = project-create saga_node = VpcUpdateFirewall silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
46192026-01-27T01:14:08.662ZDEBGtest_vpcs (SagaExecutor): authorize result action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 87aaa4f1-0672-47bd-b399-8861de8da8e7, lookup_type: ByName("peeky-park") }, key: f8e83d21-ccf9-418f-8d28-ef8fd953b403, lookup_type: ByName("default") } result = Ok(()) saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11 saga_name = project-create saga_node = VpcUpdateFirewall silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
46202026-01-27T01:14:08.662ZTRACtest_vpcs (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11 saga_name = project-create saga_node = VpcUpdateFirewall silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
46212026-01-27T01:14:08.662ZDEBGtest_vpcs (SagaExecutor): roles authenticated = true roles = RoleSet { roles: {} } saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11 saga_name = project-create saga_node = VpcUpdateFirewall silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
46222026-01-27T01:14:08.663ZDEBGtest_vpcs (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database result = Ok(()) saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11 saga_name = project-create saga_node = VpcUpdateFirewall silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
46232026-01-27T01:14:08.737ZWARNtest_vpcs (results-sink-cluster): failed to insert some results into metric DB collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 error = Failed to check out connection to database: No backends found for this service file = oximeter/collector/src/results_sink.rs:92
46242026-01-27T01:14:08.750ZINFOtest_vpcs (oximeter-agent): refreshing list of producers from Nexus collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 file = oximeter/collector/src/agent.rs:557
46252026-01-27T01:14:08.751ZDEBGtest_vpcs (oximeter): client request body = None method = GET uri = http://127.0.0.1:46983/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
46262026-01-27T01:14:08.751ZTRACtest_vpcs (dropshot_internal): incoming request local_addr = 127.0.0.1:46983 method = GET remote_addr = 127.0.0.1:62470 req_id = 97fbd5b1-e9c2-41b7-9fa9-7fbb36b07183 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
46272026-01-27T01:14:08.751ZDEBGtest_vpcs (dropshot_internal): determined request API version local_addr = 127.0.0.1:46983 method = GET remote_addr = 127.0.0.1:62470 req_id = 97fbd5b1-e9c2-41b7-9fa9-7fbb36b07183 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending version = 1.0.0
46282026-01-27T01:14:08.752ZTRACtest_vpcs (dropshot_internal): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) authenticated = true local_addr = 127.0.0.1:46983 method = GET remote_addr = 127.0.0.1:62470 req_id = 97fbd5b1-e9c2-41b7-9fa9-7fbb36b07183 resource = Database type = user_builtin uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending user_builtin_id = 001de000-05e4-4000-8000-000000000002
46292026-01-27T01:14:08.752ZDEBGtest_vpcs (dropshot_internal): roles authenticated = true local_addr = 127.0.0.1:46983 method = GET remote_addr = 127.0.0.1:62470 req_id = 97fbd5b1-e9c2-41b7-9fa9-7fbb36b07183 roles = RoleSet { roles: {} } type = user_builtin uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending user_builtin_id = 001de000-05e4-4000-8000-000000000002
46302026-01-27T01:14:08.754ZDEBGtest_vpcs (dropshot_internal): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) authenticated = true local_addr = 127.0.0.1:46983 method = GET remote_addr = 127.0.0.1:62470 req_id = 97fbd5b1-e9c2-41b7-9fa9-7fbb36b07183 resource = Database result = Ok(()) type = user_builtin uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending user_builtin_id = 001de000-05e4-4000-8000-000000000002
46312026-01-27T01:14:08.758ZINFOtest_vpcs (dropshot_internal): request completed latency_us = 6875 local_addr = 127.0.0.1:46983 method = GET remote_addr = 127.0.0.1:62470 req_id = 97fbd5b1-e9c2-41b7-9fa9-7fbb36b07183 response_code = 200 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
46322026-01-27T01:14:08.759ZDEBGtest_vpcs (oximeter): client response result = Ok(Response { url: "http://127.0.0.1:46983/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending", status: 200, headers: {"content-type": "application/json", "x-request-id": "97fbd5b1-e9c2-41b7-9fa9-7fbb36b07183", "content-length": "405", "date": "Tue, 27 Jan 2026 01:14:08 GMT"} })
46332026-01-27T01:14:08.760ZDEBGtest_vpcs (oximeter): client request body = None method = GET uri = http://127.0.0.1:46983/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
46342026-01-27T01:14:08.761ZTRACtest_vpcs (dropshot_internal): incoming request local_addr = 127.0.0.1:46983 method = GET remote_addr = 127.0.0.1:62470 req_id = d1090cdc-60bf-46e8-b166-62cae4ce6c0f uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
46352026-01-27T01:14:08.761ZDEBGtest_vpcs (dropshot_internal): determined request API version local_addr = 127.0.0.1:46983 method = GET remote_addr = 127.0.0.1:62470 req_id = d1090cdc-60bf-46e8-b166-62cae4ce6c0f uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D version = 1.0.0
46362026-01-27T01:14:08.761ZTRACtest_vpcs (dropshot_internal): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) authenticated = true local_addr = 127.0.0.1:46983 method = GET remote_addr = 127.0.0.1:62470 req_id = d1090cdc-60bf-46e8-b166-62cae4ce6c0f resource = Database type = user_builtin uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D user_builtin_id = 001de000-05e4-4000-8000-000000000002
46372026-01-27T01:14:08.761ZDEBGtest_vpcs (dropshot_internal): roles authenticated = true local_addr = 127.0.0.1:46983 method = GET remote_addr = 127.0.0.1:62470 req_id = d1090cdc-60bf-46e8-b166-62cae4ce6c0f roles = RoleSet { roles: {} } type = user_builtin uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D user_builtin_id = 001de000-05e4-4000-8000-000000000002
46382026-01-27T01:14:08.761ZDEBGtest_vpcs (dropshot_internal): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) authenticated = true local_addr = 127.0.0.1:46983 method = GET remote_addr = 127.0.0.1:62470 req_id = d1090cdc-60bf-46e8-b166-62cae4ce6c0f resource = Database result = Ok(()) type = user_builtin uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D user_builtin_id = 001de000-05e4-4000-8000-000000000002
46392026-01-27T01:14:08.786ZINFOtest_vpcs (dropshot_internal): request completed latency_us = 25809 local_addr = 127.0.0.1:46983 method = GET remote_addr = 127.0.0.1:62470 req_id = d1090cdc-60bf-46e8-b166-62cae4ce6c0f response_code = 200 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
46402026-01-27T01:14:08.786ZDEBGtest_vpcs (collection-task): sent timer-based collection request to the collection task collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de producer_ip = ::1 producer_port = 65095
46412026-01-27T01:14:08.786ZDEBGtest_vpcs (oximeter): client response result = Ok(Response { url: "http://127.0.0.1:46983/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D", status: 200, headers: {"content-type": "application/json", "x-request-id": "d1090cdc-60bf-46e8-b166-62cae4ce6c0f", "content-length": "29", "date": "Tue, 27 Jan 2026 01:14:08 GMT"} })
46422026-01-27T01:14:08.786ZTRACtest_vpcs (oximeter-agent): ignoring request to update existing metric producer, since the endpoint information is the same as the existing collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = 913233fe-92a8-4635-9572-183f495429c4
46432026-01-27T01:14:08.787ZTRACtest_vpcs (oximeter-agent): ignoring request to update existing metric producer, since the endpoint information is the same as the existing collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
46442026-01-27T01:14:08.787ZINFOtest_vpcs (oximeter-agent): refreshed list of producers from Nexus collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 file = oximeter/collector/src/agent.rs:632 n_current_tasks = 2 n_pruned_tasks = 0
46452026-01-27T01:14:08.787ZDEBGtest_vpcs (collection-task): collecting from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de producer_ip = ::1 producer_port = 65095
46462026-01-27T01:14:08.792ZTRACtest_vpcs (collection-task): sent collection request to producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de producer_ip = ::1 producer_port = 65095
46472026-01-27T01:14:08.794ZDEBGtest_vpcs (collection-task): collected results from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 n_results = 1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de producer_ip = ::1 producer_port = 65095
46482026-01-27T01:14:08.794ZTRACtest_vpcs (collection-task): forwarded results to main collection loop collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de producer_ip = ::1 producer_port = 65095
46492026-01-27T01:14:08.794ZTRACtest_vpcs (collection-task): top of inner collection loop, waiting for next request collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de producer_ip = ::1 producer_port = 65095
46502026-01-27T01:14:08.797ZDEBGtest_vpcs (SEC): saga log event new_state = N016 succeeded sec_id = 913233fe-92a8-4635-9572-183f495429c4
46512026-01-27T01:14:08.797ZDEBGtest_vpcs (SecStore): recording saga event event_type = Succeeded(Array [Object {"action": String("allow"), "direction": String("inbound"), "filter_hosts": Array [Object {"type": String("vpc"), "value": String("default")}], "filter_ports": Null, "filter_protocols": Null, "identity": Object {"description": String("allow inbound traffic to all instances within the VPC if originated within the VPC"), "id": String("61c988ec-e614-458f-b8c9-b414ea5e7d95"), "name": String("allow-internal-inbound"), "time_created": String("2026-01-27T01:14:08.624749938Z"), "time_deleted": Null, "time_modified": String("2026-01-27T01:14:08.624749938Z")}, "priority": Number(65534), "status": String("enabled"), "targets": Array [Object {"type": String("vpc"), "value": String("default")}], "vpc_id": String("f8e83d21-ccf9-418f-8d28-ef8fd953b403")}, Object {"action": String("allow"), "direction": String("inbound"), "filter_hosts": Null, "filter_ports": Array [String("22")], "filter_protocols": Array [Object {"type": String("tcp")}], "identity": Object {"description": String("allow inbound TCP connections on port 22 from anywhere"), "id": String("c3f303dc-fa4a-477e-98e8-64a99e1f0334"), "name": String("allow-ssh"), "time_created": String("2026-01-27T01:14:08.624770028Z"), "time_deleted": Null, "time_modified": String("2026-01-27T01:14:08.624770028Z")}, "priority": Number(65534), "status": String("enabled"), "targets": Array [Object {"type": String("vpc"), "value": String("default")}], "vpc_id": String("f8e83d21-ccf9-418f-8d28-ef8fd953b403")}, Object {"action": String("allow"), "direction": String("inbound"), "filter_hosts": Null, "filter_ports": Null, "filter_protocols": Array [Object {"type": String("icmp"), "value": Null}], "identity": Object {"description": String("allow inbound ICMP traffic from anywhere"), "id": String("dad3dac5-1bed-4e55-80df-82cd8ea2d7b7"), "name": String("allow-icmp"), "time_created": String("2026-01-27T01:14:08.624778214Z"), "time_deleted": Null, "time_modified": String("2026-01-27T01:14:08.624778214Z")}, "priority": Number(65534), "status": String("enabled"), "targets": Array [Object {"type": String("vpc"), "value": String("default")}], "vpc_id": String("f8e83d21-ccf9-418f-8d28-ef8fd953b403")}]) node_id = 16 saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
46522026-01-27T01:14:08.805ZDEBGtest_vpcs (SEC): saga log event new_state = N017 started sec_id = 913233fe-92a8-4635-9572-183f495429c4
46532026-01-27T01:14:08.806ZDEBGtest_vpcs (SecStore): recording saga event event_type = Started node_id = 17 saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
46542026-01-27T01:14:08.814ZTRACtest_vpcs (SagaExecutor): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 87aaa4f1-0672-47bd-b399-8861de8da8e7, lookup_type: ByName("peeky-park") }, key: f8e83d21-ccf9-418f-8d28-ef8fd953b403, lookup_type: ByName("default") } saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11 saga_name = project-create saga_node = VpcCreateGateway silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
46552026-01-27T01:14:08.814ZTRACtest_vpcs (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. } authenticated = true resource_id = 87aaa4f1-0672-47bd-b399-8861de8da8e7 resource_type = Project saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11 saga_name = project-create saga_node = VpcCreateGateway silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
46562026-01-27T01:14:08.814ZTRACtest_vpcs (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11 saga_name = project-create saga_node = VpcCreateGateway silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
46572026-01-27T01:14:08.814ZDEBGtest_vpcs (SagaExecutor): roles authenticated = true roles = RoleSet { roles: {} } saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11 saga_name = project-create saga_node = VpcCreateGateway silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
46582026-01-27T01:14:08.816ZDEBGtest_vpcs (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database result = Ok(()) saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11 saga_name = project-create saga_node = VpcCreateGateway silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
46592026-01-27T01:14:08.839ZTRACtest_vpcs (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. } authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11 saga_name = project-create saga_node = VpcCreateGateway silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
46602026-01-27T01:14:08.839ZTRACtest_vpcs (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11 saga_name = project-create saga_node = VpcCreateGateway silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
46612026-01-27T01:14:08.839ZDEBGtest_vpcs (SagaExecutor): roles authenticated = true roles = RoleSet { roles: {} } saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11 saga_name = project-create saga_node = VpcCreateGateway silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
46622026-01-27T01:14:08.842ZDEBGtest_vpcs (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database result = Ok(()) saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11 saga_name = project-create saga_node = VpcCreateGateway silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
46632026-01-27T01:14:08.849ZTRACtest_vpcs (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. } authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11 saga_name = project-create saga_node = VpcCreateGateway silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
46642026-01-27T01:14:08.849ZTRACtest_vpcs (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11 saga_name = project-create saga_node = VpcCreateGateway silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
46652026-01-27T01:14:08.849ZDEBGtest_vpcs (SagaExecutor): roles authenticated = true roles = RoleSet { roles: {} } saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11 saga_name = project-create saga_node = VpcCreateGateway silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
46662026-01-27T01:14:08.850ZDEBGtest_vpcs (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database result = Ok(()) saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11 saga_name = project-create saga_node = VpcCreateGateway silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
46672026-01-27T01:14:08.858ZDEBGtest_vpcs (SagaExecutor): roles authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11 saga_name = project-create saga_node = VpcCreateGateway silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
46682026-01-27T01:14:08.871ZDEBGtest_vpcs (SagaExecutor): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 87aaa4f1-0672-47bd-b399-8861de8da8e7, lookup_type: ByName("peeky-park") }, key: f8e83d21-ccf9-418f-8d28-ef8fd953b403, lookup_type: ByName("default") } result = Ok(()) saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11 saga_name = project-create saga_node = VpcCreateGateway silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
46692026-01-27T01:14:08.871ZTRACtest_vpcs (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11 saga_name = project-create saga_node = VpcCreateGateway silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
46702026-01-27T01:14:08.871ZDEBGtest_vpcs (SagaExecutor): roles authenticated = true roles = RoleSet { roles: {} } saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11 saga_name = project-create saga_node = VpcCreateGateway silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
46712026-01-27T01:14:08.872ZDEBGtest_vpcs (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database result = Ok(()) saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11 saga_name = project-create saga_node = VpcCreateGateway silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
46722026-01-27T01:14:08.878ZTRACtest_vpcs (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11 saga_name = project-create saga_node = VpcCreateGateway silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
46732026-01-27T01:14:08.878ZDEBGtest_vpcs (SagaExecutor): roles authenticated = true roles = RoleSet { roles: {} } saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11 saga_name = project-create saga_node = VpcCreateGateway silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
46742026-01-27T01:14:08.879ZDEBGtest_vpcs (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database result = Ok(()) saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11 saga_name = project-create saga_node = VpcCreateGateway silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
46752026-01-27T01:14:08.885ZTRACtest_vpcs (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11 saga_name = project-create saga_node = VpcCreateGateway silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
46762026-01-27T01:14:08.885ZDEBGtest_vpcs (SagaExecutor): roles authenticated = true roles = RoleSet { roles: {} } saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11 saga_name = project-create saga_node = VpcCreateGateway silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
46772026-01-27T01:14:08.886ZDEBGtest_vpcs (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database result = Ok(()) saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11 saga_name = project-create saga_node = VpcCreateGateway silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
46782026-01-27T01:14:09.052ZWARNtest_vpcs (SagaExecutor): Default ip pool lookup failed: Object (of type ByOther("default unicast IP pool for current silo")) not found: ip-pool. Default gateway has no ip pool association authenticated = true saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11 saga_name = project-create saga_node = VpcCreateGateway silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
46792026-01-27T01:14:09.053ZDEBGtest_vpcs (SEC): saga log event new_state = N017 succeeded sec_id = 913233fe-92a8-4635-9572-183f495429c4
46802026-01-27T01:14:09.053ZDEBGtest_vpcs (SecStore): recording saga event event_type = Succeeded(Object {"key": String("1579c14d-e5cd-40f7-a168-ce2924cd16a7"), "lookup_type": Object {"ById": String("1579c14d-e5cd-40f7-a168-ce2924cd16a7")}, "parent": Object {"key": String("f8e83d21-ccf9-418f-8d28-ef8fd953b403"), "lookup_type": Object {"ByName": String("default")}, "parent": Object {"key": String("87aaa4f1-0672-47bd-b399-8861de8da8e7"), "lookup_type": Object {"ByName": String("peeky-park")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}}}) node_id = 17 saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
46812026-01-27T01:14:09.059ZDEBGtest_vpcs (SEC): saga log event new_state = N018 started sec_id = 913233fe-92a8-4635-9572-183f495429c4
46822026-01-27T01:14:09.059ZDEBGtest_vpcs (SecStore): recording saga event event_type = Started node_id = 18 saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
46832026-01-27T01:14:09.065ZTRACtest_vpcs (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11 saga_name = project-create saga_node = VpcNotifySleds silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
46842026-01-27T01:14:09.065ZDEBGtest_vpcs (SagaExecutor): roles authenticated = true roles = RoleSet { roles: {} } saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11 saga_name = project-create saga_node = VpcNotifySleds silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
46852026-01-27T01:14:09.066ZDEBGtest_vpcs (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database result = Ok(()) saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11 saga_name = project-create saga_node = VpcNotifySleds silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
46862026-01-27T01:14:09.079ZTRACtest_vpcs (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11 saga_name = project-create saga_node = VpcNotifySleds silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
46872026-01-27T01:14:09.079ZDEBGtest_vpcs (SagaExecutor): roles authenticated = true roles = RoleSet { roles: {} } saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11 saga_name = project-create saga_node = VpcNotifySleds silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
46882026-01-27T01:14:09.080ZDEBGtest_vpcs (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database result = Ok(()) saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11 saga_name = project-create saga_node = VpcNotifySleds silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
46892026-01-27T01:14:09.085ZTRACtest_vpcs (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11 saga_name = project-create saga_node = VpcNotifySleds silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
46902026-01-27T01:14:09.085ZDEBGtest_vpcs (SagaExecutor): roles authenticated = true roles = RoleSet { roles: {} } saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11 saga_name = project-create saga_node = VpcNotifySleds silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
46912026-01-27T01:14:09.086ZDEBGtest_vpcs (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database result = Ok(()) saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11 saga_name = project-create saga_node = VpcNotifySleds silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
46922026-01-27T01:14:09.094ZTRACtest_vpcs (SagaExecutor): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 87aaa4f1-0672-47bd-b399-8861de8da8e7, lookup_type: ById(87aaa4f1-0672-47bd-b399-8861de8da8e7) }, key: f8e83d21-ccf9-418f-8d28-ef8fd953b403, lookup_type: ByName("default") } saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11 saga_name = project-create saga_node = VpcNotifySleds silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
46932026-01-27T01:14:09.094ZTRACtest_vpcs (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. } authenticated = true resource_id = 87aaa4f1-0672-47bd-b399-8861de8da8e7 resource_type = Project saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11 saga_name = project-create saga_node = VpcNotifySleds silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
46942026-01-27T01:14:09.094ZTRACtest_vpcs (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11 saga_name = project-create saga_node = VpcNotifySleds silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
46952026-01-27T01:14:09.094ZDEBGtest_vpcs (SagaExecutor): roles authenticated = true roles = RoleSet { roles: {} } saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11 saga_name = project-create saga_node = VpcNotifySleds silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
46962026-01-27T01:14:09.095ZDEBGtest_vpcs (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database result = Ok(()) saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11 saga_name = project-create saga_node = VpcNotifySleds silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
46972026-01-27T01:14:09.102ZTRACtest_vpcs (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. } authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11 saga_name = project-create saga_node = VpcNotifySleds silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
46982026-01-27T01:14:09.102ZTRACtest_vpcs (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11 saga_name = project-create saga_node = VpcNotifySleds silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
46992026-01-27T01:14:09.103ZDEBGtest_vpcs (SagaExecutor): roles authenticated = true roles = RoleSet { roles: {} } saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11 saga_name = project-create saga_node = VpcNotifySleds silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
47002026-01-27T01:14:09.104ZDEBGtest_vpcs (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database result = Ok(()) saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11 saga_name = project-create saga_node = VpcNotifySleds silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
47012026-01-27T01:14:09.112ZTRACtest_vpcs (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. } authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11 saga_name = project-create saga_node = VpcNotifySleds silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
47022026-01-27T01:14:09.112ZTRACtest_vpcs (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11 saga_name = project-create saga_node = VpcNotifySleds silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
47032026-01-27T01:14:09.112ZDEBGtest_vpcs (SagaExecutor): roles authenticated = true roles = RoleSet { roles: {} } saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11 saga_name = project-create saga_node = VpcNotifySleds silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
47042026-01-27T01:14:09.113ZDEBGtest_vpcs (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database result = Ok(()) saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11 saga_name = project-create saga_node = VpcNotifySleds silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
47052026-01-27T01:14:09.122ZDEBGtest_vpcs (SagaExecutor): roles authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11 saga_name = project-create saga_node = VpcNotifySleds silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
47062026-01-27T01:14:09.158ZDEBGtest_vpcs (SagaExecutor): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 87aaa4f1-0672-47bd-b399-8861de8da8e7, lookup_type: ById(87aaa4f1-0672-47bd-b399-8861de8da8e7) }, key: f8e83d21-ccf9-418f-8d28-ef8fd953b403, lookup_type: ByName("default") } result = Ok(()) saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11 saga_name = project-create saga_node = VpcNotifySleds silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
47072026-01-27T01:14:09.158ZTRACtest_vpcs (SagaExecutor): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 87aaa4f1-0672-47bd-b399-8861de8da8e7, lookup_type: ById(87aaa4f1-0672-47bd-b399-8861de8da8e7) }, key: f8e83d21-ccf9-418f-8d28-ef8fd953b403, lookup_type: ByName("default") } saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11 saga_name = project-create saga_node = VpcNotifySleds silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
47082026-01-27T01:14:09.158ZTRACtest_vpcs (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. } authenticated = true resource_id = 87aaa4f1-0672-47bd-b399-8861de8da8e7 resource_type = Project saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11 saga_name = project-create saga_node = VpcNotifySleds silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
47092026-01-27T01:14:09.158ZTRACtest_vpcs (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11 saga_name = project-create saga_node = VpcNotifySleds silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
47102026-01-27T01:14:09.159ZDEBGtest_vpcs (SagaExecutor): roles authenticated = true roles = RoleSet { roles: {} } saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11 saga_name = project-create saga_node = VpcNotifySleds silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
47112026-01-27T01:14:09.159ZDEBGtest_vpcs (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database result = Ok(()) saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11 saga_name = project-create saga_node = VpcNotifySleds silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
47122026-01-27T01:14:09.166ZTRACtest_vpcs (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. } authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11 saga_name = project-create saga_node = VpcNotifySleds silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
47132026-01-27T01:14:09.167ZTRACtest_vpcs (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11 saga_name = project-create saga_node = VpcNotifySleds silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
47142026-01-27T01:14:09.167ZDEBGtest_vpcs (SagaExecutor): roles authenticated = true roles = RoleSet { roles: {} } saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11 saga_name = project-create saga_node = VpcNotifySleds silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
47152026-01-27T01:14:09.167ZDEBGtest_vpcs (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database result = Ok(()) saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11 saga_name = project-create saga_node = VpcNotifySleds silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
47162026-01-27T01:14:09.173ZTRACtest_vpcs (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. } authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11 saga_name = project-create saga_node = VpcNotifySleds silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
47172026-01-27T01:14:09.174ZTRACtest_vpcs (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11 saga_name = project-create saga_node = VpcNotifySleds silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
47182026-01-27T01:14:09.174ZDEBGtest_vpcs (SagaExecutor): roles authenticated = true roles = RoleSet { roles: {} } saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11 saga_name = project-create saga_node = VpcNotifySleds silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
47192026-01-27T01:14:09.174ZDEBGtest_vpcs (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database result = Ok(()) saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11 saga_name = project-create saga_node = VpcNotifySleds silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
47202026-01-27T01:14:09.182ZDEBGtest_vpcs (SagaExecutor): roles authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11 saga_name = project-create saga_node = VpcNotifySleds silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
47212026-01-27T01:14:09.196ZDEBGtest_vpcs (SagaExecutor): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 87aaa4f1-0672-47bd-b399-8861de8da8e7, lookup_type: ById(87aaa4f1-0672-47bd-b399-8861de8da8e7) }, key: f8e83d21-ccf9-418f-8d28-ef8fd953b403, lookup_type: ByName("default") } result = Ok(()) saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11 saga_name = project-create saga_node = VpcNotifySleds silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
47222026-01-27T01:14:09.196ZTRACtest_vpcs (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11 saga_name = project-create saga_node = VpcNotifySleds silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
47232026-01-27T01:14:09.196ZDEBGtest_vpcs (SagaExecutor): roles authenticated = true roles = RoleSet { roles: {} } saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11 saga_name = project-create saga_node = VpcNotifySleds silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
47242026-01-27T01:14:09.197ZDEBGtest_vpcs (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database result = Ok(()) saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11 saga_name = project-create saga_node = VpcNotifySleds silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
47252026-01-27T01:14:09.214ZDEBGtest_vpcs (nexus): resolved names for firewall rules instance_interfaces = {} subnet_interfaces = {} subnet_networks = {} vpc_interfaces = {}
47262026-01-27T01:14:09.215ZDEBGtest_vpcs (nexus): resolved firewall rules for sled agents sled_agent_rules = []
47272026-01-27T01:14:09.215ZDEBGtest_vpcs (nexus): resolved 0 rules for sleds
47282026-01-27T01:14:09.342ZDEBGtest_vpcs (nexus): resolved sleds for vpc default vpc_to_sled = []
47292026-01-27T01:14:09.342ZDEBGtest_vpcs (nexus): sending firewall rules to sled agents
47302026-01-27T01:14:09.342ZINFOtest_vpcs (nexus): updated firewall rules on 0 sleds
47312026-01-27T01:14:09.342ZTRACtest_vpcs (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11 saga_name = project-create saga_node = VpcNotifySleds silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
47322026-01-27T01:14:09.343ZDEBGtest_vpcs (SagaExecutor): roles authenticated = true roles = RoleSet { roles: {} } saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11 saga_name = project-create saga_node = VpcNotifySleds silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
47332026-01-27T01:14:09.343ZDEBGtest_vpcs (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database result = Ok(()) saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11 saga_name = project-create saga_node = VpcNotifySleds silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
47342026-01-27T01:14:09.368ZDEBGtest_vpcs (SEC): saga log event new_state = N018 succeeded sec_id = 913233fe-92a8-4635-9572-183f495429c4
47352026-01-27T01:14:09.369ZDEBGtest_vpcs (SecStore): recording saga event event_type = Succeeded(Null) node_id = 18 saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
47362026-01-27T01:14:09.399ZDEBGtest_vpcs (SEC): saga log event new_state = N019 started sec_id = 913233fe-92a8-4635-9572-183f495429c4
47372026-01-27T01:14:09.403ZDEBGtest_vpcs (SecStore): recording saga event event_type = Started node_id = 19 saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
47382026-01-27T01:14:09.426ZDEBGtest_vpcs (SEC): saga log event new_state = N019 succeeded sec_id = 913233fe-92a8-4635-9572-183f495429c4
47392026-01-27T01:14:09.426ZDEBGtest_vpcs (SecStore): recording saga event event_type = Succeeded(Null) node_id = 19 saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
47402026-01-27T01:14:09.436ZDEBGtest_vpcs (SEC): saga log event new_state = N021 started sec_id = 913233fe-92a8-4635-9572-183f495429c4
47412026-01-27T01:14:09.436ZDEBGtest_vpcs (SecStore): recording saga event event_type = Started node_id = 21 saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
47422026-01-27T01:14:09.442ZDEBGtest_vpcs (SEC): saga log event new_state = N021 succeeded sec_id = 913233fe-92a8-4635-9572-183f495429c4
47432026-01-27T01:14:09.442ZDEBGtest_vpcs (SecStore): recording saga event event_type = Succeeded(Null) node_id = 21 saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
47442026-01-27T01:14:09.458ZINFOtest_vpcs (SEC): update for saga cached state new_state = Done saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11 sec_id = 913233fe-92a8-4635-9572-183f495429c4
47452026-01-27T01:14:09.458ZINFOtest_vpcs (SecStore): updating state new_state = done saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
47462026-01-27T01:14:09.524ZINFOtest_vpcs (SEC): saga finished result = success saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11 saga_name = project-create sec_id = 913233fe-92a8-4635-9572-183f495429c4
47472026-01-27T01:14:09.524ZINFOtest_vpcs (SagaQuiesceHandle): tracked saga has finished saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
47482026-01-27T01:14:09.525ZINFOtest_vpcs (SagaExecutor): saga finished saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11 saga_name = project-create saga_result = SagaResult { saga_id: 87bf9ee1-5b44-4945-9d49-bcba52767c11, saga_log: SagaLog { saga_id: 87bf9ee1-5b44-4945-9d49-bcba52767c11, unwinding: false, events: [N020 started, N020 succeeded, N000 started, N000 succeeded, N001 started, N001 succeeded, N002 started, N002 succeeded, N003 started, N003 succeeded, N004 started, N004 succeeded, N005 started, N005 succeeded, N006 started, N006 succeeded, N007 started, N007 succeeded, N008 started, N008 succeeded, N009 started, N009 succeeded, N010 started, N010 succeeded, N011 started, N011 succeeded, N012 started, N012 succeeded, N013 started, N013 succeeded, N014 started, N014 succeeded, N015 started, N015 succeeded, N016 started, N016 succeeded, N017 started, N017 succeeded, N018 started, N018 succeeded, N019 started, N019 succeeded, N021 started, N021 succeeded], node_status: {0: Succeeded(Array [Object {"key": String("87aaa4f1-0672-47bd-b399-8861de8da8e7"), "lookup_type": Object {"ByName": String("peeky-park")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}, Object {"identity": Object {"description": String("a pier"), "id": String("87aaa4f1-0672-47bd-b399-8861de8da8e7"), "name": String("peeky-park"), "time_created": String("2026-01-27T01:14:08.010405Z"), "time_deleted": Null, "time_modified": String("2026-01-27T01:14:08.010405Z")}, "rcgen": Number(1), "silo_id": String("001de000-5110-4000-8000-000000000000")}]), 1: Succeeded(Object {"authz_project": Object {"key": String("87aaa4f1-0672-47bd-b399-8861de8da8e7"), "lookup_type": Object {"ByName": String("peeky-park")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}, "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}, "credential_id": Null, "device_token_expiration": Null}, Object {"mapped_fleet_roles": Object {}}]}}, "vpc_create": Object {"description": String("Default VPC"), "dns_name": String("default"), "ipv6_prefix": String("fd4f:f905:66ff::/48"), "name": String("default")}}), 2: Succeeded(Null), 3: Succeeded(String("f8e83d21-ccf9-418f-8d28-ef8fd953b403")), 4: Succeeded(String("6f241441-d4fd-4437-8ab8-d9c03a5832e5")), 5: Succeeded(String("a5817081-3c59-4ea3-bdad-a2d0ab0a5ba8")), 6: Succeeded(String("658602dc-bb9c-41aa-a110-25ca7f2e4f51")), 7: Succeeded(String("1a75a3ca-5545-42be-b4cb-8883d818a039")), 8: Succeeded(String("0d13bfa0-224d-4f5f-872e-6bda5c7f29ea")), 9: Succeeded(String("1579c14d-e5cd-40f7-a168-ce2924cd16a7")), 10: Succeeded(Array [Object {"key": String("f8e83d21-ccf9-418f-8d28-ef8fd953b403"), "lookup_type": Object {"ByName": String("default")}, "parent": Object {"key": String("87aaa4f1-0672-47bd-b399-8861de8da8e7"), "lookup_type": Object {"ByName": String("peeky-park")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}}, Object {"dns_name": String("default"), "firewall_gen": Number(1), "identity": Object {"description": String("Default VPC"), "id": String("f8e83d21-ccf9-418f-8d28-ef8fd953b403"), "name": String("default"), "time_created": String("2026-01-27T01:14:08.171344Z"), "time_deleted": Null, "time_modified": String("2026-01-27T01:14:08.171344Z")}, "ipv6_prefix": String("fd4f:f905:66ff::/48"), "project_id": String("87aaa4f1-0672-47bd-b399-8861de8da8e7"), "subnet_gen": Number(1), "system_router_id": String("6f241441-d4fd-4437-8ab8-d9c03a5832e5"), "vni": Number(9338389)}]), 11: Succeeded(Object {"key": String("6f241441-d4fd-4437-8ab8-d9c03a5832e5"), "lookup_type": Object {"ById": String("6f241441-d4fd-4437-8ab8-d9c03a5832e5")}, "parent": Object {"key": String("f8e83d21-ccf9-418f-8d28-ef8fd953b403"), "lookup_type": Object {"ByName": String("default")}, "parent": Object {"key": String("87aaa4f1-0672-47bd-b399-8861de8da8e7"), "lookup_type": Object {"ByName": String("peeky-park")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}}}), 12: Succeeded(Null), 13: Succeeded(Null), 14: Succeeded(Array [Object {"key": String("0d13bfa0-224d-4f5f-872e-6bda5c7f29ea"), "lookup_type": Object {"ById": String("0d13bfa0-224d-4f5f-872e-6bda5c7f29ea")}, "parent": Object {"key": String("f8e83d21-ccf9-418f-8d28-ef8fd953b403"), "lookup_type": Object {"ByName": String("default")}, "parent": Object {"key": String("87aaa4f1-0672-47bd-b399-8861de8da8e7"), "lookup_type": Object {"ByName": String("peeky-park")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}}}, Object {"custom_router_id": Null, "identity": Object {"description": String("The default subnet for default"), "id": String("0d13bfa0-224d-4f5f-872e-6bda5c7f29ea"), "name": String("default"), "time_created": String("2026-01-27T01:14:08.483094Z"), "time_deleted": Null, "time_modified": String("2026-01-27T01:14:08.483094Z")}, "ipv4_block": String("172.30.0.0/22"), "ipv6_block": String("fd4f:f905:66ff::/64"), "rcgen": Number(1), "vpc_id": String("f8e83d21-ccf9-418f-8d28-ef8fd953b403")}]), 15: Succeeded(Object {"key": String("1a75a3ca-5545-42be-b4cb-8883d818a039"), "lookup_type": Object {"ById": String("0d13bfa0-224d-4f5f-872e-6bda5c7f29ea")}, "parent": Object {"key": String("6f241441-d4fd-4437-8ab8-d9c03a5832e5"), "lookup_type": Object {"ById": String("6f241441-d4fd-4437-8ab8-d9c03a5832e5")}, "parent": Object {"key": String("f8e83d21-ccf9-418f-8d28-ef8fd953b403"), "lookup_type": Object {"ByName": String("default")}, "parent": Object {"key": String("87aaa4f1-0672-47bd-b399-8861de8da8e7"), "lookup_type": Object {"ByName": String("peeky-park")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}}}}), 16: Succeeded(Array [Object {"action": String("allow"), "direction": String("inbound"), "filter_hosts": Array [Object {"type": String("vpc"), "value": String("default")}], "filter_ports": Null, "filter_protocols": Null, "identity": Object {"description": String("allow inbound traffic to all instances within the VPC if originated within the VPC"), "id": String("61c988ec-e614-458f-b8c9-b414ea5e7d95"), "name": String("allow-internal-inbound"), "time_created": String("2026-01-27T01:14:08.624749938Z"), "time_deleted": Null, "time_modified": String("2026-01-27T01:14:08.624749938Z")}, "priority": Number(65534), "status": String("enabled"), "targets": Array [Object {"type": String("vpc"), "value": String("default")}], "vpc_id": String("f8e83d21-ccf9-418f-8d28-ef8fd953b403")}, Object {"action": String("allow"), "direction": String("inbound"), "filter_hosts": Null, "filter_ports": Array [String("22")], "filter_protocols": Array [Object {"type": String("tcp")}], "identity": Object {"description": String("allow inbound TCP connections on port 22 from anywhere"), "id": String("c3f303dc-fa4a-477e-98e8-64a99e1f0334"), "name": String("allow-ssh"), "time_created": String("2026-01-27T01:14:08.624770028Z"), "time_deleted": Null, "time_modified": String("2026-01-27T01:14:08.624770028Z")}, "priority": Number(65534), "status": String("enabled"), "targets": Array [Object {"type": String("vpc"), "value": String("default")}], "vpc_id": String("f8e83d21-ccf9-418f-8d28-ef8fd953b403")}, Object {"action": String("allow"), "direction": String("inbound"), "filter_hosts": Null, "filter_ports": Null, "filter_protocols": Array [Object {"type": String("icmp"), "value": Null}], "identity": Object {"description": String("allow inbound ICMP traffic from anywhere"), "id": String("dad3dac5-1bed-4e55-80df-82cd8ea2d7b7"), "name": String("allow-icmp"), "time_created": String("2026-01-27T01:14:08.624778214Z"), "time_deleted": Null, "time_modified": String("2026-01-27T01:14:08.624778214Z")}, "priority": Number(65534), "status": String("enabled"), "targets": Array [Object {"type": String("vpc"), "value": String("default")}], "vpc_id": String("f8e83d21-ccf9-418f-8d28-ef8fd953b403")}]), 17: Succeeded(Object {"key": String("1579c14d-e5cd-40f7-a168-ce2924cd16a7"), "lookup_type": Object {"ById": String("1579c14d-e5cd-40f7-a168-ce2924cd16a7")}, "parent": Object {"key": String("f8e83d21-ccf9-418f-8d28-ef8fd953b403"), "lookup_type": Object {"ByName": String("default")}, "parent": Object {"key": String("87aaa4f1-0672-47bd-b399-8861de8da8e7"), "lookup_type": Object {"ByName": String("peeky-park")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}}}), 18: Succeeded(Null), 19: Succeeded(Null), 20: Succeeded(Null), 21: Succeeded(Null)} }, kind: Ok(SagaResultOk { saga_output: Null, node_outputs: {"default_internet_gateway_id": String("1579c14d-e5cd-40f7-a168-ce2924cd16a7"), "default_subnet_id": String("0d13bfa0-224d-4f5f-872e-6bda5c7f29ea"), "default_v4_route_id": String("a5817081-3c59-4ea3-bdad-a2d0ab0a5ba8"), "default_v6_route_id": String("658602dc-bb9c-41aa-a110-25ca7f2e4f51"), "firewall": Array [Object {"action": String("allow"), "direction": String("inbound"), "filter_hosts": Array [Object {"type": String("vpc"), "value": String("default")}], "filter_ports": Null, "filter_protocols": Null, "identity": Object {"description": String("allow inbound traffic to all instances within the VPC if originated within the VPC"), "id": String("61c988ec-e614-458f-b8c9-b414ea5e7d95"), "name": String("allow-internal-inbound"), "time_created": String("2026-01-27T01:14:08.624749938Z"), "time_deleted": Null, "time_modified": String("2026-01-27T01:14:08.624749938Z")}, "priority": Number(65534), "status": String("enabled"), "targets": Array [Object {"type": String("vpc"), "value": String("default")}], "vpc_id": String("f8e83d21-ccf9-418f-8d28-ef8fd953b403")}, Object {"action": String("allow"), "direction": String("inbound"), "filter_hosts": Null, "filter_ports": Array [String("22")], "filter_protocols": Array [Object {"type": String("tcp")}], "identity": Object {"description": String("allow inbound TCP connections on port 22 from anywhere"), "id": String("c3f303dc-fa4a-477e-98e8-64a99e1f0334"), "name": String("allow-ssh"), "time_created": String("2026-01-27T01:14:08.624770028Z"), "time_deleted": Null, "time_modified": String("2026-01-27T01:14:08.624770028Z")}, "priority": Number(65534), "status": String("enabled"), "targets": Array [Object {"type": String("vpc"), "value": String("default")}], "vpc_id": String("f8e83d21-ccf9-418f-8d28-ef8fd953b403")}, Object {"action": String("allow"), "direction": String("inbound"), "filter_hosts": Null, "filter_ports": Null, "filter_protocols": Array [Object {"type": String("icmp"), "value": Null}], "identity": Object {"description": String("allow inbound ICMP traffic from anywhere"), "id": String("dad3dac5-1bed-4e55-80df-82cd8ea2d7b7"), "name": String("allow-icmp"), "time_created": String("2026-01-27T01:14:08.624778214Z"), "time_deleted": Null, "time_modified": String("2026-01-27T01:14:08.624778214Z")}, "priority": Number(65534), "status": String("enabled"), "targets": Array [Object {"type": String("vpc"), "value": String("default")}], "vpc_id": String("f8e83d21-ccf9-418f-8d28-ef8fd953b403")}], "gateway": Object {"key": String("1579c14d-e5cd-40f7-a168-ce2924cd16a7"), "lookup_type": Object {"ById": String("1579c14d-e5cd-40f7-a168-ce2924cd16a7")}, "parent": Object {"key": String("f8e83d21-ccf9-418f-8d28-ef8fd953b403"), "lookup_type": Object {"ByName": String("default")}, "parent": Object {"key": String("87aaa4f1-0672-47bd-b399-8861de8da8e7"), "lookup_type": Object {"ByName": String("peeky-park")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}}}, "no_result": Null, "project": Array [Object {"key": String("87aaa4f1-0672-47bd-b399-8861de8da8e7"), "lookup_type": Object {"ByName": String("peeky-park")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}, Object {"identity": Object {"description": String("a pier"), "id": String("87aaa4f1-0672-47bd-b399-8861de8da8e7"), "name": String("peeky-park"), "time_created": String("2026-01-27T01:14:08.010405Z"), "time_deleted": Null, "time_modified": String("2026-01-27T01:14:08.010405Z")}, "rcgen": Number(1), "silo_id": String("001de000-5110-4000-8000-000000000000")}], "route": Object {"key": String("1a75a3ca-5545-42be-b4cb-8883d818a039"), "lookup_type": Object {"ById": String("0d13bfa0-224d-4f5f-872e-6bda5c7f29ea")}, "parent": Object {"key": String("6f241441-d4fd-4437-8ab8-d9c03a5832e5"), "lookup_type": Object {"ById": String("6f241441-d4fd-4437-8ab8-d9c03a5832e5")}, "parent": Object {"key": String("f8e83d21-ccf9-418f-8d28-ef8fd953b403"), "lookup_type": Object {"ByName": String("default")}, "parent": Object {"key": String("87aaa4f1-0672-47bd-b399-8861de8da8e7"), "lookup_type": Object {"ByName": String("peeky-park")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}}}}, "route4": Null, "route6": Null, "router": Object {"key": String("6f241441-d4fd-4437-8ab8-d9c03a5832e5"), "lookup_type": Object {"ById": String("6f241441-d4fd-4437-8ab8-d9c03a5832e5")}, "parent": Object {"key": String("f8e83d21-ccf9-418f-8d28-ef8fd953b403"), "lookup_type": Object {"ByName": String("default")}, "parent": Object {"key": String("87aaa4f1-0672-47bd-b399-8861de8da8e7"), "lookup_type": Object {"ByName": String("peeky-park")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}}}, "subnet": Array [Object {"key": String("0d13bfa0-224d-4f5f-872e-6bda5c7f29ea"), "lookup_type": Object {"ById": String("0d13bfa0-224d-4f5f-872e-6bda5c7f29ea")}, "parent": Object {"key": String("f8e83d21-ccf9-418f-8d28-ef8fd953b403"), "lookup_type": Object {"ByName": String("default")}, "parent": Object {"key": String("87aaa4f1-0672-47bd-b399-8861de8da8e7"), "lookup_type": Object {"ByName": String("peeky-park")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}}}, Object {"custom_router_id": Null, "identity": Object {"description": String("The default subnet for default"), "id": String("0d13bfa0-224d-4f5f-872e-6bda5c7f29ea"), "name": String("default"), "time_created": String("2026-01-27T01:14:08.483094Z"), "time_deleted": Null, "time_modified": String("2026-01-27T01:14:08.483094Z")}, "ipv4_block": String("172.30.0.0/22"), "ipv6_block": String("fd4f:f905:66ff::/64"), "rcgen": Number(1), "vpc_id": String("f8e83d21-ccf9-418f-8d28-ef8fd953b403")}], "subnet_route_id": String("1a75a3ca-5545-42be-b4cb-8883d818a039"), "system_router_id": String("6f241441-d4fd-4437-8ab8-d9c03a5832e5"), "vpc": Null, "vpc_create_params": Object {"authz_project": Object {"key": String("87aaa4f1-0672-47bd-b399-8861de8da8e7"), "lookup_type": Object {"ByName": String("peeky-park")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}, "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}, "credential_id": Null, "device_token_expiration": Null}, Object {"mapped_fleet_roles": Object {}}]}}, "vpc_create": Object {"description": String("Default VPC"), "dns_name": String("default"), "ipv6_prefix": String("fd4f:f905:66ff::/48"), "name": String("default")}}, "vpc_id": String("f8e83d21-ccf9-418f-8d28-ef8fd953b403")} }) }
47492026-01-27T01:14:09.527ZTRACtest_vpcs (dropshot_external): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true local_addr = 127.0.0.1:50372 method = POST remote_addr = 127.0.0.1:38658 req_id = 2c4023ef-c6a2-448b-9a04-47ec3b9e1661 resource = AuditLog silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user uri = /v1/projects
47502026-01-27T01:14:09.527ZTRACtest_vpcs (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. } authenticated = true local_addr = 127.0.0.1:50372 method = POST remote_addr = 127.0.0.1:38658 req_id = 2c4023ef-c6a2-448b-9a04-47ec3b9e1661 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user uri = /v1/projects
47512026-01-27T01:14:09.527ZTRACtest_vpcs (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true local_addr = 127.0.0.1:50372 method = POST remote_addr = 127.0.0.1:38658 req_id = 2c4023ef-c6a2-448b-9a04-47ec3b9e1661 resource = Database silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user uri = /v1/projects
47522026-01-27T01:14:09.527ZDEBGtest_vpcs (dropshot_external): roles authenticated = true local_addr = 127.0.0.1:50372 method = POST remote_addr = 127.0.0.1:38658 req_id = 2c4023ef-c6a2-448b-9a04-47ec3b9e1661 roles = RoleSet { roles: {} } silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user uri = /v1/projects
47532026-01-27T01:14:09.527ZDEBGtest_vpcs (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true local_addr = 127.0.0.1:50372 method = POST remote_addr = 127.0.0.1:38658 req_id = 2c4023ef-c6a2-448b-9a04-47ec3b9e1661 resource = Database result = Ok(()) silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user uri = /v1/projects
47542026-01-27T01:14:09.532ZDEBGtest_vpcs (dropshot_external): roles authenticated = true local_addr = 127.0.0.1:50372 method = POST remote_addr = 127.0.0.1:38658 req_id = 2c4023ef-c6a2-448b-9a04-47ec3b9e1661 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} } silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user uri = /v1/projects
47552026-01-27T01:14:09.534ZDEBGtest_vpcs (dropshot_external): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true local_addr = 127.0.0.1:50372 method = POST remote_addr = 127.0.0.1:38658 req_id = 2c4023ef-c6a2-448b-9a04-47ec3b9e1661 resource = AuditLog result = Ok(()) silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user uri = /v1/projects
47562026-01-27T01:14:09.534ZTRACtest_vpcs (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true local_addr = 127.0.0.1:50372 method = POST remote_addr = 127.0.0.1:38658 req_id = 2c4023ef-c6a2-448b-9a04-47ec3b9e1661 resource = Database silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user uri = /v1/projects
47572026-01-27T01:14:09.534ZDEBGtest_vpcs (dropshot_external): roles authenticated = true local_addr = 127.0.0.1:50372 method = POST remote_addr = 127.0.0.1:38658 req_id = 2c4023ef-c6a2-448b-9a04-47ec3b9e1661 roles = RoleSet { roles: {} } silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user uri = /v1/projects
47582026-01-27T01:14:09.535ZDEBGtest_vpcs (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true local_addr = 127.0.0.1:50372 method = POST remote_addr = 127.0.0.1:38658 req_id = 2c4023ef-c6a2-448b-9a04-47ec3b9e1661 resource = Database result = Ok(()) silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user uri = /v1/projects
47592026-01-27T01:14:09.626ZINFOtest_vpcs (dropshot_external): request completed latency_us = 1739489 local_addr = 127.0.0.1:50372 method = POST remote_addr = 127.0.0.1:38658 req_id = 2c4023ef-c6a2-448b-9a04-47ec3b9e1661 response_code = 201 uri = /v1/projects
47602026-01-27T01:14:09.627ZINFOtest_vpcs (external client test context): client received response status = 201
47612026-01-27T01:14:09.627ZINFOtest_vpcs (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:50372/v1/vpcs?project=springfield-squidport
47622026-01-27T01:14:09.627ZTRACtest_vpcs (dropshot_external): incoming request local_addr = 127.0.0.1:50372 method = GET remote_addr = 127.0.0.1:38658 req_id = 10e4cfb1-114a-438d-beb2-ffccb00193f5 uri = /v1/vpcs?project=springfield-squidport
47632026-01-27T01:14:09.627ZDEBGtest_vpcs (dropshot_external): determined request API version local_addr = 127.0.0.1:50372 method = GET remote_addr = 127.0.0.1:38658 req_id = 10e4cfb1-114a-438d-beb2-ffccb00193f5 uri = /v1/vpcs?project=springfield-squidport version = 2026012300.0.0
47642026-01-27T01:14:09.628ZTRACtest_vpcs (dropshot_external): authn: trying Spoof local_addr = 127.0.0.1:50372 method = GET remote_addr = 127.0.0.1:38658 req_id = 10e4cfb1-114a-438d-beb2-ffccb00193f5 uri = /v1/vpcs?project=springfield-squidport
47652026-01-27T01:14:09.628ZDEBGtest_vpcs (dropshot_external): looking up silo for user local_addr = 127.0.0.1:50372 method = GET remote_addr = 127.0.0.1:38658 req_id = 10e4cfb1-114a-438d-beb2-ffccb00193f5 silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/vpcs?project=springfield-squidport
47662026-01-27T01:14:09.628ZTRACtest_vpcs (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. }) resource = Database
47672026-01-27T01:14:09.628ZDEBGtest_vpcs (ExternalAuthn): roles roles = RoleSet { roles: {} }
47682026-01-27T01:14:09.629ZDEBGtest_vpcs (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. }) resource = Database result = Ok(())
47692026-01-27T01:14:09.631ZDEBGtest_vpcs (results-sink): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
47702026-01-27T01:14:09.631ZDEBGtest_vpcs (results-sink-cluster): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
47712026-01-27T01:14:09.631ZDEBGtest_vpcs (clickhouse-client): unrolling 1 total samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 719060a6-12ac-470c-bb91-e566c7f997b2
47722026-01-27T01:14:09.633ZTRACtest_vpcs (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 719060a6-12ac-470c-bb91-e566c7f997b2 n_columns = 4 n_rows = 2 sql = INSERT INTO oximeter.fields_string FORMAT Native
47732026-01-27T01:14:09.636ZTRACtest_vpcs (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. }) resource = Database
47742026-01-27T01:14:09.636ZDEBGtest_vpcs (ExternalAuthn): roles roles = RoleSet { roles: {} }
47752026-01-27T01:14:09.637ZDEBGtest_vpcs (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. }) resource = Database result = Ok(())
47762026-01-27T01:14:09.639ZDEBGtest_vpcs (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 719060a6-12ac-470c-bb91-e566c7f997b2 n_rows = 2 table_name = fields_string
47772026-01-27T01:14:09.639ZTRACtest_vpcs (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 719060a6-12ac-470c-bb91-e566c7f997b2 n_columns = 4 n_rows = 1 sql = INSERT INTO oximeter.measurements_i64 FORMAT Native
47782026-01-27T01:14:09.641ZTRACtest_vpcs (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007 (silo_user), lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
47792026-01-27T01:14:09.642ZTRACtest_vpcs (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
47802026-01-27T01:14:09.642ZTRACtest_vpcs (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. }) resource = Database
47812026-01-27T01:14:09.642ZDEBGtest_vpcs (ExternalAuthn): roles roles = RoleSet { roles: {} }
47822026-01-27T01:14:09.643ZDEBGtest_vpcs (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. }) resource = Database result = Ok(())
47832026-01-27T01:14:09.646ZDEBGtest_vpcs (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 719060a6-12ac-470c-bb91-e566c7f997b2 n_rows = 1 table_name = measurements_i64
47842026-01-27T01:14:09.646ZTRACtest_vpcs (results-sink): successfully inserted samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
47852026-01-27T01:14:09.648ZTRACtest_vpcs (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
47862026-01-27T01:14:09.648ZTRACtest_vpcs (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. }) resource = Database
47872026-01-27T01:14:09.648ZDEBGtest_vpcs (ExternalAuthn): roles roles = RoleSet { roles: {} }
47882026-01-27T01:14:09.649ZDEBGtest_vpcs (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. }) resource = Database result = Ok(())
47892026-01-27T01:14:09.654ZDEBGtest_vpcs (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
47902026-01-27T01:14:09.659ZDEBGtest_vpcs (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007 (silo_user), lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
47912026-01-27T01:14:09.659ZTRACtest_vpcs (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. }) resource = Database
47922026-01-27T01:14:09.659ZDEBGtest_vpcs (ExternalAuthn): roles roles = RoleSet { roles: {} }
47932026-01-27T01:14:09.659ZDEBGtest_vpcs (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. }) resource = Database result = Ok(())
47942026-01-27T01:14:09.664ZTRACtest_vpcs (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
47952026-01-27T01:14:09.664ZTRACtest_vpcs (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
47962026-01-27T01:14:09.664ZTRACtest_vpcs (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. }) resource = Database
47972026-01-27T01:14:09.664ZDEBGtest_vpcs (ExternalAuthn): roles roles = RoleSet { roles: {} }
47982026-01-27T01:14:09.665ZDEBGtest_vpcs (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. }) resource = Database result = Ok(())
47992026-01-27T01:14:09.679ZTRACtest_vpcs (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
48002026-01-27T01:14:09.679ZTRACtest_vpcs (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. }) resource = Database
48012026-01-27T01:14:09.679ZDEBGtest_vpcs (ExternalAuthn): roles roles = RoleSet { roles: {} }
48022026-01-27T01:14:09.680ZDEBGtest_vpcs (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. }) resource = Database result = Ok(())
48032026-01-27T01:14:09.685ZDEBGtest_vpcs (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }