| 1 | 2026-01-27T01:13:43.739Z | DEBG | test_vpcs (init_with_steps): Running step start_crdb
|
| 2 | 2026-01-27T01:13:43.740Z | DEBG | test_vpcs: Starting CRDB
|
| 3 | 2026-01-27T01:13:43.789Z | INFO | test_vpcs: cockroach temporary directory: /var/tmp/omicron_tmp/.tmp7Gji4q
|
| 4 | 2026-01-27T01:13:43.789Z | INFO | test_vpcs: cockroach: copying from seed tarball (/var/tmp/omicron_tmp/crdb-base-build/2568847d748e1bae965de0b3126e3133c4bd29b2d2831f880273cca7dc24bf97.tar) to storage directory (/var/tmp/omicron_tmp/.tmp7Gji4q/data)
|
| 5 | 2026-01-27T01:13:43.818Z | INFO | test_vpcs: cockroach command line: cockroach start-single-node --insecure --http-addr=:0 --store=path=/var/tmp/omicron_tmp/.tmp7Gji4q/data,ballast-size=0 --listen-addr [::1]:0 --listening-url-file /var/tmp/omicron_tmp/.tmp7Gji4q/listen-url
|
| 6 | 2026-01-27T01:13:43.819Z | INFO | test_vpcs: cockroach environment: BUILDOMAT_JOB_ID=01KFY6DEWKSJ6KBWEPJMNGAW6V BUILDOMAT_TASK_ID=4 CARGO=/home/build/.rustup/toolchains/1.91.1-x86_64-unknown-illumos/bin/cargo CARGO_HOME=/home/build/.cargo CARGO_INCREMENTAL=0 CARGO_MANIFEST_DIR=/work/oxidecomputer/omicron/nexus CARGO_PKG_AUTHORS= CARGO_PKG_DESCRIPTION= CARGO_PKG_HOMEPAGE= CARGO_PKG_LICENSE=MPL-2.0 CARGO_PKG_LICENSE_FILE= CARGO_PKG_NAME=omicron-nexus CARGO_PKG_REPOSITORY= CARGO_PKG_RUST_VERSION= CARGO_PKG_VERSION=0.1.0 CARGO_PKG_VERSION_MAJOR=0 CARGO_PKG_VERSION_MINOR=1 CARGO_PKG_VERSION_PATCH=0 CARGO_PKG_VERSION_PRE= CARGO_TERM_COLOR=always CI=true CRDB_SEED_TAR=/var/tmp/omicron_tmp/crdb-base-build/2568847d748e1bae965de0b3126e3133c4bd29b2d2831f880273cca7dc24bf97.tar GITHUB_BRANCH=propolis-doorbell-buffernt GITHUB_REF=refs/heads/propolis-doorbell-buffernt GITHUB_REPOSITORY=oxidecomputer/omicron GITHUB_SHA=5db41474f9cbdbb902460f66375144650fa634e2 GOTRACEBACK=crash HOME=/home/build LANG=en_US.UTF-8 LC_ALL=en_US.UTF-8 LD_LIBRARY_PATH=/work/oxidecomputer/omicron/target/debug/build/aws-lc-sys-2365d10e992c2e9e/out/build/artifacts:/work/oxidecomputer/omicron/target/debug/build/blake3-3a6f042b78b00084/out:/work/oxidecomputer/omicron/target/debug/build/bzip2-sys-a5022a14d5411a51/out/lib:/work/oxidecomputer/omicron/target/debug/build/libgit2-sys-3c3387d8a4ad6ac9/out/build:/work/oxidecomputer/omicron/target/debug/build/ring-aaa5d3556d6e760b/out:/work/oxidecomputer/omicron/target/debug/build/tofino-ea950bd608a63962/out:/work/oxidecomputer/omicron/target/debug/build/zstd-sys-163c6620fa51a768/out:/work/oxidecomputer/omicron/target/debug/deps:/work/oxidecomputer/omicron/target/debug:/home/build/.rustup/toolchains/1.91.1-x86_64-unknown-illumos/lib/rustlib/x86_64-unknown-illumos/lib:/home/build/.rustup/toolchains/1.91.1-x86_64-unknown-illumos/lib LOGNAME=build NEXTEST=1 NEXTEST_ATTEMPT=1 NEXTEST_ATTEMPT_ID=0069c974-2637-48b9-9dc2-1efafeb7535a:omicron-nexus::test_all$integration_tests::vpcs::test_vpcs NEXTEST_BINARY_ID=omicron-nexus::test_all NEXTEST_BIN_EXE_nexus=/work/oxidecomputer/omicron/target/debug/nexus NEXTEST_BIN_EXE_schema-updater=/work/oxidecomputer/omicron/target/debug/schema-updater NEXTEST_BIN_EXE_schema_updater=/work/oxidecomputer/omicron/target/debug/schema-updater NEXTEST_EXECUTION_MODE=process-per-test NEXTEST_LD_LIBRARY_PATH=/work/oxidecomputer/omicron/target/debug/build/aws-lc-sys-2365d10e992c2e9e/out/build/artifacts:/work/oxidecomputer/omicron/target/debug/build/blake3-3a6f042b78b00084/out:/work/oxidecomputer/omicron/target/debug/build/bzip2-sys-a5022a14d5411a51/out/lib:/work/oxidecomputer/omicron/target/debug/build/libgit2-sys-3c3387d8a4ad6ac9/out/build:/work/oxidecomputer/omicron/target/debug/build/ring-aaa5d3556d6e760b/out:/work/oxidecomputer/omicron/target/debug/build/tofino-ea950bd608a63962/out:/work/oxidecomputer/omicron/target/debug/build/zstd-sys-163c6620fa51a768/out:/work/oxidecomputer/omicron/target/debug/deps:/work/oxidecomputer/omicron/target/debug:/home/build/.rustup/toolchains/1.91.1-x86_64-unknown-illumos/lib/rustlib/x86_64-unknown-illumos/lib:/home/build/.rustup/toolchains/1.91.1-x86_64-unknown-illumos/lib NEXTEST_PROFILE=ci NEXTEST_RUN_ID=0069c974-2637-48b9-9dc2-1efafeb7535a NEXTEST_RUN_MODE=test NEXTEST_STRESS_CURRENT=none NEXTEST_STRESS_TOTAL=none NEXTEST_TEST_GLOBAL_SLOT=3 NEXTEST_TEST_GROUP=@global NEXTEST_TEST_GROUP_SLOT=none NEXTEST_TEST_NAME=integration_tests::vpcs::test_vpcs NEXTEST_TEST_PHASE=run NEXTEST_TOTAL_ATTEMPTS=1 OUT_DIR=/work/oxidecomputer/omicron/target/debug/build/omicron-nexus-6c541d174146822e/out PATH=/work/oxidecomputer/omicron/out/mgd/root/opt/oxide/mgd/bin:/work/oxidecomputer/omicron/out/dendrite-stub/bin:/work/oxidecomputer/omicron/out/clickhouse:/work/oxidecomputer/omicron/out/cockroachdb/bin:/home/build/.cargo/bin:/usr/bin:/bin:/usr/sbin:/sbin:/opt/ooce/bin:/opt/ooce/sbin PWD=/work/oxidecomputer/omicron RUSTC_BOOTSTRAP=1 RUSTDOCFLAGS=--document-private-items -D warnings RUSTFLAGS=--cfg tokio_unstable -D warnings -C link-arg=-R/usr/platform/oxide/lib/amd64 RUSTUP_HOME=/home/build/.rustup RUSTUP_TOOLCHAIN=1.91.1-x86_64-unknown-illumos RUST_BACKTRACE=1 RUST_RECURSION_COUNT=1 SHLVL=1 SSL_CERT_DIR=/usr/ssl/certs SSL_CERT_FILE=/etc/ssl/cacert.pem TMPDIR=/var/tmp/omicron_tmp TZ=UTC USER=build _=/usr/bin/ptime
|
| 7 | 2026-01-27T01:13:45.370Z | INFO | test_vpcs: cockroach pid: 7908
|
| 8 | 2026-01-27T01:13:45.370Z | INFO | test_vpcs: cockroach listen URL: postgresql://root@[::1]:42398/omicron?sslmode=disable
|
| 9 | 2026-01-27T01:13:45.430Z | DEBG | test_vpcs (init_with_steps): Running step start_clickhouse
|
| 10 | 2026-01-27T01:13:45.430Z | DEBG | test_vpcs: Starting Clickhouse
|
| 11 | 2026-01-27T01:13:45.972Z | DEBG | test_vpcs (init_with_steps): Running step start_internal_dns
|
| 12 | 2026-01-27T01:13:45.972Z | INFO | test_vpcs (store): opening sled database
path = /var/tmp/omicron_tmp/.tmpivKHJM
|
| 13 | 2026-01-27T01:13:46.105Z | INFO | test_vpcs (store): pruning trees for generations newer than 0
|
| 14 | 2026-01-27T01:13:46.106Z | INFO | test_vpcs (store): pruning trees for generations older than 0
keep = 3
|
| 15 | 2026-01-27T01:13:46.107Z | INFO | test_vpcs (dns): DNS server bound to address
kind = dns
local_address = [::1]:46325
|
| 16 | 2026-01-27T01:13:46.108Z | DEBG | test_vpcs (http): registered endpoint
kind = dns
local_addr = [::1]:65457
method = GET
path = /config
versions = all starting from 2.0.0
|
| 17 | 2026-01-27T01:13:46.108Z | DEBG | test_vpcs (http): registered endpoint
kind = dns
local_addr = [::1]:65457
method = GET
path = /config
versions = from 1.0.0 to 2.0.0
|
| 18 | 2026-01-27T01:13:46.108Z | DEBG | test_vpcs (http): registered endpoint
kind = dns
local_addr = [::1]:65457
method = PUT
path = /config
versions = all starting from 2.0.0
|
| 19 | 2026-01-27T01:13:46.108Z | DEBG | test_vpcs (http): registered endpoint
kind = dns
local_addr = [::1]:65457
method = PUT
path = /config
versions = from 1.0.0 to 2.0.0
|
| 20 | 2026-01-27T01:13:46.108Z | INFO | test_vpcs (http): listening
kind = dns
local_addr = [::1]:65457
|
| 21 | 2026-01-27T01:13:46.111Z | DEBG | test_vpcs (http): successfully registered DTrace USDT probes
kind = dns
local_addr = [::1]:65457
|
| 22 | 2026-01-27T01:13:46.111Z | DEBG | test_vpcs (init_with_steps): Running step start_external_dns
|
| 23 | 2026-01-27T01:13:46.111Z | INFO | test_vpcs (store): opening sled database
path = /var/tmp/omicron_tmp/.tmpWwEbC2
|
| 24 | 2026-01-27T01:13:46.128Z | INFO | test_vpcs (store): pruning trees for generations newer than 0
|
| 25 | 2026-01-27T01:13:46.129Z | INFO | test_vpcs (store): pruning trees for generations older than 0
keep = 3
|
| 26 | 2026-01-27T01:13:46.129Z | INFO | test_vpcs (dns): DNS server bound to address
kind = dns
local_address = [::1]:55507
|
| 27 | 2026-01-27T01:13:46.129Z | DEBG | test_vpcs (http): registered endpoint
kind = dns
local_addr = [::1]:53796
method = GET
path = /config
versions = all starting from 2.0.0
|
| 28 | 2026-01-27T01:13:46.129Z | DEBG | test_vpcs (http): registered endpoint
kind = dns
local_addr = [::1]:53796
method = GET
path = /config
versions = from 1.0.0 to 2.0.0
|
| 29 | 2026-01-27T01:13:46.129Z | DEBG | test_vpcs (http): registered endpoint
kind = dns
local_addr = [::1]:53796
method = PUT
path = /config
versions = all starting from 2.0.0
|
| 30 | 2026-01-27T01:13:46.129Z | DEBG | test_vpcs (http): registered endpoint
kind = dns
local_addr = [::1]:53796
method = PUT
path = /config
versions = from 1.0.0 to 2.0.0
|
| 31 | 2026-01-27T01:13:46.129Z | INFO | test_vpcs (http): listening
kind = dns
local_addr = [::1]:53796
|
| 32 | 2026-01-27T01:13:46.131Z | DEBG | test_vpcs (http): successfully registered DTrace USDT probes
kind = dns
local_addr = [::1]:53796
|
| 33 | 2026-01-27T01:13:46.131Z | DEBG | test_vpcs (init_with_steps): Running step start_nexus_internal
|
| 34 | 2026-01-27T01:13:46.131Z | DEBG | test_vpcs: Starting Nexus (internal API)
|
| 35 | 2026-01-27T01:13:46.132Z | INFO | test_vpcs: setting up nexus server
|
| 36 | 2026-01-27T01:13:46.138Z | INFO | test_vpcs (ServerContext): registering Oso class
class = Action
|
| 37 | 2026-01-27T01:13:46.138Z | INFO | test_vpcs (ServerContext): registering Oso class
class = AuditLog
|
| 38 | 2026-01-27T01:13:46.138Z | INFO | test_vpcs (ServerContext): registering Oso class
class = AnyActor
|
| 39 | 2026-01-27T01:13:46.138Z | INFO | test_vpcs (ServerContext): registering Oso class
class = AuthenticatedActor
|
| 40 | 2026-01-27T01:13:46.138Z | INFO | test_vpcs (ServerContext): registering Oso class
class = BlueprintConfig
|
| 41 | 2026-01-27T01:13:46.138Z | INFO | test_vpcs (ServerContext): registering Oso class
class = Database
|
| 42 | 2026-01-27T01:13:46.138Z | INFO | test_vpcs (ServerContext): registering Oso class
class = DnsConfig
|
| 43 | 2026-01-27T01:13:46.138Z | INFO | test_vpcs (ServerContext): registering Oso class
class = Fleet
|
| 44 | 2026-01-27T01:13:46.138Z | INFO | test_vpcs (ServerContext): registering Oso class
class = Inventory
|
| 45 | 2026-01-27T01:13:46.138Z | INFO | test_vpcs (ServerContext): registering Oso class
class = IpPoolList
|
| 46 | 2026-01-27T01:13:46.138Z | INFO | test_vpcs (ServerContext): registering Oso class
class = VpcList
|
| 47 | 2026-01-27T01:13:46.138Z | INFO | test_vpcs (ServerContext): registering Oso class
class = ConsoleSessionList
|
| 48 | 2026-01-27T01:13:46.138Z | INFO | test_vpcs (ServerContext): registering Oso class
class = DeviceAuthRequestList
|
| 49 | 2026-01-27T01:13:46.139Z | INFO | test_vpcs (ServerContext): registering Oso class
class = QuiesceState
|
| 50 | 2026-01-27T01:13:46.139Z | INFO | test_vpcs (ServerContext): registering Oso class
class = SiloCertificateList
|
| 51 | 2026-01-27T01:13:46.139Z | INFO | test_vpcs (ServerContext): registering Oso class
class = SiloGroupList
|
| 52 | 2026-01-27T01:13:46.139Z | INFO | test_vpcs (ServerContext): registering Oso class
class = SiloIdentityProviderList
|
| 53 | 2026-01-27T01:13:46.139Z | INFO | test_vpcs (ServerContext): registering Oso class
class = SiloUserList
|
| 54 | 2026-01-27T01:13:46.139Z | INFO | test_vpcs (ServerContext): registering Oso class
class = SiloUserSessionList
|
| 55 | 2026-01-27T01:13:46.139Z | INFO | test_vpcs (ServerContext): registering Oso class
class = SiloUserTokenList
|
| 56 | 2026-01-27T01:13:46.139Z | INFO | test_vpcs (ServerContext): registering Oso class
class = SubnetPoolList
|
| 57 | 2026-01-27T01:13:46.139Z | INFO | test_vpcs (ServerContext): registering Oso class
class = UpdateTrustRootList
|
| 58 | 2026-01-27T01:13:46.139Z | INFO | test_vpcs (ServerContext): registering Oso class
class = TargetReleaseConfig
|
| 59 | 2026-01-27T01:13:46.139Z | INFO | test_vpcs (ServerContext): registering Oso class
class = AlertClassList
|
| 60 | 2026-01-27T01:13:46.139Z | INFO | test_vpcs (ServerContext): registering Oso class
class = ScimClientBearerTokenList
|
| 61 | 2026-01-27T01:13:46.139Z | INFO | test_vpcs (ServerContext): registering Oso class
class = MulticastGroupList
|
| 62 | 2026-01-27T01:13:46.139Z | INFO | test_vpcs (ServerContext): registering Oso class
class = Project
|
| 63 | 2026-01-27T01:13:46.139Z | INFO | test_vpcs (ServerContext): registering Oso class
class = Disk
|
| 64 | 2026-01-27T01:13:46.140Z | INFO | test_vpcs (ServerContext): registering Oso class
class = Snapshot
|
| 65 | 2026-01-27T01:13:46.140Z | INFO | test_vpcs (ServerContext): registering Oso class
class = ProjectImage
|
| 66 | 2026-01-27T01:13:46.140Z | INFO | test_vpcs (ServerContext): registering Oso class
class = AffinityGroup
|
| 67 | 2026-01-27T01:13:46.140Z | INFO | test_vpcs (ServerContext): registering Oso class
class = AntiAffinityGroup
|
| 68 | 2026-01-27T01:13:46.140Z | INFO | test_vpcs (ServerContext): registering Oso class
class = Instance
|
| 69 | 2026-01-27T01:13:46.140Z | INFO | test_vpcs (ServerContext): registering Oso class
class = IpPool
|
| 70 | 2026-01-27T01:13:46.140Z | INFO | test_vpcs (ServerContext): registering Oso class
class = InstanceNetworkInterface
|
| 71 | 2026-01-27T01:13:46.140Z | INFO | test_vpcs (ServerContext): registering Oso class
class = Vpc
|
| 72 | 2026-01-27T01:13:46.140Z | INFO | test_vpcs (ServerContext): registering Oso class
class = VpcRouter
|
| 73 | 2026-01-27T01:13:46.140Z | INFO | test_vpcs (ServerContext): registering Oso class
class = InternetGateway
|
| 74 | 2026-01-27T01:13:46.140Z | INFO | test_vpcs (ServerContext): registering Oso class
class = InternetGatewayIpPool
|
| 75 | 2026-01-27T01:13:46.140Z | INFO | test_vpcs (ServerContext): registering Oso class
class = InternetGatewayIpAddress
|
| 76 | 2026-01-27T01:13:46.140Z | INFO | test_vpcs (ServerContext): registering Oso class
class = RouterRoute
|
| 77 | 2026-01-27T01:13:46.140Z | INFO | test_vpcs (ServerContext): registering Oso class
class = VpcSubnet
|
| 78 | 2026-01-27T01:13:46.140Z | INFO | test_vpcs (ServerContext): registering Oso class
class = FloatingIp
|
| 79 | 2026-01-27T01:13:46.140Z | INFO | test_vpcs (ServerContext): registering Oso class
class = ExternalSubnet
|
| 80 | 2026-01-27T01:13:46.140Z | INFO | test_vpcs (ServerContext): registering Oso class
class = Image
|
| 81 | 2026-01-27T01:13:46.140Z | INFO | test_vpcs (ServerContext): registering Oso class
class = SiloImage
|
| 82 | 2026-01-27T01:13:46.140Z | INFO | test_vpcs (ServerContext): registering Oso class
class = AddressLot
|
| 83 | 2026-01-27T01:13:46.140Z | INFO | test_vpcs (ServerContext): registering Oso class
class = Blueprint
|
| 84 | 2026-01-27T01:13:46.140Z | INFO | test_vpcs (ServerContext): registering Oso class
class = LoopbackAddress
|
| 85 | 2026-01-27T01:13:46.140Z | INFO | test_vpcs (ServerContext): registering Oso class
class = Certificate
|
| 86 | 2026-01-27T01:13:46.140Z | INFO | test_vpcs (ServerContext): registering Oso class
class = ConsoleSession
|
| 87 | 2026-01-27T01:13:46.140Z | INFO | test_vpcs (ServerContext): registering Oso class
class = DeviceAuthRequest
|
| 88 | 2026-01-27T01:13:46.140Z | INFO | test_vpcs (ServerContext): registering Oso class
class = DeviceAccessToken
|
| 89 | 2026-01-27T01:13:46.141Z | INFO | test_vpcs (ServerContext): registering Oso class
class = PhysicalDisk
|
| 90 | 2026-01-27T01:13:46.141Z | INFO | test_vpcs (ServerContext): registering Oso class
class = Rack
|
| 91 | 2026-01-27T01:13:46.141Z | INFO | test_vpcs (ServerContext): registering Oso class
class = SshKey
|
| 92 | 2026-01-27T01:13:46.141Z | INFO | test_vpcs (ServerContext): registering Oso class
class = Silo
|
| 93 | 2026-01-27T01:13:46.141Z | INFO | test_vpcs (ServerContext): registering Oso class
class = SiloUser
|
| 94 | 2026-01-27T01:13:46.141Z | INFO | test_vpcs (ServerContext): registering Oso class
class = SiloGroup
|
| 95 | 2026-01-27T01:13:46.141Z | INFO | test_vpcs (ServerContext): registering Oso class
class = SupportBundle
|
| 96 | 2026-01-27T01:13:46.141Z | INFO | test_vpcs (ServerContext): registering Oso class
class = IdentityProvider
|
| 97 | 2026-01-27T01:13:46.141Z | INFO | test_vpcs (ServerContext): registering Oso class
class = SamlIdentityProvider
|
| 98 | 2026-01-27T01:13:46.141Z | INFO | test_vpcs (ServerContext): registering Oso class
class = Sled
|
| 99 | 2026-01-27T01:13:46.141Z | INFO | test_vpcs (ServerContext): registering Oso class
class = SubnetPool
|
| 100 | 2026-01-27T01:13:46.141Z | INFO | test_vpcs (ServerContext): registering Oso class
class = TufRepo
|
| 101 | 2026-01-27T01:13:46.141Z | INFO | test_vpcs (ServerContext): registering Oso class
class = TufArtifact
|
| 102 | 2026-01-27T01:13:46.141Z | INFO | test_vpcs (ServerContext): registering Oso class
class = TufTrustRoot
|
| 103 | 2026-01-27T01:13:46.141Z | INFO | test_vpcs (ServerContext): registering Oso class
class = Alert
|
| 104 | 2026-01-27T01:13:46.141Z | INFO | test_vpcs (ServerContext): registering Oso class
class = AlertReceiver
|
| 105 | 2026-01-27T01:13:46.141Z | INFO | test_vpcs (ServerContext): registering Oso class
class = WebhookSecret
|
| 106 | 2026-01-27T01:13:46.141Z | INFO | test_vpcs (ServerContext): registering Oso class
class = Zpool
|
| 107 | 2026-01-27T01:13:46.141Z | INFO | test_vpcs (ServerContext): registering Oso class
class = Service
|
| 108 | 2026-01-27T01:13:46.141Z | INFO | test_vpcs (ServerContext): registering Oso class
class = UserBuiltin
|
| 109 | 2026-01-27T01:13:46.141Z | INFO | test_vpcs (ServerContext): registering Oso class
class = ScimClientBearerToken
|
| 110 | 2026-01-27T01:13:46.141Z | INFO | test_vpcs (ServerContext): registering Oso class
class = MulticastGroup
|
| 111 | 2026-01-27T01:13:46.141Z | INFO | test_vpcs (ServerContext): full Oso configuration
config = #\n# Oso configuration for Omicron\n# This file is augmented by generated snippets.\n#\n\n#\n# ACTOR TYPES AND BASIC RULES\n#\n\n# `AnyActor` includes both authenticated and unauthenticated users.\nactor AnyActor {}\n\n# An `AuthenticatedActor` has an identity in the system. All of our operations\n# today require that an actor be authenticated.\nactor AuthenticatedActor {}\n\n# For any resource, `actor` can perform action `action` on it if they're\n# authenticated and their role(s) give them the corresponding permission on that\n# resource.\nallow(actor: AnyActor, action: Action, resource) if\n actor.authenticated and\n has_permission(actor.authn_actor.unwrap(), action.to_perm(), resource);\n\n# Define role relationships\nhas_role(actor: AuthenticatedActor, role: String, resource: Resource)\n\tif resource.has_role(actor, role);\n\n#\n# ROLES AND PERMISSIONS IN THE FLEET/SILO/PROJECT HIERARCHY\n#\n# We define the following permissions for most resources in the system:\n#\n# - "create_child": required to create child resources (of any type)\n#\n# - "list_children": required to list child resources (of all types) of a\n# resource\n#\n# - "modify": required to modify or delete a resource\n#\n# - "read": required to read a resource\n#\n# We define the following predefined roles for only a few high-level resources:\n# the Fleet (see below), Silo, Organization, and Project. The specific roles\n# are oriented around intended use-cases:\n#\n# - "admin": has all permissions on the resource\n#\n# - "collaborator": has "read", "list_children", and "create_child", plus\n# the "admin" role for child resources. The idea is that if you're an\n# Organization Collaborator, you have full control over the Projects within\n# the Organization, but you cannot modify or delete the Organization itself.\n#\n# - "viewer": has "read" and "list_children" on a resource\n#\n# Below the Project level, permissions are granted via roles at the Project\n# level. For example, for someone to be able to create, modify, or delete any\n# Instances, they must be granted project.collaborator, which means they can\n# create, modify, or delete _all_ resources in the Project.\n#\n# The complete set of predefined roles:\n#\n# - fleet.admin (superuser for the whole system)\n# - fleet.collaborator (can manage Silos)\n# - fleet.viewer (can read most non-siloed resources in the system)\n# - silo.admin (superuser for the silo)\n# - silo.collaborator (can create and own Organizations; grants project.admin on all projects)\n# - silo.limited-collaborator (grants project.limited-collaborator on all projects)\n# - silo.viewer (can read most resources within the Silo; grants project.viewer)\n# - organization.admin (complete control over an organization)\n# - organization.collaborator (can manage Projects)\n# - organization.viewer (can read most resources within the Organization)\n# - project.admin (complete control over a Project)\n# - project.collaborator (can manage all resources within the Project, including networking)\n# - project.limited-collaborator (can manage compute resources, but not networking resources)\n# - project.viewer (can read most resources within the Project)\n#\n# Outside the Silo/Organization/Project hierarchy, we (currently) treat most\n# resources as nested under Fleet or else a synthetic resource (see below). We\n# do not yet support role assignments on anything other than Fleet, Silo,\n# Organization, or Project.\n#\n\n# "Fleet" is a global singleton representing the whole system. The name comes\n# from the idea described in RFD 24, but it's not quite right. This probably\n# should be more like "Region" or "AvailabilityZone". The precise boundaries\n# have not yet been figured out.\nresource Fleet {\n\tpermissions = [\n\t "list_children",\n\t "modify",\n\t "read",\n\t "create_child",\n\t];\n\n\troles = [\n\t # Roles that can be attached by users\n\t "admin",\n\t "collaborator",\n\t "viewer",\n\n\t # Internal-only roles\n\t "external-authenticator"\n\t];\n\n\t# Roles implied by other roles on this resource\n\t"viewer" if "collaborator";\n\t"collaborator" if "admin";\n\n\t# Permissions granted directly by roles on this resource\n\t"list_children" if "viewer";\n\t"read" if "viewer";\n\t"create_child" if "collaborator";\n\t"modify" if "admin";\n}\n\n# For fleets specifically, roles can be conferred by roles on the user's Silo.\n# Note that certain Actors may not ever have any roles assigned to them, like\n# SCIM Actors.\nhas_role(actor: AuthenticatedActor, role: String, _: Fleet) if\n\tsilo_role in actor.confers_fleet_role(role) and\n\thas_role(actor, silo_role, actor.silo.unwrap());\n\nresource Silo {\n\tpermissions = [\n\t "list_children",\n\t "modify",\n\t "read",\n\t "create_child",\n\t];\n\troles = [ "admin", "collaborator", "limited-collaborator", "viewer" ];\n\n\t# Roles implied by other roles on this resource\n\t"viewer" if "limited-collaborator";\n\t"limited-collaborator" if "collaborator";\n\t"collaborator" if "admin";\n\n\t# Permissions granted directly by roles on this resource\n\t"list_children" if "viewer";\n\t"read" if "viewer";\n\n\t"create_child" if "collaborator";\n\t"modify" if "admin";\n\n\t# Permissions implied by roles on this resource's parent (Fleet). Fleet\n\t# privileges allow a user to see and potentially administer the Silo,\n\t# but they do not give anyone permission to look at anything inside the\n\t# Silo. To achieve this, we use permission rules here. (If we granted\n\t# Fleet administrators _roles_ on the Silo, then those would cascade\n\t# into the Silo as well.)\n\trelations = { parent_fleet: Fleet };\n\t"read" if "viewer" on "parent_fleet";\n\t"modify" if "collaborator" on "parent_fleet";\n\n\t# external authenticator has to create silo users\n\t"list_children" if "external-authenticator" on "parent_fleet";\n\t"create_child" if "external-authenticator" on "parent_fleet";\n}\n\nhas_relation(fleet: Fleet, "parent_fleet", silo: Silo)\n\tif silo.fleet = fleet;\n\n# As a special case, all authenticated users can read their own Silo. That's\n# not quite the same as having the "viewer" role. For example, they cannot list\n# Organizations in the Silo.\n#\n# One reason this is necessary is because if an unprivileged user tries to\n# create an Organization using "POST /organizations", they should get back a 403\n# (which implies they're able to see /organizations, which is essentially seeing\n# the Silo itself) rather than a 404. This behavior isn't a hard constraint\n# (i.e., you could reasonably get a 404 for an API you're not allowed to call).\n# Nor is the implementation (i.e., we could special-case this endpoint somehow).\n# But granting this permission is the simplest way to keep this endpoint's\n# behavior consistent with the rest of the API.\n#\n# This rule is also used to determine if a user can list the identity providers\n# in the Silo (which they should be able to), since that's predicated on being\n# able to read the Silo.\n#\n# It's unclear what else would break if users couldn't see their own Silo.\nhas_permission(actor: AuthenticatedActor, "read", silo: Silo)\n\tif actor.is_user and silo in actor.silo;\n\nresource Project {\n\tpermissions = [\n\t "list_children",\n\t "modify",\n\t "read",\n\t "create_child",\n\t];\n\troles = [ "admin", "collaborator", "limited-collaborator", "viewer" ];\n\n\t# Roles implied by other roles on this resource\n\t# Role hierarchy: admin > collaborator > limited-collaborator > viewer\n\t#\n\t# The "limited-collaborator" role can create/modify non-networking\n\t# resources (instances, disks, etc.) but cannot create/modify networking\n\t# infrastructure (VPCs, subnets, routers, internet gateways).\n\t# See nexus/authz-macros for InProjectLimited vs InProjectFull.\n\t"viewer" if "limited-collaborator";\n\t"limited-collaborator" if "collaborator";\n\t"collaborator" if "admin";\n\n\t# Permissions granted directly by roles on this resource\n\t"list_children" if "viewer";\n\t"read" if "viewer";\n\t"create_child" if "limited-collaborator";\n\t"modify" if "admin";\n\n\t# Roles implied by roles on this resource's parent (Silo)\n\trelations = { parent_silo: Silo };\n\t"admin" if "collaborator" on "parent_silo";\n\t"limited-collaborator" if "limited-collaborator" on "parent_silo";\n\t"viewer" if "viewer" on "parent_silo";\n}\nhas_relation(silo: Silo, "parent_silo", project: Project)\n\tif project.silo = silo;\n\n#\n# GENERAL RESOURCES OUTSIDE THE SILO/PROJECT HIERARCHY\n#\n# Many resources use snippets of Polar generated by the `authz_resource!` Rust\n# macro. Some resources require custom Polar code. Those appear here.\n#\n\nresource Certificate {\n\tpermissions = [ "read", "modify" ];\n\trelations = { parent_silo: Silo, parent_fleet: Fleet };\n\n\t# Fleet-level and silo-level roles both grant privileges on certificates.\n\t"read" if "admin" on "parent_silo";\n\t"modify" if "admin" on "parent_silo";\n\t"read" if "admin" on "parent_fleet";\n\t"modify" if "admin" on "parent_fleet";\n}\nhas_relation(silo: Silo, "parent_silo", certificate: Certificate)\n\tif certificate.silo = silo;\nhas_relation(fleet: Fleet, "parent_fleet", certificate: Certificate)\n\tif certificate.silo.fleet = fleet;\n\nresource SiloUser {\n\tpermissions = [\n\t "list_children",\n\t "modify",\n\t "read",\n\t "create_child",\n\t];\n\n\t# Fleet and Silo administrators can manage a Silo's users. This is one\n\t# of the only areas of Silo configuration that Fleet Administrators have\n\t# permissions on.\n\trelations = { parent_silo: Silo, parent_fleet: Fleet };\n\t"list_children" if "read" on "parent_silo";\n\t"read" if "read" on "parent_silo";\n\t"modify" if "admin" on "parent_silo";\n\t"create_child" if "admin" on "parent_silo";\n\t"list_children" if "read" on "parent_fleet";\n\t"read" if "read" on "parent_fleet";\n\t"modify" if "admin" on "parent_fleet";\n\t"create_child" if "admin" on "parent_fleet";\n}\nhas_relation(silo: Silo, "parent_silo", user: SiloUser)\n\tif user.silo = silo;\nhas_relation(fleet: Fleet, "parent_fleet", user: SiloUser)\n\tif user.silo.fleet = fleet;\n\n# authenticated actors have all permissions on themselves\nhas_permission(actor: AuthenticatedActor, _perm: String, silo_user: SiloUser)\n if actor.equals_silo_user(silo_user);\n\nhas_permission(actor: AuthenticatedActor, "read", silo_user: SiloUser)\n if actor.is_user and silo_user.silo in actor.silo;\n\nresource SiloGroup {\n\tpermissions = [\n\t "list_children",\n\t "modify",\n\t "read",\n\t "create_child",\n\t];\n\n\trelations = { parent_silo: Silo };\n\t"list_children" if "read" on "parent_silo";\n\t"read" if "read" on "parent_silo";\n\t"modify" if "admin" on "parent_silo";\n\t"create_child" if "admin" on "parent_silo";\n}\nhas_relation(silo: Silo, "parent_silo", group: SiloGroup)\n\tif group.silo = silo;\n\nresource SshKey {\n\tpermissions = [ "read", "modify" ];\n\trelations = { silo_user: SiloUser };\n\n\t"read" if "read" on "silo_user";\n}\n# We want to allow the user to modify the ssh key but disallow a SCIM IdP token\n# from doing the same.\nhas_permission(actor: AuthenticatedActor, "modify", ssh_key: SshKey)\n\tif actor.is_user and has_permission(actor, "modify", ssh_key.silo_user);\nhas_relation(user: SiloUser, "silo_user", ssh_key: SshKey)\n\tif ssh_key.silo_user = user;\n\nresource IdentityProvider {\n\tpermissions = [\n\t "read",\n\t "modify",\n\t "create_child",\n\t "list_children",\n\t];\n\trelations = { parent_silo: Silo, parent_fleet: Fleet };\n\n\t# Silo-level roles grant privileges on identity providers.\n\t"read" if "viewer" on "parent_silo";\n\t"list_children" if "viewer" on "parent_silo";\n\t"modify" if "admin" on "parent_silo";\n\t"create_child" if "admin" on "parent_silo";\n\n\t# Fleet-level roles also grant privileges on identity providers.\n\t"read" if "viewer" on "parent_fleet";\n\t"list_children" if "viewer" on "parent_fleet";\n\t"modify" if "admin" on "parent_fleet";\n\t"create_child" if "admin" on "parent_fleet";\n}\nhas_relation(silo: Silo, "parent_silo", identity_provider: IdentityProvider)\n\tif identity_provider.silo = silo;\nhas_relation(fleet: Fleet, "parent_fleet", collection: IdentityProvider)\n\tif collection.silo.fleet = fleet;\n\nresource SamlIdentityProvider {\n\tpermissions = [\n\t "read",\n\t "modify",\n\t "create_child",\n\t "list_children",\n\t];\n\trelations = { parent_silo: Silo, parent_fleet: Fleet };\n\n\t# Silo-level roles grant privileges on identity providers.\n\t"read" if "viewer" on "parent_silo";\n\t"list_children" if "viewer" on "parent_silo";\n\t"modify" if "admin" on "parent_silo";\n\t"create_child" if "admin" on "parent_silo";\n\n\t# Fleet-level roles also grant privileges on identity providers.\n\t"read" if "viewer" on "parent_fleet";\n\t"list_children" if "viewer" on "parent_fleet";\n\t"modify" if "admin" on "parent_fleet";\n\t"create_child" if "admin" on "parent_fleet";\n}\nhas_relation(silo: Silo, "parent_silo", saml_identity_provider: SamlIdentityProvider)\n\tif saml_identity_provider.silo = silo;\nhas_relation(fleet: Fleet, "parent_fleet", collection: SamlIdentityProvider)\n\tif collection.silo.fleet = fleet;\n\nresource ScimClientBearerToken {\n\tpermissions = [ "read", "modify" ];\n\trelations = { parent_silo: Silo, parent_fleet: Fleet };\n\n # necessary to authenticate SCIM actors\n\t"read" if "external-authenticator" on "parent_fleet";\n\n\t# Silo-level roles grant privileges for SCIM client tokens.\n\t"read" if "admin" on "parent_silo";\n\t"modify" if "admin" on "parent_silo";\n\n\t# Fleet-level roles also grant privileges for SCIM client tokens.\n\t"read" if "admin" on "parent_fleet";\n\t"modify" if "admin" on "parent_fleet";\n}\nhas_relation(silo: Silo, "parent_silo", scim_client_bearer_token: ScimClientBearerToken)\n\tif scim_client_bearer_token.silo = silo;\nhas_relation(fleet: Fleet, "parent_fleet", collection: ScimClientBearerToken)\n\tif collection.silo.fleet = fleet;\n\n\n#\n# SYNTHETIC RESOURCES OUTSIDE THE SILO HIERARCHY\n#\n# The resources here do not correspond to anything that appears explicitly in\n# the API or is stored in the database. These are used either at the top level\n# of the API path (e.g., "/v1/system/ip-pools") or as an implementation detail of the system\n# (in the case of console sessions and "Database"). The policies are\n# either statically-defined in this file or driven by role assignments on the\n# Fleet. None of these resources defines their own roles.\n#\n\n# Describes the quiesce state of a particular Nexus instance.\n#\n# These authz checks must not require the database. We grant this directly to\n# callers of the internal API.\nresource QuiesceState {\n\tpermissions = [ "read", "modify" ];\n}\nhas_permission(USER_INTERNAL_API: AuthenticatedActor, "read", _q: QuiesceState);\nhas_permission(\n USER_INTERNAL_API: AuthenticatedActor,\n "modify",\n _q: QuiesceState\n);\n\n# Describes the policy for reading and modifying DNS configuration\n# (both internal and external)\nresource DnsConfig {\n\tpermissions = [ "read", "modify" ];\n\trelations = { parent_fleet: Fleet };\n\t# "external-authenticator" requires these permissions because that's the\n\t# context that Nexus uses when creating and deleting Silos. These\n\t# operations necessarily need to read and modify DNS configuration.\n\t"read" if "external-authenticator" on "parent_fleet";\n\t"modify" if "external-authenticator" on "parent_fleet";\n\t# "admin" on the parent fleet also gets these permissions, primarily for\n\t# the test suite.\n\t"read" if "admin" on "parent_fleet";\n\t"modify" if "admin" on "parent_fleet";\n}\nhas_relation(fleet: Fleet, "parent_fleet", dns_config: DnsConfig)\n\tif dns_config.fleet = fleet;\n\n# Describes the policy for accessing blueprints\nresource BlueprintConfig {\n\tpermissions = [\n\t "list_children", # list blueprints\n\t "create_child", # create blueprint\n\t "read", # read the current target\n\t "modify", # change the current target\n\t];\n\n\trelations = { parent_fleet: Fleet };\n\t"create_child" if "admin" on "parent_fleet";\n\t"modify" if "admin" on "parent_fleet";\n\t"list_children" if "viewer" on "parent_fleet";\n\t"read" if "viewer" on "parent_fleet";\n}\nhas_relation(fleet: Fleet, "parent_fleet", list: BlueprintConfig)\n\tif list.fleet = fleet;\n\n# Describes the policy for accessing "/v1/system/update/trust-roots" in the API\nresource UpdateTrustRootList {\n\tpermissions = [ "list_children", "create_child" ];\n\trelations = { parent_fleet: Fleet };\n\t"list_children" if "viewer" on "parent_fleet";\n\t"create_child" if "admin" on "parent_fleet";\n}\nhas_relation(fleet: Fleet, "parent_fleet", collection: UpdateTrustRootList)\n\tif collection.fleet = fleet;\n\n# Describes the policy for accessing blueprints\nresource TargetReleaseConfig {\n\tpermissions = [\n\t "read", # read the current target release\n\t "modify", # change the current target release\n\t];\n\n\trelations = { parent_fleet: Fleet };\n\t"read" if "viewer" on "parent_fleet";\n\t"modify" if "admin" on "parent_fleet";\n}\nhas_relation(fleet: Fleet, "parent_fleet", resource: TargetReleaseConfig)\n\tif resource.fleet = fleet;\n\n# Describes the policy for reading and modifying low-level inventory\nresource Inventory {\n\tpermissions = [ "read", "modify" ];\n\trelations = { parent_fleet: Fleet };\n\t"read" if "viewer" on "parent_fleet";\n\t"modify" if "admin" on "parent_fleet";\n}\nhas_relation(fleet: Fleet, "parent_fleet", inventory: Inventory)\n\tif inventory.fleet = fleet;\n\n# Describes the policy for accessing "/v1/system/ip-pools" in the API\nresource IpPoolList {\n\tpermissions = [\n\t "list_children",\n\t "modify",\n\t "create_child",\n\t];\n\n\t# Fleet Administrators can create or modify the IP Pools list.\n\trelations = { parent_fleet: Fleet };\n\t"modify" if "admin" on "parent_fleet";\n\t"create_child" if "admin" on "parent_fleet";\n\n\t# Fleet Viewers can list IP Pools\n\t"list_children" if "viewer" on "parent_fleet";\n}\nhas_relation(fleet: Fleet, "parent_fleet", ip_pool_list: IpPoolList)\n\tif ip_pool_list.fleet = fleet;\n\n# Any authenticated user can create a child of a provided IP Pool.\n# This is necessary to use the pools when provisioning instances.\nhas_permission(actor: AuthenticatedActor, "create_child", ip_pool: IpPool)\n\tif actor.is_user and silo in actor.silo and silo.fleet = ip_pool.fleet;\n\n# Describes the policy for accessing "/v1/multicast-groups" in the API\n# Groups are created when the first instance joins and deleted when the last leaves.\nresource MulticastGroupList {\n\tpermissions = [ "list_children" ];\n\n\trelations = { parent_fleet: Fleet };\n\n\t# Fleet Viewers can list multicast groups\n\t"list_children" if "viewer" on "parent_fleet";\n}\nhas_relation(fleet: Fleet, "parent_fleet", multicast_group_list: MulticastGroupList)\n\tif multicast_group_list.fleet = fleet;\n\n# Any authenticated user can list multicast groups in their fleet.\n# This enables silo users to discover groups for attaching instances,\n# without requiring the Fleet::Viewer role.\nhas_permission(actor: AuthenticatedActor, "list_children", multicast_group_list: MulticastGroupList)\n\tif actor.is_user and silo in actor.silo and silo.fleet = multicast_group_list.fleet;\n\n# MulticastGroup is a fleet-level discovery resource.\n# Join/leave authorization is gated by Instance::Modify, not the group itself.\nresource MulticastGroup {\n\tpermissions = [ "read", "list_children" ];\n\trelations = { parent_fleet: Fleet };\n}\nhas_relation(fleet: Fleet, "parent_fleet", multicast_group: MulticastGroup)\n\tif multicast_group.fleet = fleet;\n\n# Any authenticated user can read multicast groups in their fleet\nhas_permission(actor: AuthenticatedActor, "read", multicast_group: MulticastGroup)\n\tif actor.is_user and silo in actor.silo and silo.fleet = multicast_group.fleet;\n\n# Any authenticated user can list members of multicast groups in their fleet\nhas_permission(actor: AuthenticatedActor, "list_children", multicast_group: MulticastGroup)\n\tif actor.is_user and silo in actor.silo and silo.fleet = multicast_group.fleet;\n\n# Describes the policy for reading and writing the audit log\nresource AuditLog {\n\tpermissions = [\n\t "list_children", # retrieve audit log\n\t "create_child", # create audit log entry\n\t];\n\n\trelations = { parent_fleet: Fleet };\n\n\t# Fleet viewers can read the audit log\n\t"list_children" if "viewer" on "parent_fleet";\n}\n\n# Any actor should be able to write to the audit log because we need to be able\n# to write to the log from any request, authenticated or not. Audit log writes\n# are always a byproduct of other operations: there are no endpoints that allow\n# the user to write to the log deliberately. Note we use AuthenticatedActor\n# because we don't really mean unauthenticated -- in the case of login\n# operations, we use the external authenticator actor that creates the session\n# to authorize the audit log write.\nhas_permission(_actor: AuthenticatedActor, "create_child", _audit_log: AuditLog);\n\nhas_relation(fleet: Fleet, "parent_fleet", audit_log: AuditLog)\n\tif audit_log.fleet = fleet;\n\n# Describes the policy for creating and managing web console sessions.\nresource ConsoleSessionList {\n\tpermissions = [ "create_child" ];\n\trelations = { parent_fleet: Fleet };\n\t"create_child" if "external-authenticator" on "parent_fleet";\n}\nhas_relation(fleet: Fleet, "parent_fleet", collection: ConsoleSessionList)\n\tif collection.fleet = fleet;\n\n# Allow silo admins to delete and list user sessions\nresource SiloUserSessionList {\n permissions = [ "modify", "list_children" ];\n relations = { parent_silo: Silo };\n\n # A silo admin can modify (e.g., delete) a user's sessions.\n "modify" if "admin" on "parent_silo";\n\n # A silo admin can list a user's sessions.\n "list_children" if "admin" on "parent_silo";\n}\nhas_relation(silo: Silo, "parent_silo", authn_list: SiloUserSessionList)\n if authn_list.silo_user.silo = silo;\n\n# give users 'modify' and 'list_children' on their own sessions\nhas_permission(actor: AuthenticatedActor, "modify", authn_list: SiloUserSessionList)\n if actor.equals_silo_user(authn_list.silo_user);\nhas_permission(actor: AuthenticatedActor, "list_children", authn_list: SiloUserSessionList)\n if actor.equals_silo_user(authn_list.silo_user);\n\n# Allow silo admins to delete and list user access tokens\nresource SiloUserTokenList {\n permissions = [ "modify", "list_children" ];\n relations = { parent_silo: Silo };\n\n # A silo admin can modify (e.g., delete) a user's tokens.\n "modify" if "admin" on "parent_silo";\n\n # A silo admin can list a user's tokens.\n "list_children" if "admin" on "parent_silo";\n}\nhas_relation(silo: Silo, "parent_silo", authn_list: SiloUserTokenList)\n if authn_list.silo_user.silo = silo;\n\n# give users 'modify' and 'list_children' on their own tokens\nhas_permission(actor: AuthenticatedActor, "modify", authn_list: SiloUserTokenList)\n if actor.equals_silo_user(authn_list.silo_user);\nhas_permission(actor: AuthenticatedActor, "list_children", authn_list: SiloUserTokenList)\n if actor.equals_silo_user(authn_list.silo_user);\n\n# Describes the policy for creating and managing device authorization requests.\nresource DeviceAuthRequestList {\n\tpermissions = [ "create_child" ];\n\trelations = { parent_fleet: Fleet };\n\t"create_child" if "external-authenticator" on "parent_fleet";\n}\nhas_relation(fleet: Fleet, "parent_fleet", collection: DeviceAuthRequestList)\n\tif collection.fleet = fleet;\n\n# Describes the policy for creating and managing Silo certificates\nresource SiloCertificateList {\n\tpermissions = [ "list_children", "create_child" ];\n\n\trelations = { parent_silo: Silo, parent_fleet: Fleet };\n\n\t# Both Fleet and Silo administrators can see and modify the Silo's\n\t# certificates.\n\t"list_children" if "admin" on "parent_silo";\n\t"list_children" if "admin" on "parent_fleet";\n\t"create_child" if "admin" on "parent_silo";\n\t"create_child" if "admin" on "parent_fleet";\n}\nhas_relation(silo: Silo, "parent_silo", collection: SiloCertificateList)\n\tif collection.silo = silo;\nhas_relation(fleet: Fleet, "parent_fleet", collection: SiloCertificateList)\n\tif collection.silo.fleet = fleet;\n\n# Describes the policy for creating and managing Silo identity providers\nresource SiloIdentityProviderList {\n\tpermissions = [ "list_children", "create_child" ];\n\n\trelations = { parent_silo: Silo, parent_fleet: Fleet };\n\n\t# Everyone who can read the Silo (which includes all the users in the\n\t# Silo) can see the identity providers in it.\n\t"list_children" if "read" on "parent_silo";\n\n\t# Fleet and Silo administrators can manage the Silo's identity provider\n\t# configuration. This is one of the only areas of Silo configuration\n\t# that Fleet Administrators have permissions on. This is also one of\n\t# the only cases where we need to look two levels up the hierarchy to\n\t# see if somebody has the right permission. For most other things,\n\t# permissions cascade down the hierarchy so we only need to look at the\n\t# parent.\n\t"create_child" if "admin" on "parent_silo";\n\t"create_child" if "admin" on "parent_fleet";\n}\nhas_relation(silo: Silo, "parent_silo", collection: SiloIdentityProviderList)\n\tif collection.silo = silo;\nhas_relation(fleet: Fleet, "parent_fleet", collection: SiloIdentityProviderList)\n\tif collection.silo.fleet = fleet;\n\n# Describes the policy for creating and managing Silo users (mostly intended for\n# API-managed users)\nresource SiloUserList {\n\tpermissions = [ "list_children", "create_child" ];\n\n\trelations = { parent_silo: Silo, parent_fleet: Fleet };\n\n\t# Everyone who can read the Silo (which includes all the users in the\n\t# Silo) can see the users in it.\n\t"list_children" if "read" on "parent_silo";\n\n\t# Fleet and Silo administrators can manage the Silo's users. This is\n\t# one of the only areas of Silo configuration that Fleet Administrators\n\t# have permissions on. This is also one of the few cases (so far) where\n\t# we need to look two levels up the hierarchy to see if somebody has the\n\t# right permission. For most other things, permissions cascade down the\n\t# hierarchy so we only need to look at the parent.\n\t"create_child" if "admin" on "parent_silo";\n\t"list_children" if "admin" on "parent_fleet";\n\t"create_child" if "admin" on "parent_fleet";\n}\nhas_relation(silo: Silo, "parent_silo", collection: SiloUserList)\n\tif collection.silo = silo;\nhas_relation(fleet: Fleet, "parent_fleet", collection: SiloUserList)\n\tif collection.silo.fleet = fleet;\n\n# Grant SCIM IdP actors the permissions they need on users.\nhas_permission(actor: AuthenticatedActor, "read", silo_user: SiloUser)\n if actor.is_scim_idp and silo_user.silo in actor.silo;\nhas_permission(actor: AuthenticatedActor, "create_child", silo_user_list: SiloUserList)\n\tif actor.is_scim_idp and silo_user_list.silo in actor.silo;\nhas_permission(actor: AuthenticatedActor, "modify", silo_user: SiloUser)\n\tif actor.is_scim_idp and silo_user.silo in actor.silo;\nhas_permission(actor: AuthenticatedActor, "list_children", silo_user_list: SiloUserList)\n if actor.is_scim_idp and silo_user_list.silo in actor.silo;\n\n# Describes the policy for creating and managing Silo groups (mostly intended\n# for API-managed groups)\nresource SiloGroupList {\n\tpermissions = [ "list_children", "create_child" ];\n\n\trelations = { parent_silo: Silo, parent_fleet: Fleet };\n\n\t# Everyone who can read the Silo (which includes all the groups in the\n\t# Silo) can see the groups in it.\n\t"list_children" if "read" on "parent_silo";\n\n\t# Fleet and Silo administrators can manage the Silo's groups. This is\n\t# one of the only areas of Silo configuration that Fleet Administrators\n\t# have permissions on. This is also one of the few cases (so far) where\n\t# we need to look two levels up the hierarchy to see if somebody has the\n\t# right permission. For most other things, permissions cascade down the\n\t# hierarchy so we only need to look at the parent.\n\t"create_child" if "admin" on "parent_silo";\n\t"list_children" if "admin" on "parent_fleet";\n\t"create_child" if "admin" on "parent_fleet";\n}\nhas_relation(silo: Silo, "parent_silo", collection: SiloGroupList)\n\tif collection.silo = silo;\nhas_relation(fleet: Fleet, "parent_fleet", collection: SiloGroupList)\n\tif collection.silo.fleet = fleet;\n\n# Grant SCIM IdP actors the permissions they need on groups.\nhas_permission(actor: AuthenticatedActor, "read", silo_group: SiloGroup)\n if actor.is_scim_idp and silo_group.silo in actor.silo;\nhas_permission(actor: AuthenticatedActor, "create_child", silo_group_list: SiloGroupList)\n\tif actor.is_scim_idp and silo_group_list.silo in actor.silo;\nhas_permission(actor: AuthenticatedActor, "modify", silo_group: SiloGroup)\n\tif actor.is_scim_idp and silo_group.silo in actor.silo;\nhas_permission(actor: AuthenticatedActor, "list_children", silo_group_list: SiloGroupList)\n if actor.is_scim_idp and silo_group_list.silo in actor.silo;\n\n# These rules grants the external authenticator role the permissions it needs to\n# read silo users and modify their sessions. This is necessary for login to\n# work.\nhas_permission(actor: AuthenticatedActor, "read", silo: Silo)\n\tif has_role(actor, "external-authenticator", silo.fleet);\nhas_permission(actor: AuthenticatedActor, "read", user: SiloUser)\n\tif has_role(actor, "external-authenticator", user.silo.fleet);\nhas_permission(actor: AuthenticatedActor, "modify", user: SiloUser)\n\tif has_role(actor, "external-authenticator", user.silo.fleet);\nhas_permission(actor: AuthenticatedActor, "read", group: SiloGroup)\n\tif has_role(actor, "external-authenticator", group.silo.fleet);\nhas_permission(actor: AuthenticatedActor, "modify", group: SiloGroup)\n\tif has_role(actor, "external-authenticator", group.silo.fleet);\n\nhas_permission(actor: AuthenticatedActor, "read", session: ConsoleSession)\n\tif has_role(actor, "external-authenticator", session.fleet);\nhas_permission(actor: AuthenticatedActor, "modify", session: ConsoleSession)\n\tif has_role(actor, "external-authenticator", session.fleet);\n\n# All authenticated users can read and delete device authn requests because\n# by necessity these operations happen before we've figured out what user (or\n# even Silo) the device auth is associated with. Any user can claim a device\n# auth request with the right user code (that's how it works) -- it's the user\n# code and associated logic that prevents unauthorized access here.\nhas_permission(actor: AuthenticatedActor, "read", _device_auth: DeviceAuthRequest)\n if actor.is_user;\nhas_permission(actor: AuthenticatedActor, "modify", _device_auth: DeviceAuthRequest)\n if actor.is_user;\n\nhas_permission(actor: AuthenticatedActor, "read", device_token: DeviceAccessToken)\n\tif has_role(actor, "external-authenticator", device_token.fleet);\n\nhas_permission(actor: AuthenticatedActor, "read", identity_provider: IdentityProvider)\n\tif has_role(actor, "external-authenticator", identity_provider.silo.fleet);\n\nhas_permission(actor: AuthenticatedActor, "read", saml_identity_provider: SamlIdentityProvider)\n\tif has_role(actor, "external-authenticator", saml_identity_provider.silo.fleet);\n\n# Describes the policy for who can access the internal database.\nresource Database {\n\tpermissions = [\n\t # "query" is required to perform any query against the database,\n\t # whether a read or write query. This is checked when an operation\n\t # checks out a database connection from the connection pool.\n\t #\n\t # Any authenticated user gets this permission. There's generally\n\t # some other authz check involved in the database query. For\n\t # example, if you're querying the database to "read" a "Project", we\n\t # should also be checking that. So why do we do this at all? It's\n\t # a belt-and-suspenders measure so that if we somehow introduced an\n\t # unauthenticated code path that hits the database, it cannot be\n\t # used to DoS the database because we won't allow the operation to\n\t # make the query. (As long as the code path _is_ authenticated, we\n\t # can use throttling mechanisms to prevent DoS.)\n\t "query",\n\n\t # "modify" is required to populate database data that's delivered\n\t # with the system. It should also be required for schema changes,\n\t # when we support those. This is separate from "query" so that we\n\t # cannot accidentally invoke these code paths from API calls and\n\t # other general functions.\n\t "modify"\n\t];\n}\n\n# All authenticated users have the "query" permission on the database.\nhas_permission(_actor: AuthenticatedActor, "query", _resource: Database);\n\n# The "db-init" user is the only one with the "modify" permission.\nhas_permission(USER_DB_INIT: AuthenticatedActor, "modify", _resource: Database);\nhas_permission(USER_DB_INIT: AuthenticatedActor, "create_child", _resource: IpPoolList);\n# It also has "admin" on the internal silo to populate it with built-in resources.\n# TODO-completeness: actually limit to just internal silo and not all silos\nhas_role(USER_DB_INIT: AuthenticatedActor, "admin", _silo: Silo);\n\n# Allow the internal API admin permissions on all silos.\nhas_role(USER_INTERNAL_API: AuthenticatedActor, "admin", _silo: Silo);\n\nresource WebhookSecret {\n\tpermissions = [ "read", "modify" ];\n\trelations = { parent_alert_receiver: AlertReceiver };\n\n\t"read" if "read" on "parent_alert_receiver";\n\t"modify" if "modify" on "parent_alert_receiver";\n}\n\nhas_relation(rx: AlertReceiver, "parent_alert_receiver", secret: WebhookSecret)\n\tif secret.alert_receiver = rx;\n\nresource AlertClassList {\n\tpermissions = [ "list_children" ];\n\trelations = { parent_fleet: Fleet };\n\n\t"list_children" if "viewer" on "parent_fleet";\n}\n\nhas_relation(fleet: Fleet, "parent_fleet", collection: AlertClassList)\n\tif collection.fleet = fleet;\n\nresource ScimClientBearerTokenList {\n\tpermissions = [ "create_child", "list_children" ];\n\trelations = { parent_silo: Silo, parent_fleet: Fleet };\n\n\t# Silo-level roles grant privileges for SCIM client tokens.\n # These are all admin because being able to create these tokens would allow\n # a user to grant themselves admin by modifying group membership through SCIM calls\n\t"create_child" if "admin" on "parent_silo";\n\t"list_children" if "admin" on "parent_silo";\n\n # Fleet-level roles also grant privileges for SCIM client tokens, for\n # configuration before silo admins are present.\n\t"create_child" if "admin" on "parent_fleet";\n\t"list_children" if "admin" on "parent_fleet";\n}\nhas_relation(silo: Silo, "parent_silo", scim_client_bearer_token_list: ScimClientBearerTokenList)\n\tif scim_client_bearer_token_list.silo = silo;\nhas_relation(fleet: Fleet, "parent_fleet", collection: ScimClientBearerTokenList)\n\tif collection.silo.fleet = fleet;\n\n# VpcList is a synthetic resource for controlling VPC creation.\n# Unlike other project resources, VPC creation requires the full "collaborator"\n# role rather than "limited-collaborator", enforcing the networking restriction.\n# This allows organizations to restrict who can reconfigure the network topology\n# while still allowing users with limited-collaborator to work with compute\n# resources (instances, disks, etc.) within the existing network.\nresource VpcList {\n\tpermissions = [ "list_children", "create_child" ];\n\n\trelations = { containing_project: Project };\n\n\t"list_children" if "read" on "containing_project";\n\t"create_child" if "collaborator" on "containing_project";\n}\nhas_relation(project: Project, "containing_project", collection: VpcList)\n\tif collection.project = project;\n\n# Describes the policy for accessing "/v1/system/subnet-pools" in the API\nresource SubnetPoolList {\n\tpermissions = [\n\t "list_children",\n\t "modify",\n\t "create_child",\n\t];\n\n\t# Fleet Administrators can create or modify the Subnet Pools list.\n\trelations = { parent_fleet: Fleet };\n\t"modify" if "admin" on "parent_fleet";\n\t"create_child" if "admin" on "parent_fleet";\n\n\t# Fleet Viewers can list External Subnet Pools\n\t"list_children" if "viewer" on "parent_fleet";\n}\nhas_relation(fleet: Fleet, "parent_fleet", subnet_pool_list: SubnetPoolList)\n\tif subnet_pool_list.fleet = fleet;\n\n\n\n resource Disk {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = { containing_project: Project };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "limited-collaborator" on "containing_project";\n "create_child" if "limited-collaborator" on "containing_project";\n }\n\n has_relation(parent: Project, "containing_project", child: Disk)\n if child.project = parent;\n \n\n resource Snapshot {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = { containing_project: Project };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "limited-collaborator" on "containing_project";\n "create_child" if "limited-collaborator" on "containing_project";\n }\n\n has_relation(parent: Project, "containing_project", child: Snapshot)\n if child.project = parent;\n \n\n resource ProjectImage {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = { containing_project: Project };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "limited-collaborator" on "containing_project";\n "create_child" if "limited-collaborator" on "containing_project";\n }\n\n has_relation(parent: Project, "containing_project", child: ProjectImage)\n if child.project = parent;\n \n\n resource AffinityGroup {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = { containing_project: Project };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "limited-collaborator" on "containing_project";\n "create_child" if "limited-collaborator" on "containing_project";\n }\n\n has_relation(parent: Project, "containing_project", child: AffinityGroup)\n if child.project = parent;\n \n\n resource AntiAffinityGroup {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = { containing_project: Project };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "limited-collaborator" on "containing_project";\n "create_child" if "limited-collaborator" on "containing_project";\n }\n\n has_relation(parent: Project, "containing_project", child: AntiAffinityGroup)\n if child.project = parent;\n \n\n resource Instance {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = { containing_project: Project };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "limited-collaborator" on "containing_project";\n "create_child" if "limited-collaborator" on "containing_project";\n }\n\n has_relation(parent: Project, "containing_project", child: Instance)\n if child.project = parent;\n \n\n resource IpPool {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: IpPool)\n if child.fleet = fleet;\n \n\n resource InstanceNetworkInterface {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = {\n containing_project: Project,\n parent: Instance\n };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "limited-collaborator" on "containing_project";\n "create_child" if "limited-collaborator" on "containing_project";\n }\n\n has_relation(project: Project, "containing_project", child: InstanceNetworkInterface)\n if has_relation(project, "containing_project", child.instance);\n\n has_relation(parent: Instance, "parent", child: InstanceNetworkInterface)\n if child.instance = parent;\n \n\n resource Vpc {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = { containing_project: Project };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(parent: Project, "containing_project", child: Vpc)\n if child.project = parent;\n \n\n resource VpcRouter {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = {\n containing_project: Project,\n parent: Vpc\n };\n\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(project: Project, "containing_project", child: VpcRouter)\n if has_relation(project, "containing_project", child.vpc);\n\n has_relation(parent: Vpc, "parent", child: VpcRouter)\n if child.vpc = parent;\n \n\n resource InternetGateway {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = {\n containing_project: Project,\n parent: Vpc\n };\n\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(project: Project, "containing_project", child: InternetGateway)\n if has_relation(project, "containing_project", child.vpc);\n\n has_relation(parent: Vpc, "parent", child: InternetGateway)\n if child.vpc = parent;\n \n\n resource InternetGatewayIpPool {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = {\n containing_project: Project,\n parent: InternetGateway\n };\n\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(project: Project, "containing_project", child: InternetGatewayIpPool)\n if has_relation(project, "containing_project", child.internet_gateway);\n\n has_relation(parent: InternetGateway, "parent", child: InternetGatewayIpPool)\n if child.internet_gateway = parent;\n \n\n resource InternetGatewayIpAddress {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = {\n containing_project: Project,\n parent: InternetGateway\n };\n\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(project: Project, "containing_project", child: InternetGatewayIpAddress)\n if has_relation(project, "containing_project", child.internet_gateway);\n\n has_relation(parent: InternetGateway, "parent", child: InternetGatewayIpAddress)\n if child.internet_gateway = parent;\n \n\n resource RouterRoute {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = {\n containing_project: Project,\n parent: VpcRouter\n };\n\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(project: Project, "containing_project", child: RouterRoute)\n if has_relation(project, "containing_project", child.vpc_router);\n\n has_relation(parent: VpcRouter, "parent", child: RouterRoute)\n if child.vpc_router = parent;\n \n\n resource VpcSubnet {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = {\n containing_project: Project,\n parent: Vpc\n };\n\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(project: Project, "containing_project", child: VpcSubnet)\n if has_relation(project, "containing_project", child.vpc);\n\n has_relation(parent: Vpc, "parent", child: VpcSubnet)\n if child.vpc = parent;\n \n\n resource FloatingIp {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = { containing_project: Project };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "limited-collaborator" on "containing_project";\n "create_child" if "limited-collaborator" on "containing_project";\n }\n\n has_relation(parent: Project, "containing_project", child: FloatingIp)\n if child.project = parent;\n \n\n resource ExternalSubnet {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = { containing_project: Project };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(parent: Project, "containing_project", child: ExternalSubnet)\n if child.project = parent;\n \n\n resource Image {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = { containing_silo: Silo };\n "list_children" if "viewer" on "containing_silo";\n "read" if "viewer" on "containing_silo";\n "modify" if "collaborator" on "containing_silo";\n "create_child" if "collaborator" on "containing_silo";\n }\n\n has_relation(parent: Silo, "containing_silo", child: Image)\n if child.silo = parent;\n \n\n resource SiloImage {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = { containing_silo: Silo };\n "list_children" if "viewer" on "containing_silo";\n "read" if "viewer" on "containing_silo";\n "modify" if "collaborator" on "containing_silo";\n "create_child" if "collaborator" on "containing_silo";\n }\n\n has_relation(parent: Silo, "containing_silo", child: SiloImage)\n if child.silo = parent;\n \n\n resource AddressLot {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: AddressLot)\n if child.fleet = fleet;\n \n\n resource Blueprint {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: Blueprint)\n if child.fleet = fleet;\n \n\n resource LoopbackAddress {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: LoopbackAddress)\n if child.fleet = fleet;\n \n\n\n resource ConsoleSession {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: ConsoleSession)\n if child.fleet = fleet;\n \n\n resource DeviceAuthRequest {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: DeviceAuthRequest)\n if child.fleet = fleet;\n \n\n resource DeviceAccessToken {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: DeviceAccessToken)\n if child.fleet = fleet;\n \n\n resource PhysicalDisk {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: PhysicalDisk)\n if child.fleet = fleet;\n \n\n resource Rack {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: Rack)\n if child.fleet = fleet;\n \n\n\n\n\n\n resource SupportBundle {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: SupportBundle)\n if child.fleet = fleet;\n \n\n\n\n resource Sled {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: Sled)\n if child.fleet = fleet;\n \n\n resource SubnetPool {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: SubnetPool)\n if child.fleet = fleet;\n \n\n resource TufRepo {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: TufRepo)\n if child.fleet = fleet;\n \n\n resource TufArtifact {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: TufArtifact)\n if child.fleet = fleet;\n \n\n resource TufTrustRoot {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: TufTrustRoot)\n if child.fleet = fleet;\n \n\n resource Alert {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: Alert)\n if child.fleet = fleet;\n \n\n resource AlertReceiver {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: AlertReceiver)\n if child.fleet = fleet;\n \n\n\n resource Zpool {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: Zpool)\n if child.fleet = fleet;\n \n\n resource Service {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: Service)\n if child.fleet = fleet;\n \n\n resource UserBuiltin {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: UserBuiltin)\n if child.fleet = fleet;\n \n\n
|
| 112 | 2026-01-27T01:13:46.186Z | INFO | test_vpcs (ServerContext): Setting up resolver using DNS address: [::1]:46325
|
| 113 | 2026-01-27T01:13:46.188Z | INFO | test_vpcs (DnsResolver): new DNS resolver
addresses = [[::1]:46325]
|
| 114 | 2026-01-27T01:13:46.189Z | INFO | test_vpcs (ServerContext): Setting up qorb database pool from a single host
url = PostgresConfigWithUrl {\n url_raw: "postgresql://root@[::1]:42398/omicron?sslmode=disable",\n config: Config {\n user: Some(\n "root",\n ),\n password: None,\n dbname: Some(\n "omicron",\n ),\n options: None,\n application_name: None,\n ssl_mode: Disable,\n host: [\n Tcp(\n "::1",\n ),\n ],\n hostaddr: [],\n port: [\n 42398,\n ],\n connect_timeout: None,\n tcp_user_timeout: None,\n keepalives: true,\n keepalives_idle: 7200s,\n keepalives_interval: None,\n keepalives_retries: None,\n target_session_attrs: Any,\n channel_binding: Prefer,\n load_balance_hosts: Disable,\n },\n}
|
| 115 | 2026-01-27T01:13:46.193Z | DEBG | test_vpcs (ServerContext): registered USDT probes
|
| 116 | 2026-01-27T01:13:48.170Z | INFO | test_vpcs (datastore): Database schema version is up to date
desired_version = 225.0.0
found_version = 225.0.0
|
| 117 | 2026-01-27T01:13:48.193Z | WARN | test_vpcs (datastore): No db_metadata_nexus records exist - skipping access check
explanation = This is expected during initial deployment or before migration
nexus_id = 913233fe-92a8-4635-9572-183f495429c4 (omicron_zone)
|
| 118 | 2026-01-27T01:13:48.193Z | INFO | test_vpcs (nexus): Datastore is ready for usage
|
| 119 | 2026-01-27T01:13:48.415Z | DEBG | test_vpcs (clickhouse-client): registered USDT probes
id = df38f964-5286-427e-8663-f46b162c438f
|
| 120 | 2026-01-27T01:13:48.578Z | DEBG | test_vpcs (dropshot_internal): registered endpoint
local_addr = 127.0.0.1:46983
method = POST
path = /crucible/0/upstairs/{upstairs_id}/downstairs/{downstairs_id}/stop-request
versions = all
|
| 121 | 2026-01-27T01:13:48.579Z | DEBG | test_vpcs (dropshot_internal): registered endpoint
local_addr = 127.0.0.1:46983
method = POST
path = /crucible/0/upstairs/{upstairs_id}/downstairs/{downstairs_id}/stopped
versions = all
|
| 122 | 2026-01-27T01:13:48.579Z | DEBG | test_vpcs (dropshot_internal): registered endpoint
local_addr = 127.0.0.1:46983
method = POST
path = /crucible/0/upstairs/{upstairs_id}/repair/{repair_id}/progress
versions = all
|
| 123 | 2026-01-27T01:13:48.579Z | DEBG | test_vpcs (dropshot_internal): registered endpoint
local_addr = 127.0.0.1:46983
method = POST
path = /crucible/0/upstairs/{upstairs_id}/repair-finish
versions = all
|
| 124 | 2026-01-27T01:13:48.579Z | DEBG | test_vpcs (dropshot_internal): registered endpoint
local_addr = 127.0.0.1:46983
method = POST
path = /crucible/0/upstairs/{upstairs_id}/repair-start
versions = all
|
| 125 | 2026-01-27T01:13:48.579Z | DEBG | test_vpcs (dropshot_internal): registered endpoint
local_addr = 127.0.0.1:46983
method = POST
path = /disk/{disk_id}/remove-read-only-parent
versions = all
|
| 126 | 2026-01-27T01:13:48.579Z | DEBG | test_vpcs (dropshot_internal): registered endpoint
local_addr = 127.0.0.1:46983
method = PUT
path = /disks/{disk_id}
versions = all
|
| 127 | 2026-01-27T01:13:48.579Z | DEBG | test_vpcs (dropshot_internal): registered endpoint
local_addr = 127.0.0.1:46983
method = POST
path = /metrics/collectors
versions = all
|
| 128 | 2026-01-27T01:13:48.579Z | DEBG | test_vpcs (dropshot_internal): registered endpoint
local_addr = 127.0.0.1:46983
method = GET
path = /metrics/collectors/{collector_id}/producers
versions = all
|
| 129 | 2026-01-27T01:13:48.579Z | DEBG | test_vpcs (dropshot_internal): registered endpoint
local_addr = 127.0.0.1:46983
method = POST
path = /metrics/producers
versions = all
|
| 130 | 2026-01-27T01:13:48.579Z | DEBG | test_vpcs (dropshot_internal): registered endpoint
local_addr = 127.0.0.1:46983
method = GET
path = /nat/ipv4/changeset/{from_gen}
versions = all
|
| 131 | 2026-01-27T01:13:48.579Z | DEBG | test_vpcs (dropshot_internal): registered endpoint
local_addr = 127.0.0.1:46983
method = GET
path = /probes/{sled}
versions = all
|
| 132 | 2026-01-27T01:13:48.579Z | DEBG | test_vpcs (dropshot_internal): registered endpoint
local_addr = 127.0.0.1:46983
method = POST
path = /refresh-vpc-routes
versions = all
|
| 133 | 2026-01-27T01:13:48.579Z | DEBG | test_vpcs (dropshot_internal): registered endpoint
local_addr = 127.0.0.1:46983
method = GET
path = /sled-agents/{sled_id}
versions = all
|
| 134 | 2026-01-27T01:13:48.579Z | DEBG | test_vpcs (dropshot_internal): registered endpoint
local_addr = 127.0.0.1:46983
method = POST
path = /sled-agents/{sled_id}
versions = all
|
| 135 | 2026-01-27T01:13:48.579Z | DEBG | test_vpcs (dropshot_internal): registered endpoint
local_addr = 127.0.0.1:46983
method = PUT
path = /switch/{switch_id}
versions = all
|
| 136 | 2026-01-27T01:13:48.579Z | DEBG | test_vpcs (dropshot_internal): registered endpoint
local_addr = 127.0.0.1:46983
method = GET
path = /v1/ping
versions = all
|
| 137 | 2026-01-27T01:13:48.579Z | DEBG | test_vpcs (dropshot_internal): registered endpoint
local_addr = 127.0.0.1:46983
method = PUT
path = /vmms/{propolis_id}
versions = all
|
| 138 | 2026-01-27T01:13:48.579Z | DEBG | test_vpcs (dropshot_internal): registered endpoint
local_addr = 127.0.0.1:46983
method = POST
path = /volume/{volume_id}/remove-read-only-parent
versions = all
|
| 139 | 2026-01-27T01:13:48.579Z | INFO | test_vpcs (dropshot_internal): listening
local_addr = 127.0.0.1:46983
|
| 140 | 2026-01-27T01:13:48.580Z | DEBG | test_vpcs (dropshot_internal): successfully registered DTrace USDT probes
local_addr = 127.0.0.1:46983
|
| 141 | 2026-01-27T01:13:48.584Z | DEBG | test_vpcs (dropshot_lockstep): registered endpoint
local_addr = 127.0.0.1:47722
method = GET
path = /bgtasks
versions = all
|
| 142 | 2026-01-27T01:13:48.584Z | DEBG | test_vpcs (dropshot_lockstep): registered endpoint
local_addr = 127.0.0.1:47722
method = POST
path = /bgtasks/activate
versions = all
|
| 143 | 2026-01-27T01:13:48.584Z | DEBG | test_vpcs (dropshot_lockstep): registered endpoint
local_addr = 127.0.0.1:47722
method = GET
path = /bgtasks/view/{bgtask_name}
versions = all
|
| 144 | 2026-01-27T01:13:48.584Z | DEBG | test_vpcs (dropshot_lockstep): registered endpoint
local_addr = 127.0.0.1:47722
method = GET
path = /clickhouse/policy
versions = all
|
| 145 | 2026-01-27T01:13:48.584Z | DEBG | test_vpcs (dropshot_lockstep): registered endpoint
local_addr = 127.0.0.1:47722
method = POST
path = /clickhouse/policy
versions = all
|
| 146 | 2026-01-27T01:13:48.584Z | DEBG | test_vpcs (dropshot_lockstep): registered endpoint
local_addr = 127.0.0.1:47722
method = GET
path = /debug/fetch-omdb-binary
versions = all
|
| 147 | 2026-01-27T01:13:48.584Z | DEBG | test_vpcs (dropshot_lockstep): registered endpoint
local_addr = 127.0.0.1:47722
method = POST
path = /demo-saga
versions = all
|
| 148 | 2026-01-27T01:13:48.584Z | DEBG | test_vpcs (dropshot_lockstep): registered endpoint
local_addr = 127.0.0.1:47722
method = POST
path = /demo-saga/{demo_saga_id}/complete
versions = all
|
| 149 | 2026-01-27T01:13:48.584Z | DEBG | test_vpcs (dropshot_lockstep): registered endpoint
local_addr = 127.0.0.1:47722
method = GET
path = /deployment/blueprints/all
versions = all
|
| 150 | 2026-01-27T01:13:48.584Z | DEBG | test_vpcs (dropshot_lockstep): registered endpoint
local_addr = 127.0.0.1:47722
method = DELETE
path = /deployment/blueprints/all/{blueprint_id}
versions = all
|
| 151 | 2026-01-27T01:13:48.584Z | DEBG | test_vpcs (dropshot_lockstep): registered endpoint
local_addr = 127.0.0.1:47722
method = GET
path = /deployment/blueprints/all/{blueprint_id}
versions = all
|
| 152 | 2026-01-27T01:13:48.584Z | DEBG | test_vpcs (dropshot_lockstep): registered endpoint
local_addr = 127.0.0.1:47722
method = POST
path = /deployment/blueprints/import
versions = all
|
| 153 | 2026-01-27T01:13:48.584Z | DEBG | test_vpcs (dropshot_lockstep): registered endpoint
local_addr = 127.0.0.1:47722
method = POST
path = /deployment/blueprints/regenerate
versions = all
|
| 154 | 2026-01-27T01:13:48.584Z | DEBG | test_vpcs (dropshot_lockstep): registered endpoint
local_addr = 127.0.0.1:47722
method = GET
path = /deployment/blueprints/target
versions = all
|
| 155 | 2026-01-27T01:13:48.584Z | DEBG | test_vpcs (dropshot_lockstep): registered endpoint
local_addr = 127.0.0.1:47722
method = POST
path = /deployment/blueprints/target
versions = all
|
| 156 | 2026-01-27T01:13:48.585Z | DEBG | test_vpcs (dropshot_lockstep): registered endpoint
local_addr = 127.0.0.1:47722
method = PUT
path = /deployment/blueprints/target/enabled
versions = all
|
| 157 | 2026-01-27T01:13:48.585Z | DEBG | test_vpcs (dropshot_lockstep): registered endpoint
local_addr = 127.0.0.1:47722
method = GET
path = /deployment/reconfigurator-config
versions = all
|
| 158 | 2026-01-27T01:13:48.585Z | DEBG | test_vpcs (dropshot_lockstep): registered endpoint
local_addr = 127.0.0.1:47722
method = POST
path = /deployment/reconfigurator-config
versions = all
|
| 159 | 2026-01-27T01:13:48.585Z | DEBG | test_vpcs (dropshot_lockstep): registered endpoint
local_addr = 127.0.0.1:47722
method = GET
path = /deployment/reconfigurator-config/{version}
versions = all
|
| 160 | 2026-01-27T01:13:48.585Z | DEBG | test_vpcs (dropshot_lockstep): registered endpoint
local_addr = 127.0.0.1:47722
method = GET
path = /deployment/update-status
versions = all
|
| 161 | 2026-01-27T01:13:48.585Z | DEBG | test_vpcs (dropshot_lockstep): registered endpoint
local_addr = 127.0.0.1:47722
method = GET
path = /experimental/v1/system/support-bundles
versions = all
|
| 162 | 2026-01-27T01:13:48.585Z | DEBG | test_vpcs (dropshot_lockstep): registered endpoint
local_addr = 127.0.0.1:47722
method = POST
path = /experimental/v1/system/support-bundles
versions = all
|
| 163 | 2026-01-27T01:13:48.585Z | DEBG | test_vpcs (dropshot_lockstep): registered endpoint
local_addr = 127.0.0.1:47722
method = DELETE
path = /experimental/v1/system/support-bundles/{bundle_id}
versions = all
|
| 164 | 2026-01-27T01:13:48.585Z | DEBG | test_vpcs (dropshot_lockstep): registered endpoint
local_addr = 127.0.0.1:47722
method = GET
path = /experimental/v1/system/support-bundles/{bundle_id}
versions = all
|
| 165 | 2026-01-27T01:13:48.585Z | DEBG | test_vpcs (dropshot_lockstep): registered endpoint
local_addr = 127.0.0.1:47722
method = PUT
path = /experimental/v1/system/support-bundles/{bundle_id}
versions = all
|
| 166 | 2026-01-27T01:13:48.585Z | DEBG | test_vpcs (dropshot_lockstep): registered endpoint
local_addr = 127.0.0.1:47722
method = GET
path = /experimental/v1/system/support-bundles/{bundle_id}/download
versions = all
|
| 167 | 2026-01-27T01:13:48.585Z | DEBG | test_vpcs (dropshot_lockstep): registered endpoint
local_addr = 127.0.0.1:47722
method = HEAD
path = /experimental/v1/system/support-bundles/{bundle_id}/download
versions = all
|
| 168 | 2026-01-27T01:13:48.585Z | DEBG | test_vpcs (dropshot_lockstep): registered endpoint
local_addr = 127.0.0.1:47722
method = GET
path = /experimental/v1/system/support-bundles/{bundle_id}/download/{file}
versions = all
|
| 169 | 2026-01-27T01:13:48.585Z | DEBG | test_vpcs (dropshot_lockstep): registered endpoint
local_addr = 127.0.0.1:47722
method = HEAD
path = /experimental/v1/system/support-bundles/{bundle_id}/download/{file}
versions = all
|
| 170 | 2026-01-27T01:13:48.585Z | DEBG | test_vpcs (dropshot_lockstep): registered endpoint
local_addr = 127.0.0.1:47722
method = GET
path = /experimental/v1/system/support-bundles/{bundle_id}/index
versions = all
|
| 171 | 2026-01-27T01:13:48.585Z | DEBG | test_vpcs (dropshot_lockstep): registered endpoint
local_addr = 127.0.0.1:47722
method = POST
path = /instances/{instance_id}/migrate
versions = all
|
| 172 | 2026-01-27T01:13:48.585Z | DEBG | test_vpcs (dropshot_lockstep): registered endpoint
local_addr = 127.0.0.1:47722
method = GET
path = /mgs-updates
versions = all
|
| 173 | 2026-01-27T01:13:48.585Z | DEBG | test_vpcs (dropshot_lockstep): registered endpoint
local_addr = 127.0.0.1:47722
method = GET
path = /oximeter/read-policy
versions = all
|
| 174 | 2026-01-27T01:13:48.585Z | DEBG | test_vpcs (dropshot_lockstep): registered endpoint
local_addr = 127.0.0.1:47722
method = POST
path = /oximeter/read-policy
versions = all
|
| 175 | 2026-01-27T01:13:48.585Z | DEBG | test_vpcs (dropshot_lockstep): registered endpoint
local_addr = 127.0.0.1:47722
method = POST
path = /physical-disk/expunge
versions = all
|
| 176 | 2026-01-27T01:13:48.586Z | DEBG | test_vpcs (dropshot_lockstep): registered endpoint
local_addr = 127.0.0.1:47722
method = GET
path = /quiesce
versions = all
|
| 177 | 2026-01-27T01:13:48.586Z | DEBG | test_vpcs (dropshot_lockstep): registered endpoint
local_addr = 127.0.0.1:47722
method = POST
path = /quiesce
versions = all
|
| 178 | 2026-01-27T01:13:48.586Z | DEBG | test_vpcs (dropshot_lockstep): registered endpoint
local_addr = 127.0.0.1:47722
method = PUT
path = /racks/{rack_id}/initialization-complete
versions = all
|
| 179 | 2026-01-27T01:13:48.586Z | DEBG | test_vpcs (dropshot_lockstep): registered endpoint
local_addr = 127.0.0.1:47722
method = GET
path = /sagas
versions = all
|
| 180 | 2026-01-27T01:13:48.586Z | DEBG | test_vpcs (dropshot_lockstep): registered endpoint
local_addr = 127.0.0.1:47722
method = GET
path = /sagas/{saga_id}
versions = all
|
| 181 | 2026-01-27T01:13:48.586Z | DEBG | test_vpcs (dropshot_lockstep): registered endpoint
local_addr = 127.0.0.1:47722
method = POST
path = /sleds/add
versions = all
|
| 182 | 2026-01-27T01:13:48.586Z | DEBG | test_vpcs (dropshot_lockstep): registered endpoint
local_addr = 127.0.0.1:47722
method = POST
path = /sleds/expunge
versions = all
|
| 183 | 2026-01-27T01:13:48.586Z | DEBG | test_vpcs (dropshot_lockstep): registered endpoint
local_addr = 127.0.0.1:47722
method = GET
path = /sleds/uninitialized
versions = all
|
| 184 | 2026-01-27T01:13:48.586Z | DEBG | test_vpcs (dropshot_lockstep): registered endpoint
local_addr = 127.0.0.1:47722
method = GET
path = /trust-quorum/{rack_id}/config/latest
versions = all
|
| 185 | 2026-01-27T01:13:48.586Z | DEBG | test_vpcs (dropshot_lockstep): registered endpoint
local_addr = 127.0.0.1:47722
method = GET
path = /v1/ping
versions = all
|
| 186 | 2026-01-27T01:13:48.586Z | INFO | test_vpcs (dropshot_lockstep): listening
local_addr = 127.0.0.1:47722
|
| 187 | 2026-01-27T01:13:48.586Z | DEBG | test_vpcs (dropshot_lockstep): successfully registered DTrace USDT probes
local_addr = 127.0.0.1:47722
|
| 188 | 2026-01-27T01:13:48.586Z | INFO | test_vpcs (SEC): SEC running
sec_id = 913233fe-92a8-4635-9572-183f495429c4
|
| 189 | 2026-01-27T01:13:48.588Z | TRAC | test_vpcs (DataLoader): authorize begin
action = Modify
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 190 | 2026-01-27T01:13:48.588Z | DEBG | test_vpcs (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 191 | 2026-01-27T01:13:48.595Z | DEBG | test_vpcs (DataLoader): authorize result
action = Modify
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 192 | 2026-01-27T01:13:48.595Z | DEBG | test_vpcs (DataLoader): attempting to create built-in users
|
| 193 | 2026-01-27T01:13:48.597Z | TRAC | test_vpcs (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 194 | 2026-01-27T01:13:48.597Z | DEBG | test_vpcs (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 195 | 2026-01-27T01:13:48.598Z | DEBG | test_vpcs (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 196 | 2026-01-27T01:13:48.841Z | INFO | test_vpcs (MgsUpdateDriver): starting MgsUpdateDriver
|
| 197 | 2026-01-27T01:13:48.865Z | TRAC | test_vpcs (dns): buffer
buffer = Length: 67 (0x43) bytes\n0000: 4f 5a 01 00 00 01 00 00 00 00 00 01 04 5f 6d 67 OZ..........._mg\n0010: 73 04 5f 74 63 70 0d 63 6f 6e 74 72 6f 6c 2d 70 s._tcp.control-p\n0020: 6c 61 6e 65 05 6f 78 69 64 65 08 69 6e 74 65 72 lane.oxide.inter\n0030: 6e 61 6c 00 00 21 00 01 00 00 29 04 d0 00 00 00 nal..!....).....\n0040: 00 00 00 ...
kind = dns
peer_addr = [::1]:63132
req_id = 5abc9421-cf02-4630-a75b-292ea8ffba91
|
| 198 | 2026-01-27T01:13:48.865Z | DEBG | test_vpcs (dns): message_request
kind = dns
mr = MessageRequest {\n header: Header {\n id: 20314,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n queries: Queries {\n queries: [\n LowerQuery {\n name: LowerName(\n Name("_mgs._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_mgs._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n ],\n original: [\n 4,\n 95,\n 109,\n 103,\n 115,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n flags: EdnsFlags {\n dnssec_ok: false,\n z: 0,\n },\n max_payload: 1232,\n options: OPT {\n options: [],\n },\n },\n ),\n}
peer_addr = [::1]:63132
req_id = 5abc9421-cf02-4630-a75b-292ea8ffba91
|
| 199 | 2026-01-27T01:13:48.867Z | ERRO | test_vpcs (dns): failed to handle incoming DNS message: MessageRequest {
header: Header {
id: 20314,
message_type: Query,
op_code: Query,
authoritative: false,
truncation: false,
recursion_desired: true,
recursion_available: false,
authentic_data: false,
checking_disabled: false,
response_code: NoError,
query_count: 1,
answer_count: 0,
name_server_count: 0,
additional_count: 1,
},
queries: Queries {
queries: [
LowerQuery {
name: LowerName(
Name("_mgs._tcp.control-plane.oxide.internal."),
),
original: Query {
name: Name("_mgs._tcp.control-plane.oxide.internal."),
query_type: SRV,
query_class: IN,
},
},
],
original: [
4,
95,
109,
103,
115,
4,
95,
116,
99,
112,
13,
99,
111,
110,
116,
114,
111,
108,
45,
112,
108,
97,
110,
101,
5,
111,
120,
105,
100,
101,
8,
105,
110,
116,
101,
114,
110,
97,
108,
0,
0,
33,
0,
1,
],
},
answers: [],
name_servers: [],
additionals: [],
sig0: [],
edns: Some(
Edns {
rcode_high: 0,
version: 0,
flags: EdnsFlags {
dnssec_ok: false,
z: 0,
},
max_payload: 1232,
options: OPT {
options: [],
},
},
),
} SERVFAIL: server is not authoritative for name: "_mgs._tcp.control-plane.oxide.internal."
kind = dns
peer_addr = [::1]:63132
req_id = 5abc9421-cf02-4630-a75b-292ea8ffba91
|
| 200 | 2026-01-27T01:13:48.867Z | TRAC | test_vpcs (dns): buffer
buffer = Length: 74 (0x4a) bytes\n0000: 31 96 01 00 00 01 00 00 00 00 00 01 0b 5f 72 65 1............_re\n0010: 70 6f 2d 64 65 70 6f 74 04 5f 74 63 70 0d 63 6f po-depot._tcp.co\n0020: 6e 74 72 6f 6c 2d 70 6c 61 6e 65 05 6f 78 69 64 ntrol-plane.oxid\n0030: 65 08 69 6e 74 65 72 6e 61 6c 00 00 21 00 01 00 e.internal..!...\n0040: 00 29 04 d0 00 00 00 00 00 00 .)........
kind = dns
peer_addr = [::1]:64854
req_id = cd39c0bc-864f-4ba9-b154-dd584a52ab6c
|
| 201 | 2026-01-27T01:13:48.867Z | DEBG | test_vpcs (dns): message_request
kind = dns
mr = MessageRequest {\n header: Header {\n id: 12694,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n queries: Queries {\n queries: [\n LowerQuery {\n name: LowerName(\n Name("_repo-depot._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_repo-depot._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n ],\n original: [\n 11,\n 95,\n 114,\n 101,\n 112,\n 111,\n 45,\n 100,\n 101,\n 112,\n 111,\n 116,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n flags: EdnsFlags {\n dnssec_ok: false,\n z: 0,\n },\n max_payload: 1232,\n options: OPT {\n options: [],\n },\n },\n ),\n}
peer_addr = [::1]:64854
req_id = cd39c0bc-864f-4ba9-b154-dd584a52ab6c
|
| 202 | 2026-01-27T01:13:48.868Z | ERRO | test_vpcs (dns): failed to handle incoming DNS message: MessageRequest {
header: Header {
id: 12694,
message_type: Query,
op_code: Query,
authoritative: false,
truncation: false,
recursion_desired: true,
recursion_available: false,
authentic_data: false,
checking_disabled: false,
response_code: NoError,
query_count: 1,
answer_count: 0,
name_server_count: 0,
additional_count: 1,
},
queries: Queries {
queries: [
LowerQuery {
name: LowerName(
Name("_repo-depot._tcp.control-plane.oxide.internal."),
),
original: Query {
name: Name("_repo-depot._tcp.control-plane.oxide.internal."),
query_type: SRV,
query_class: IN,
},
},
],
original: [
11,
95,
114,
101,
112,
111,
45,
100,
101,
112,
111,
116,
4,
95,
116,
99,
112,
13,
99,
111,
110,
116,
114,
111,
108,
45,
112,
108,
97,
110,
101,
5,
111,
120,
105,
100,
101,
8,
105,
110,
116,
101,
114,
110,
97,
108,
0,
0,
33,
0,
1,
],
},
answers: [],
name_servers: [],
additionals: [],
sig0: [],
edns: Some(
Edns {
rcode_high: 0,
version: 0,
flags: EdnsFlags {
dnssec_ok: false,
z: 0,
},
max_payload: 1232,
options: OPT {
options: [],
},
},
),
} SERVFAIL: server is not authoritative for name: "_repo-depot._tcp.control-plane.oxide.internal."
kind = dns
peer_addr = [::1]:64854
req_id = cd39c0bc-864f-4ba9-b154-dd584a52ab6c
|
| 203 | 2026-01-27T01:13:48.868Z | TRAC | test_vpcs (dns): buffer
buffer = Length: 79 (0x4f) bytes\n0000: 80 b2 01 00 00 01 00 00 00 00 00 01 10 5f 63 72 ............._cr\n0010: 75 63 69 62 6c 65 2d 70 61 6e 74 72 79 04 5f 74 ucible-pantry._t\n0020: 63 70 0d 63 6f 6e 74 72 6f 6c 2d 70 6c 61 6e 65 cp.control-plane\n0030: 05 6f 78 69 64 65 08 69 6e 74 65 72 6e 61 6c 00 .oxide.internal.\n0040: 00 21 00 01 00 00 29 04 d0 00 00 00 00 00 00 .!....)........
kind = dns
peer_addr = [::1]:57919
req_id = 712875b1-704d-462e-a96d-fadb733ced31
|
| 204 | 2026-01-27T01:13:48.868Z | DEBG | test_vpcs (dns): message_request
kind = dns
mr = MessageRequest {\n header: Header {\n id: 32946,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n queries: Queries {\n queries: [\n LowerQuery {\n name: LowerName(\n Name("_crucible-pantry._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_crucible-pantry._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n ],\n original: [\n 16,\n 95,\n 99,\n 114,\n 117,\n 99,\n 105,\n 98,\n 108,\n 101,\n 45,\n 112,\n 97,\n 110,\n 116,\n 114,\n 121,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n flags: EdnsFlags {\n dnssec_ok: false,\n z: 0,\n },\n max_payload: 1232,\n options: OPT {\n options: [],\n },\n },\n ),\n}
peer_addr = [::1]:57919
req_id = 712875b1-704d-462e-a96d-fadb733ced31
|
| 205 | 2026-01-27T01:13:48.868Z | ERRO | test_vpcs (dns): failed to handle incoming DNS message: MessageRequest {
header: Header {
id: 32946,
message_type: Query,
op_code: Query,
authoritative: false,
truncation: false,
recursion_desired: true,
recursion_available: false,
authentic_data: false,
checking_disabled: false,
response_code: NoError,
query_count: 1,
answer_count: 0,
name_server_count: 0,
additional_count: 1,
},
queries: Queries {
queries: [
LowerQuery {
name: LowerName(
Name("_crucible-pantry._tcp.control-plane.oxide.internal."),
),
original: Query {
name: Name("_crucible-pantry._tcp.control-plane.oxide.internal."),
query_type: SRV,
query_class: IN,
},
},
],
original: [
16,
95,
99,
114,
117,
99,
105,
98,
108,
101,
45,
112,
97,
110,
116,
114,
121,
4,
95,
116,
99,
112,
13,
99,
111,
110,
116,
114,
111,
108,
45,
112,
108,
97,
110,
101,
5,
111,
120,
105,
100,
101,
8,
105,
110,
116,
101,
114,
110,
97,
108,
0,
0,
33,
0,
1,
],
},
answers: [],
name_servers: [],
additionals: [],
sig0: [],
edns: Some(
Edns {
rcode_high: 0,
version: 0,
flags: EdnsFlags {
dnssec_ok: false,
z: 0,
},
max_payload: 1232,
options: OPT {
options: [],
},
},
),
} SERVFAIL: server is not authoritative for name: "_crucible-pantry._tcp.control-plane.oxide.internal."
kind = dns
peer_addr = [::1]:57919
req_id = 712875b1-704d-462e-a96d-fadb733ced31
|
| 206 | 2026-01-27T01:13:48.885Z | INFO | test_vpcs (DataLoader): created 5 built-in users
|
| 207 | 2026-01-27T01:13:48.886Z | TRAC | test_vpcs (DataLoader): authorize begin
action = Modify
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 208 | 2026-01-27T01:13:48.886Z | DEBG | test_vpcs (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 209 | 2026-01-27T01:13:48.889Z | DEBG | test_vpcs (DataLoader): authorize result
action = Modify
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 210 | 2026-01-27T01:13:48.893Z | DEBG | test_vpcs (DataLoader): attempting to create built-in role assignments
|
| 211 | 2026-01-27T01:13:48.893Z | TRAC | test_vpcs (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 212 | 2026-01-27T01:13:48.893Z | DEBG | test_vpcs (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 213 | 2026-01-27T01:13:48.894Z | DEBG | test_vpcs (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 214 | 2026-01-27T01:13:49.270Z | INFO | test_vpcs (DataLoader): created 4 built-in role assignments
|
| 215 | 2026-01-27T01:13:49.270Z | TRAC | test_vpcs (DataLoader): authorize begin
action = Modify
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 216 | 2026-01-27T01:13:49.270Z | DEBG | test_vpcs (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 217 | 2026-01-27T01:13:49.273Z | DEBG | test_vpcs (DataLoader): authorize result
action = Modify
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 218 | 2026-01-27T01:13:49.274Z | DEBG | test_vpcs (DataLoader): attempting to create built-in silos
|
| 219 | 2026-01-27T01:13:49.274Z | TRAC | test_vpcs (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 220 | 2026-01-27T01:13:49.274Z | DEBG | test_vpcs (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 221 | 2026-01-27T01:13:49.274Z | DEBG | test_vpcs (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 222 | 2026-01-27T01:13:49.420Z | INFO | test_vpcs (DataLoader): created 2 built-in silos
|
| 223 | 2026-01-27T01:13:49.420Z | TRAC | test_vpcs (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 224 | 2026-01-27T01:13:49.420Z | DEBG | test_vpcs (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 225 | 2026-01-27T01:13:49.420Z | DEBG | test_vpcs (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 226 | 2026-01-27T01:13:49.454Z | TRAC | test_vpcs (DataLoader): authorize begin
action = Modify
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 227 | 2026-01-27T01:13:49.454Z | DEBG | test_vpcs (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 228 | 2026-01-27T01:13:49.456Z | DEBG | test_vpcs (DataLoader): authorize result
action = Modify
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 229 | 2026-01-27T01:13:49.457Z | DEBG | test_vpcs (DataLoader): attempting to create built-in projects
|
| 230 | 2026-01-27T01:13:49.457Z | TRAC | test_vpcs (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 231 | 2026-01-27T01:13:49.457Z | DEBG | test_vpcs (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 232 | 2026-01-27T01:13:49.457Z | DEBG | test_vpcs (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 233 | 2026-01-27T01:13:49.470Z | TRAC | test_vpcs (DataLoader): authorize begin
action = CreateChild
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }
|
| 234 | 2026-01-27T01:13:49.470Z | TRAC | test_vpcs (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }
resource_id = 001de000-5110-4000-8000-000000000001
resource_type = Silo
|
| 235 | 2026-01-27T01:13:49.470Z | TRAC | test_vpcs (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 236 | 2026-01-27T01:13:49.471Z | DEBG | test_vpcs (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 237 | 2026-01-27T01:13:49.471Z | DEBG | test_vpcs (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 238 | 2026-01-27T01:13:49.544Z | TRAC | test_vpcs (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 239 | 2026-01-27T01:13:49.544Z | TRAC | test_vpcs (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 240 | 2026-01-27T01:13:49.544Z | DEBG | test_vpcs (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 241 | 2026-01-27T01:13:49.545Z | DEBG | test_vpcs (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 242 | 2026-01-27T01:13:49.552Z | DEBG | test_vpcs (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 243 | 2026-01-27T01:13:49.557Z | DEBG | test_vpcs (DataLoader): authorize result
action = CreateChild
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }
result = Ok(())
|
| 244 | 2026-01-27T01:13:49.557Z | TRAC | test_vpcs (DataLoader): authorize begin
action = CreateChild
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }
|
| 245 | 2026-01-27T01:13:49.557Z | TRAC | test_vpcs (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }
resource_id = 001de000-5110-4000-8000-000000000001
resource_type = Silo
|
| 246 | 2026-01-27T01:13:49.557Z | TRAC | test_vpcs (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 247 | 2026-01-27T01:13:49.558Z | DEBG | test_vpcs (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 248 | 2026-01-27T01:13:49.558Z | DEBG | test_vpcs (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 249 | 2026-01-27T01:13:49.569Z | TRAC | test_vpcs (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 250 | 2026-01-27T01:13:49.569Z | TRAC | test_vpcs (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 251 | 2026-01-27T01:13:49.569Z | DEBG | test_vpcs (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 252 | 2026-01-27T01:13:49.569Z | DEBG | test_vpcs (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 253 | 2026-01-27T01:13:49.573Z | DEBG | test_vpcs (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 254 | 2026-01-27T01:13:49.578Z | DEBG | test_vpcs (DataLoader): authorize result
action = CreateChild
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }
result = Ok(())
|
| 255 | 2026-01-27T01:13:49.578Z | TRAC | test_vpcs (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 256 | 2026-01-27T01:13:49.578Z | DEBG | test_vpcs (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 257 | 2026-01-27T01:13:49.579Z | DEBG | test_vpcs (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 258 | 2026-01-27T01:13:49.614Z | INFO | test_vpcs (DataLoader): created built-in services project
|
| 259 | 2026-01-27T01:13:49.614Z | TRAC | test_vpcs (DataLoader): authorize begin
action = Modify
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 260 | 2026-01-27T01:13:49.614Z | DEBG | test_vpcs (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 261 | 2026-01-27T01:13:49.616Z | DEBG | test_vpcs (DataLoader): authorize result
action = Modify
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 262 | 2026-01-27T01:13:49.616Z | DEBG | test_vpcs (DataLoader): attempting to create built-in VPCs
|
| 263 | 2026-01-27T01:13:49.616Z | TRAC | test_vpcs (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 264 | 2026-01-27T01:13:49.616Z | DEBG | test_vpcs (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 265 | 2026-01-27T01:13:49.617Z | DEBG | test_vpcs (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 266 | 2026-01-27T01:13:49.624Z | TRAC | test_vpcs (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 267 | 2026-01-27T01:13:49.624Z | DEBG | test_vpcs (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 268 | 2026-01-27T01:13:49.625Z | DEBG | test_vpcs (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 269 | 2026-01-27T01:13:49.640Z | TRAC | test_vpcs (DataLoader): authorize begin
action = CreateChild
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }
|
| 270 | 2026-01-27T01:13:49.640Z | TRAC | test_vpcs (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }
resource_id = 001de000-4401-4000-8000-000000000000
resource_type = Project
|
| 271 | 2026-01-27T01:13:49.641Z | TRAC | test_vpcs (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 272 | 2026-01-27T01:13:49.641Z | DEBG | test_vpcs (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 273 | 2026-01-27T01:13:49.641Z | DEBG | test_vpcs (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 274 | 2026-01-27T01:13:49.653Z | TRAC | test_vpcs (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }
resource_id = 001de000-5110-4000-8000-000000000001
resource_type = Silo
|
| 275 | 2026-01-27T01:13:49.653Z | TRAC | test_vpcs (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 276 | 2026-01-27T01:13:49.653Z | DEBG | test_vpcs (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 277 | 2026-01-27T01:13:49.654Z | DEBG | test_vpcs (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 278 | 2026-01-27T01:13:49.666Z | TRAC | test_vpcs (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 279 | 2026-01-27T01:13:49.666Z | TRAC | test_vpcs (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 280 | 2026-01-27T01:13:49.666Z | DEBG | test_vpcs (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 281 | 2026-01-27T01:13:49.666Z | DEBG | test_vpcs (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 282 | 2026-01-27T01:13:49.689Z | DEBG | test_vpcs (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 283 | 2026-01-27T01:13:49.697Z | DEBG | test_vpcs (DataLoader): authorize result
action = CreateChild
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }
result = Ok(())
|
| 284 | 2026-01-27T01:13:49.697Z | TRAC | test_vpcs (DataLoader): successful lookup of siloed resource "Project" using built-in user
|
| 285 | 2026-01-27T01:13:49.698Z | TRAC | test_vpcs (DataLoader): authorize begin
action = CreateChild
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }
|
| 286 | 2026-01-27T01:13:49.698Z | TRAC | test_vpcs (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }
resource_id = 001de000-4401-4000-8000-000000000000
resource_type = Project
|
| 287 | 2026-01-27T01:13:49.698Z | TRAC | test_vpcs (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 288 | 2026-01-27T01:13:49.698Z | DEBG | test_vpcs (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 289 | 2026-01-27T01:13:49.698Z | DEBG | test_vpcs (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 290 | 2026-01-27T01:13:49.715Z | TRAC | test_vpcs (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }
resource_id = 001de000-5110-4000-8000-000000000001
resource_type = Silo
|
| 291 | 2026-01-27T01:13:49.715Z | TRAC | test_vpcs (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 292 | 2026-01-27T01:13:49.715Z | DEBG | test_vpcs (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 293 | 2026-01-27T01:13:49.716Z | DEBG | test_vpcs (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 294 | 2026-01-27T01:13:49.805Z | TRAC | test_vpcs (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 295 | 2026-01-27T01:13:49.806Z | TRAC | test_vpcs (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 296 | 2026-01-27T01:13:49.806Z | DEBG | test_vpcs (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 297 | 2026-01-27T01:13:49.806Z | DEBG | test_vpcs (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 298 | 2026-01-27T01:13:49.818Z | DEBG | test_vpcs (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 299 | 2026-01-27T01:13:49.827Z | DEBG | test_vpcs (DataLoader): authorize result
action = CreateChild
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }
result = Ok(())
|
| 300 | 2026-01-27T01:13:49.827Z | TRAC | test_vpcs (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 301 | 2026-01-27T01:13:49.827Z | DEBG | test_vpcs (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 302 | 2026-01-27T01:13:49.827Z | DEBG | test_vpcs (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 303 | 2026-01-27T01:13:49.849Z | TRAC | test_vpcs (DataLoader): authorize begin
action = CreateChild
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }
|
| 304 | 2026-01-27T01:13:49.849Z | TRAC | test_vpcs (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }
resource_id = 001de000-4401-4000-8000-000000000000
resource_type = Project
|
| 305 | 2026-01-27T01:13:49.849Z | TRAC | test_vpcs (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 306 | 2026-01-27T01:13:49.849Z | DEBG | test_vpcs (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 307 | 2026-01-27T01:13:49.850Z | DEBG | test_vpcs (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 308 | 2026-01-27T01:13:49.857Z | TRAC | test_vpcs (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }
resource_id = 001de000-5110-4000-8000-000000000001
resource_type = Silo
|
| 309 | 2026-01-27T01:13:49.858Z | TRAC | test_vpcs (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 310 | 2026-01-27T01:13:49.858Z | DEBG | test_vpcs (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 311 | 2026-01-27T01:13:49.858Z | DEBG | test_vpcs (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 312 | 2026-01-27T01:13:49.867Z | TRAC | test_vpcs (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 313 | 2026-01-27T01:13:49.867Z | TRAC | test_vpcs (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 314 | 2026-01-27T01:13:49.867Z | DEBG | test_vpcs (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 315 | 2026-01-27T01:13:49.876Z | DEBG | test_vpcs (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 316 | 2026-01-27T01:13:49.881Z | DEBG | test_vpcs (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 317 | 2026-01-27T01:13:49.890Z | DEBG | test_vpcs (DataLoader): authorize result
action = CreateChild
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }
result = Ok(())
|
| 318 | 2026-01-27T01:13:49.890Z | TRAC | test_vpcs (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 319 | 2026-01-27T01:13:49.890Z | DEBG | test_vpcs (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 320 | 2026-01-27T01:13:49.891Z | DEBG | test_vpcs (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 321 | 2026-01-27T01:13:49.918Z | TRAC | test_vpcs (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 322 | 2026-01-27T01:13:49.919Z | DEBG | test_vpcs (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 323 | 2026-01-27T01:13:49.920Z | DEBG | test_vpcs (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 324 | 2026-01-27T01:13:49.931Z | TRAC | test_vpcs (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 325 | 2026-01-27T01:13:49.931Z | DEBG | test_vpcs (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 326 | 2026-01-27T01:13:49.932Z | DEBG | test_vpcs (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 327 | 2026-01-27T01:13:49.938Z | TRAC | test_vpcs (DataLoader): authorize begin
action = CreateChild
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }
|
| 328 | 2026-01-27T01:13:49.938Z | TRAC | test_vpcs (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }
resource_id = 001de000-4401-4000-8000-000000000000
resource_type = Project
|
| 329 | 2026-01-27T01:13:49.938Z | TRAC | test_vpcs (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 330 | 2026-01-27T01:13:49.939Z | DEBG | test_vpcs (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 331 | 2026-01-27T01:13:49.939Z | DEBG | test_vpcs (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 332 | 2026-01-27T01:13:49.952Z | TRAC | test_vpcs (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }
resource_id = 001de000-5110-4000-8000-000000000001
resource_type = Silo
|
| 333 | 2026-01-27T01:13:49.952Z | TRAC | test_vpcs (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 334 | 2026-01-27T01:13:49.952Z | DEBG | test_vpcs (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 335 | 2026-01-27T01:13:49.953Z | DEBG | test_vpcs (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 336 | 2026-01-27T01:13:49.956Z | TRAC | test_vpcs (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 337 | 2026-01-27T01:13:49.956Z | TRAC | test_vpcs (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 338 | 2026-01-27T01:13:49.956Z | DEBG | test_vpcs (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 339 | 2026-01-27T01:13:49.958Z | DEBG | test_vpcs (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 340 | 2026-01-27T01:13:49.970Z | DEBG | test_vpcs (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 341 | 2026-01-27T01:13:49.980Z | DEBG | test_vpcs (DataLoader): authorize result
action = CreateChild
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }
result = Ok(())
|
| 342 | 2026-01-27T01:13:49.980Z | TRAC | test_vpcs (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 343 | 2026-01-27T01:13:49.980Z | DEBG | test_vpcs (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 344 | 2026-01-27T01:13:49.981Z | DEBG | test_vpcs (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 345 | 2026-01-27T01:13:50.065Z | TRAC | test_vpcs (DataLoader): authorize begin
action = CreateChild
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-074c-4000-8000-000000000001, lookup_type: ById(001de000-074c-4000-8000-000000000001) }
|
| 346 | 2026-01-27T01:13:50.065Z | TRAC | test_vpcs (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }
resource_id = 001de000-4401-4000-8000-000000000000
resource_type = Project
|
| 347 | 2026-01-27T01:13:50.065Z | TRAC | test_vpcs (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 348 | 2026-01-27T01:13:50.065Z | DEBG | test_vpcs (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 349 | 2026-01-27T01:13:50.066Z | DEBG | test_vpcs (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 350 | 2026-01-27T01:13:50.150Z | TRAC | test_vpcs (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }
resource_id = 001de000-5110-4000-8000-000000000001
resource_type = Silo
|
| 351 | 2026-01-27T01:13:50.150Z | TRAC | test_vpcs (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 352 | 2026-01-27T01:13:50.150Z | DEBG | test_vpcs (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 353 | 2026-01-27T01:13:50.152Z | DEBG | test_vpcs (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 354 | 2026-01-27T01:13:50.165Z | TRAC | test_vpcs (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 355 | 2026-01-27T01:13:50.165Z | TRAC | test_vpcs (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 356 | 2026-01-27T01:13:50.165Z | DEBG | test_vpcs (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 357 | 2026-01-27T01:13:50.166Z | DEBG | test_vpcs (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 358 | 2026-01-27T01:13:50.171Z | DEBG | test_vpcs (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 359 | 2026-01-27T01:13:50.195Z | DEBG | test_vpcs (DataLoader): authorize result
action = CreateChild
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-074c-4000-8000-000000000001, lookup_type: ById(001de000-074c-4000-8000-000000000001) }
result = Ok(())
|
| 360 | 2026-01-27T01:13:50.195Z | TRAC | test_vpcs (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 361 | 2026-01-27T01:13:50.196Z | DEBG | test_vpcs (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 362 | 2026-01-27T01:13:50.196Z | DEBG | test_vpcs (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 363 | 2026-01-27T01:13:50.309Z | TRAC | test_vpcs (DataLoader): authorize begin
action = CreateChild
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-074c-4000-8000-000000000001, lookup_type: ById(001de000-074c-4000-8000-000000000001) }
|
| 364 | 2026-01-27T01:13:50.309Z | TRAC | test_vpcs (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }
resource_id = 001de000-4401-4000-8000-000000000000
resource_type = Project
|
| 365 | 2026-01-27T01:13:50.309Z | TRAC | test_vpcs (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 366 | 2026-01-27T01:13:50.309Z | DEBG | test_vpcs (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 367 | 2026-01-27T01:13:50.309Z | DEBG | test_vpcs (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 368 | 2026-01-27T01:13:50.315Z | TRAC | test_vpcs (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }
resource_id = 001de000-5110-4000-8000-000000000001
resource_type = Silo
|
| 369 | 2026-01-27T01:13:50.315Z | TRAC | test_vpcs (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 370 | 2026-01-27T01:13:50.315Z | DEBG | test_vpcs (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 371 | 2026-01-27T01:13:50.316Z | DEBG | test_vpcs (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 372 | 2026-01-27T01:13:50.320Z | TRAC | test_vpcs (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 373 | 2026-01-27T01:13:50.321Z | TRAC | test_vpcs (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 374 | 2026-01-27T01:13:50.321Z | DEBG | test_vpcs (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 375 | 2026-01-27T01:13:50.322Z | DEBG | test_vpcs (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 376 | 2026-01-27T01:13:50.326Z | DEBG | test_vpcs (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 377 | 2026-01-27T01:13:50.341Z | DEBG | test_vpcs (DataLoader): authorize result
action = CreateChild
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-074c-4000-8000-000000000001, lookup_type: ById(001de000-074c-4000-8000-000000000001) }
result = Ok(())
|
| 378 | 2026-01-27T01:13:50.341Z | TRAC | test_vpcs (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 379 | 2026-01-27T01:13:50.341Z | DEBG | test_vpcs (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 380 | 2026-01-27T01:13:50.342Z | DEBG | test_vpcs (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 381 | 2026-01-27T01:13:50.354Z | DEBG | test_vpcs (DataLoader): attempting to create built-in VPC firewall rules
|
| 382 | 2026-01-27T01:13:50.355Z | TRAC | test_vpcs (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 383 | 2026-01-27T01:13:50.355Z | DEBG | test_vpcs (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 384 | 2026-01-27T01:13:50.356Z | DEBG | test_vpcs (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 385 | 2026-01-27T01:13:50.363Z | TRAC | test_vpcs (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 386 | 2026-01-27T01:13:50.363Z | DEBG | test_vpcs (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 387 | 2026-01-27T01:13:50.364Z | DEBG | test_vpcs (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 388 | 2026-01-27T01:13:50.368Z | TRAC | test_vpcs (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 389 | 2026-01-27T01:13:50.368Z | DEBG | test_vpcs (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 390 | 2026-01-27T01:13:50.369Z | DEBG | test_vpcs (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 391 | 2026-01-27T01:13:50.375Z | TRAC | test_vpcs (DataLoader): authorize begin
action = CreateChild
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
|
| 392 | 2026-01-27T01:13:50.375Z | TRAC | test_vpcs (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }
resource_id = 001de000-4401-4000-8000-000000000000
resource_type = Project
|
| 393 | 2026-01-27T01:13:50.375Z | TRAC | test_vpcs (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 394 | 2026-01-27T01:13:50.376Z | DEBG | test_vpcs (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 395 | 2026-01-27T01:13:50.386Z | DEBG | test_vpcs (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 396 | 2026-01-27T01:13:50.391Z | TRAC | test_vpcs (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }
resource_id = 001de000-5110-4000-8000-000000000001
resource_type = Silo
|
| 397 | 2026-01-27T01:13:50.391Z | TRAC | test_vpcs (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 398 | 2026-01-27T01:13:50.391Z | DEBG | test_vpcs (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 399 | 2026-01-27T01:13:50.392Z | DEBG | test_vpcs (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 400 | 2026-01-27T01:13:50.399Z | TRAC | test_vpcs (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 401 | 2026-01-27T01:13:50.399Z | TRAC | test_vpcs (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 402 | 2026-01-27T01:13:50.399Z | DEBG | test_vpcs (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 403 | 2026-01-27T01:13:50.400Z | DEBG | test_vpcs (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 404 | 2026-01-27T01:13:50.415Z | DEBG | test_vpcs (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 405 | 2026-01-27T01:13:50.425Z | DEBG | test_vpcs (DataLoader): authorize result
action = CreateChild
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
result = Ok(())
|
| 406 | 2026-01-27T01:13:50.425Z | TRAC | test_vpcs (DataLoader): successful lookup of siloed resource "Vpc" using built-in user
|
| 407 | 2026-01-27T01:13:50.425Z | TRAC | test_vpcs (DataLoader): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
|
| 408 | 2026-01-27T01:13:50.426Z | TRAC | test_vpcs (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }
resource_id = 001de000-4401-4000-8000-000000000000
resource_type = Project
|
| 409 | 2026-01-27T01:13:50.426Z | TRAC | test_vpcs (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 410 | 2026-01-27T01:13:50.426Z | DEBG | test_vpcs (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 411 | 2026-01-27T01:13:50.427Z | DEBG | test_vpcs (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 412 | 2026-01-27T01:13:50.432Z | TRAC | test_vpcs (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }
resource_id = 001de000-5110-4000-8000-000000000001
resource_type = Silo
|
| 413 | 2026-01-27T01:13:50.432Z | TRAC | test_vpcs (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 414 | 2026-01-27T01:13:50.432Z | DEBG | test_vpcs (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 415 | 2026-01-27T01:13:50.433Z | DEBG | test_vpcs (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 416 | 2026-01-27T01:13:50.436Z | TRAC | test_vpcs (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 417 | 2026-01-27T01:13:50.436Z | TRAC | test_vpcs (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 418 | 2026-01-27T01:13:50.436Z | DEBG | test_vpcs (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 419 | 2026-01-27T01:13:50.437Z | DEBG | test_vpcs (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 420 | 2026-01-27T01:13:50.443Z | DEBG | test_vpcs (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 421 | 2026-01-27T01:13:50.456Z | DEBG | test_vpcs (DataLoader): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
result = Ok(())
|
| 422 | 2026-01-27T01:13:50.456Z | TRAC | test_vpcs (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 423 | 2026-01-27T01:13:50.456Z | DEBG | test_vpcs (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 424 | 2026-01-27T01:13:50.457Z | DEBG | test_vpcs (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 425 | 2026-01-27T01:13:50.469Z | TRAC | test_vpcs (DataLoader): authorize begin
action = Modify
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
|
| 426 | 2026-01-27T01:13:50.470Z | TRAC | test_vpcs (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }
resource_id = 001de000-4401-4000-8000-000000000000
resource_type = Project
|
| 427 | 2026-01-27T01:13:50.470Z | TRAC | test_vpcs (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 428 | 2026-01-27T01:13:50.470Z | DEBG | test_vpcs (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 429 | 2026-01-27T01:13:50.471Z | DEBG | test_vpcs (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 430 | 2026-01-27T01:13:50.477Z | TRAC | test_vpcs (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }
resource_id = 001de000-5110-4000-8000-000000000001
resource_type = Silo
|
| 431 | 2026-01-27T01:13:50.477Z | TRAC | test_vpcs (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 432 | 2026-01-27T01:13:50.477Z | DEBG | test_vpcs (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 433 | 2026-01-27T01:13:50.478Z | DEBG | test_vpcs (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 434 | 2026-01-27T01:13:50.482Z | TRAC | test_vpcs (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 435 | 2026-01-27T01:13:50.482Z | TRAC | test_vpcs (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 436 | 2026-01-27T01:13:50.482Z | DEBG | test_vpcs (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 437 | 2026-01-27T01:13:50.483Z | DEBG | test_vpcs (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 438 | 2026-01-27T01:13:50.491Z | DEBG | test_vpcs (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 439 | 2026-01-27T01:13:50.499Z | DEBG | test_vpcs (DataLoader): authorize result
action = Modify
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
result = Ok(())
|
| 440 | 2026-01-27T01:13:50.500Z | TRAC | test_vpcs (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 441 | 2026-01-27T01:13:50.500Z | DEBG | test_vpcs (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 442 | 2026-01-27T01:13:50.501Z | DEBG | test_vpcs (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 443 | 2026-01-27T01:13:50.612Z | INFO | test_vpcs (DataLoader): created built-in VPC firewall rules
|
| 444 | 2026-01-27T01:13:50.612Z | DEBG | test_vpcs (DataLoader): attempting to create built-in VPC Subnets
|
| 445 | 2026-01-27T01:13:50.612Z | TRAC | test_vpcs (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 446 | 2026-01-27T01:13:50.612Z | DEBG | test_vpcs (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 447 | 2026-01-27T01:13:50.613Z | DEBG | test_vpcs (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 448 | 2026-01-27T01:13:50.618Z | TRAC | test_vpcs (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 449 | 2026-01-27T01:13:50.619Z | DEBG | test_vpcs (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 450 | 2026-01-27T01:13:50.619Z | DEBG | test_vpcs (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 451 | 2026-01-27T01:13:50.624Z | TRAC | test_vpcs (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 452 | 2026-01-27T01:13:50.624Z | DEBG | test_vpcs (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 453 | 2026-01-27T01:13:50.625Z | DEBG | test_vpcs (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 454 | 2026-01-27T01:13:50.629Z | TRAC | test_vpcs (DataLoader): authorize begin
action = CreateChild
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
|
| 455 | 2026-01-27T01:13:50.629Z | TRAC | test_vpcs (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }
resource_id = 001de000-4401-4000-8000-000000000000
resource_type = Project
|
| 456 | 2026-01-27T01:13:50.629Z | TRAC | test_vpcs (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 457 | 2026-01-27T01:13:50.630Z | DEBG | test_vpcs (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 458 | 2026-01-27T01:13:50.630Z | DEBG | test_vpcs (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 459 | 2026-01-27T01:13:50.634Z | TRAC | test_vpcs (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }
resource_id = 001de000-5110-4000-8000-000000000001
resource_type = Silo
|
| 460 | 2026-01-27T01:13:50.634Z | TRAC | test_vpcs (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 461 | 2026-01-27T01:13:50.634Z | DEBG | test_vpcs (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 462 | 2026-01-27T01:13:50.635Z | DEBG | test_vpcs (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 463 | 2026-01-27T01:13:50.639Z | TRAC | test_vpcs (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 464 | 2026-01-27T01:13:50.639Z | TRAC | test_vpcs (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 465 | 2026-01-27T01:13:50.639Z | DEBG | test_vpcs (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 466 | 2026-01-27T01:13:50.640Z | DEBG | test_vpcs (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 467 | 2026-01-27T01:13:50.644Z | DEBG | test_vpcs (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 468 | 2026-01-27T01:13:50.654Z | DEBG | test_vpcs (DataLoader): authorize result
action = CreateChild
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
result = Ok(())
|
| 469 | 2026-01-27T01:13:50.655Z | TRAC | test_vpcs (DataLoader): successful lookup of siloed resource "Vpc" using built-in user
|
| 470 | 2026-01-27T01:13:50.655Z | TRAC | test_vpcs (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 471 | 2026-01-27T01:13:50.655Z | DEBG | test_vpcs (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 472 | 2026-01-27T01:13:50.655Z | DEBG | test_vpcs (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 473 | 2026-01-27T01:13:50.668Z | TRAC | test_vpcs (DataLoader): authorize begin
action = CreateChild
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
|
| 474 | 2026-01-27T01:13:50.668Z | TRAC | test_vpcs (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }
resource_id = 001de000-4401-4000-8000-000000000000
resource_type = Project
|
| 475 | 2026-01-27T01:13:50.668Z | TRAC | test_vpcs (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 476 | 2026-01-27T01:13:50.668Z | DEBG | test_vpcs (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 477 | 2026-01-27T01:13:50.669Z | DEBG | test_vpcs (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 478 | 2026-01-27T01:13:50.674Z | TRAC | test_vpcs (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }
resource_id = 001de000-5110-4000-8000-000000000001
resource_type = Silo
|
| 479 | 2026-01-27T01:13:50.674Z | TRAC | test_vpcs (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 480 | 2026-01-27T01:13:50.674Z | DEBG | test_vpcs (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 481 | 2026-01-27T01:13:50.677Z | DEBG | test_vpcs (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 482 | 2026-01-27T01:13:50.682Z | TRAC | test_vpcs (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 483 | 2026-01-27T01:13:50.682Z | TRAC | test_vpcs (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 484 | 2026-01-27T01:13:50.682Z | DEBG | test_vpcs (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 485 | 2026-01-27T01:13:50.683Z | DEBG | test_vpcs (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 486 | 2026-01-27T01:13:50.686Z | DEBG | test_vpcs (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 487 | 2026-01-27T01:13:50.696Z | DEBG | test_vpcs (DataLoader): authorize result
action = CreateChild
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
result = Ok(())
|
| 488 | 2026-01-27T01:13:50.706Z | TRAC | test_vpcs (DataLoader): authorize begin
action = CreateChild
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-074c-4000-8000-000000000001, lookup_type: ById(001de000-074c-4000-8000-000000000001) }
|
| 489 | 2026-01-27T01:13:50.706Z | TRAC | test_vpcs (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }
resource_id = 001de000-4401-4000-8000-000000000000
resource_type = Project
|
| 490 | 2026-01-27T01:13:50.706Z | TRAC | test_vpcs (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 491 | 2026-01-27T01:13:50.706Z | DEBG | test_vpcs (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 492 | 2026-01-27T01:13:50.707Z | DEBG | test_vpcs (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 493 | 2026-01-27T01:13:50.713Z | TRAC | test_vpcs (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }
resource_id = 001de000-5110-4000-8000-000000000001
resource_type = Silo
|
| 494 | 2026-01-27T01:13:50.713Z | TRAC | test_vpcs (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 495 | 2026-01-27T01:13:50.713Z | DEBG | test_vpcs (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 496 | 2026-01-27T01:13:50.714Z | DEBG | test_vpcs (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 497 | 2026-01-27T01:13:50.718Z | TRAC | test_vpcs (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 498 | 2026-01-27T01:13:50.718Z | TRAC | test_vpcs (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 499 | 2026-01-27T01:13:50.719Z | DEBG | test_vpcs (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 500 | 2026-01-27T01:13:50.719Z | DEBG | test_vpcs (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 501 | 2026-01-27T01:13:50.723Z | DEBG | test_vpcs (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 502 | 2026-01-27T01:13:50.734Z | DEBG | test_vpcs (DataLoader): authorize result
action = CreateChild
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-074c-4000-8000-000000000001, lookup_type: ById(001de000-074c-4000-8000-000000000001) }
result = Ok(())
|
| 503 | 2026-01-27T01:13:50.735Z | TRAC | test_vpcs (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 504 | 2026-01-27T01:13:50.735Z | DEBG | test_vpcs (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 505 | 2026-01-27T01:13:50.736Z | DEBG | test_vpcs (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 506 | 2026-01-27T01:13:50.826Z | TRAC | test_vpcs (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 507 | 2026-01-27T01:13:50.826Z | DEBG | test_vpcs (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 508 | 2026-01-27T01:13:50.827Z | DEBG | test_vpcs (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 509 | 2026-01-27T01:13:50.833Z | TRAC | test_vpcs (DataLoader): authorize begin
action = CreateChild
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
|
| 510 | 2026-01-27T01:13:50.833Z | TRAC | test_vpcs (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }
resource_id = 001de000-4401-4000-8000-000000000000
resource_type = Project
|
| 511 | 2026-01-27T01:13:50.833Z | TRAC | test_vpcs (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 512 | 2026-01-27T01:13:50.833Z | DEBG | test_vpcs (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 513 | 2026-01-27T01:13:50.835Z | DEBG | test_vpcs (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 514 | 2026-01-27T01:13:50.839Z | TRAC | test_vpcs (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }
resource_id = 001de000-5110-4000-8000-000000000001
resource_type = Silo
|
| 515 | 2026-01-27T01:13:50.839Z | TRAC | test_vpcs (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 516 | 2026-01-27T01:13:50.839Z | DEBG | test_vpcs (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 517 | 2026-01-27T01:13:50.840Z | DEBG | test_vpcs (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 518 | 2026-01-27T01:13:50.844Z | TRAC | test_vpcs (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 519 | 2026-01-27T01:13:50.845Z | TRAC | test_vpcs (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 520 | 2026-01-27T01:13:50.845Z | DEBG | test_vpcs (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 521 | 2026-01-27T01:13:50.847Z | DEBG | test_vpcs (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 522 | 2026-01-27T01:13:50.857Z | DEBG | test_vpcs (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 523 | 2026-01-27T01:13:50.867Z | DEBG | test_vpcs (DataLoader): authorize result
action = CreateChild
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
result = Ok(())
|
| 524 | 2026-01-27T01:13:50.875Z | TRAC | test_vpcs (DataLoader): authorize begin
action = CreateChild
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-074c-4000-8000-000000000001, lookup_type: ById(001de000-074c-4000-8000-000000000001) }
|
| 525 | 2026-01-27T01:13:50.875Z | TRAC | test_vpcs (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }
resource_id = 001de000-4401-4000-8000-000000000000
resource_type = Project
|
| 526 | 2026-01-27T01:13:50.875Z | TRAC | test_vpcs (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 527 | 2026-01-27T01:13:50.875Z | DEBG | test_vpcs (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 528 | 2026-01-27T01:13:50.876Z | DEBG | test_vpcs (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 529 | 2026-01-27T01:13:50.881Z | TRAC | test_vpcs (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }
resource_id = 001de000-5110-4000-8000-000000000001
resource_type = Silo
|
| 530 | 2026-01-27T01:13:50.881Z | TRAC | test_vpcs (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 531 | 2026-01-27T01:13:50.881Z | DEBG | test_vpcs (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 532 | 2026-01-27T01:13:50.882Z | DEBG | test_vpcs (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 533 | 2026-01-27T01:13:50.886Z | TRAC | test_vpcs (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 534 | 2026-01-27T01:13:50.886Z | TRAC | test_vpcs (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 535 | 2026-01-27T01:13:50.886Z | DEBG | test_vpcs (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 536 | 2026-01-27T01:13:50.887Z | DEBG | test_vpcs (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 537 | 2026-01-27T01:13:50.892Z | DEBG | test_vpcs (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 538 | 2026-01-27T01:13:50.902Z | DEBG | test_vpcs (DataLoader): authorize result
action = CreateChild
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-074c-4000-8000-000000000001, lookup_type: ById(001de000-074c-4000-8000-000000000001) }
result = Ok(())
|
| 539 | 2026-01-27T01:13:50.902Z | TRAC | test_vpcs (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 540 | 2026-01-27T01:13:50.902Z | DEBG | test_vpcs (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 541 | 2026-01-27T01:13:50.903Z | DEBG | test_vpcs (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 542 | 2026-01-27T01:13:50.911Z | TRAC | test_vpcs (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 543 | 2026-01-27T01:13:50.911Z | DEBG | test_vpcs (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 544 | 2026-01-27T01:13:50.912Z | DEBG | test_vpcs (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 545 | 2026-01-27T01:13:50.917Z | TRAC | test_vpcs (DataLoader): authorize begin
action = CreateChild
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
|
| 546 | 2026-01-27T01:13:50.918Z | TRAC | test_vpcs (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }
resource_id = 001de000-4401-4000-8000-000000000000
resource_type = Project
|
| 547 | 2026-01-27T01:13:50.918Z | TRAC | test_vpcs (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 548 | 2026-01-27T01:13:50.918Z | DEBG | test_vpcs (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 549 | 2026-01-27T01:13:50.919Z | DEBG | test_vpcs (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 550 | 2026-01-27T01:13:50.923Z | TRAC | test_vpcs (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }
resource_id = 001de000-5110-4000-8000-000000000001
resource_type = Silo
|
| 551 | 2026-01-27T01:13:50.923Z | TRAC | test_vpcs (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 552 | 2026-01-27T01:13:50.923Z | DEBG | test_vpcs (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 553 | 2026-01-27T01:13:50.924Z | DEBG | test_vpcs (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 554 | 2026-01-27T01:13:50.928Z | TRAC | test_vpcs (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 555 | 2026-01-27T01:13:50.928Z | TRAC | test_vpcs (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 556 | 2026-01-27T01:13:50.929Z | DEBG | test_vpcs (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 557 | 2026-01-27T01:13:50.929Z | DEBG | test_vpcs (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 558 | 2026-01-27T01:13:50.933Z | DEBG | test_vpcs (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 559 | 2026-01-27T01:13:50.942Z | DEBG | test_vpcs (DataLoader): authorize result
action = CreateChild
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
result = Ok(())
|
| 560 | 2026-01-27T01:13:50.950Z | TRAC | test_vpcs (DataLoader): authorize begin
action = CreateChild
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-074c-4000-8000-000000000001, lookup_type: ById(001de000-074c-4000-8000-000000000001) }
|
| 561 | 2026-01-27T01:13:50.950Z | TRAC | test_vpcs (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }
resource_id = 001de000-4401-4000-8000-000000000000
resource_type = Project
|
| 562 | 2026-01-27T01:13:50.950Z | TRAC | test_vpcs (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 563 | 2026-01-27T01:13:50.950Z | DEBG | test_vpcs (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 564 | 2026-01-27T01:13:50.951Z | DEBG | test_vpcs (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 565 | 2026-01-27T01:13:50.956Z | TRAC | test_vpcs (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }
resource_id = 001de000-5110-4000-8000-000000000001
resource_type = Silo
|
| 566 | 2026-01-27T01:13:50.956Z | TRAC | test_vpcs (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 567 | 2026-01-27T01:13:50.956Z | DEBG | test_vpcs (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 568 | 2026-01-27T01:13:50.957Z | DEBG | test_vpcs (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 569 | 2026-01-27T01:13:50.961Z | TRAC | test_vpcs (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 570 | 2026-01-27T01:13:50.961Z | TRAC | test_vpcs (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 571 | 2026-01-27T01:13:50.961Z | DEBG | test_vpcs (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 572 | 2026-01-27T01:13:50.962Z | DEBG | test_vpcs (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 573 | 2026-01-27T01:13:50.976Z | DEBG | test_vpcs (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 574 | 2026-01-27T01:13:50.985Z | DEBG | test_vpcs (DataLoader): authorize result
action = CreateChild
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-074c-4000-8000-000000000001, lookup_type: ById(001de000-074c-4000-8000-000000000001) }
result = Ok(())
|
| 575 | 2026-01-27T01:13:50.985Z | TRAC | test_vpcs (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 576 | 2026-01-27T01:13:50.985Z | DEBG | test_vpcs (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 577 | 2026-01-27T01:13:50.986Z | DEBG | test_vpcs (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 578 | 2026-01-27T01:13:50.995Z | TRAC | test_vpcs (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 579 | 2026-01-27T01:13:50.995Z | DEBG | test_vpcs (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 580 | 2026-01-27T01:13:50.996Z | DEBG | test_vpcs (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 581 | 2026-01-27T01:13:51.002Z | INFO | test_vpcs (DataLoader): created built-in services vpc subnets
|
| 582 | 2026-01-27T01:13:51.002Z | INFO | test_vpcs (DataLoader): created built-in services vpc
|
| 583 | 2026-01-27T01:13:51.002Z | TRAC | test_vpcs (DataLoader): authorize begin
action = Modify
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 584 | 2026-01-27T01:13:51.002Z | DEBG | test_vpcs (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 585 | 2026-01-27T01:13:51.004Z | DEBG | test_vpcs (DataLoader): authorize result
action = Modify
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 586 | 2026-01-27T01:13:51.005Z | DEBG | test_vpcs (DataLoader): attempting to create silo users
|
| 587 | 2026-01-27T01:13:51.005Z | TRAC | test_vpcs (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 588 | 2026-01-27T01:13:51.005Z | DEBG | test_vpcs (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 589 | 2026-01-27T01:13:51.005Z | DEBG | test_vpcs (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 590 | 2026-01-27T01:13:51.022Z | INFO | test_vpcs (DataLoader): created 2 silo users
|
| 591 | 2026-01-27T01:13:51.022Z | DEBG | test_vpcs (DataLoader): attempting to create silo user role assignments
|
| 592 | 2026-01-27T01:13:51.022Z | TRAC | test_vpcs (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 593 | 2026-01-27T01:13:51.022Z | DEBG | test_vpcs (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 594 | 2026-01-27T01:13:51.023Z | DEBG | test_vpcs (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 595 | 2026-01-27T01:13:51.030Z | INFO | test_vpcs (DataLoader): created 2 silo user role assignments
|
| 596 | 2026-01-27T01:13:51.030Z | TRAC | test_vpcs (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 597 | 2026-01-27T01:13:51.030Z | DEBG | test_vpcs (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 598 | 2026-01-27T01:13:51.031Z | DEBG | test_vpcs (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 599 | 2026-01-27T01:13:51.039Z | TRAC | test_vpcs (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 600 | 2026-01-27T01:13:51.039Z | DEBG | test_vpcs (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 601 | 2026-01-27T01:13:51.040Z | DEBG | test_vpcs (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 602 | 2026-01-27T01:13:51.052Z | TRAC | test_vpcs (DataLoader): authorize begin
action = CreateChild
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = IpPoolList
|
| 603 | 2026-01-27T01:13:51.052Z | TRAC | test_vpcs (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 604 | 2026-01-27T01:13:51.052Z | TRAC | test_vpcs (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 605 | 2026-01-27T01:13:51.052Z | DEBG | test_vpcs (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 606 | 2026-01-27T01:13:51.053Z | DEBG | test_vpcs (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 607 | 2026-01-27T01:13:51.057Z | DEBG | test_vpcs (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 608 | 2026-01-27T01:13:51.060Z | DEBG | test_vpcs (DataLoader): authorize result
action = CreateChild
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = IpPoolList
result = Ok(())
|
| 609 | 2026-01-27T01:13:51.060Z | TRAC | test_vpcs (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 610 | 2026-01-27T01:13:51.061Z | DEBG | test_vpcs (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 611 | 2026-01-27T01:13:51.061Z | DEBG | test_vpcs (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 612 | 2026-01-27T01:13:51.270Z | TRAC | test_vpcs (DataLoader): authorize begin
action = CreateChild
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = IpPoolList
|
| 613 | 2026-01-27T01:13:51.270Z | TRAC | test_vpcs (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 614 | 2026-01-27T01:13:51.270Z | TRAC | test_vpcs (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 615 | 2026-01-27T01:13:51.270Z | DEBG | test_vpcs (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 616 | 2026-01-27T01:13:51.271Z | DEBG | test_vpcs (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 617 | 2026-01-27T01:13:51.276Z | DEBG | test_vpcs (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 618 | 2026-01-27T01:13:51.279Z | DEBG | test_vpcs (DataLoader): authorize result
action = CreateChild
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = IpPoolList
result = Ok(())
|
| 619 | 2026-01-27T01:13:51.279Z | TRAC | test_vpcs (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 620 | 2026-01-27T01:13:51.279Z | DEBG | test_vpcs (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 621 | 2026-01-27T01:13:51.279Z | DEBG | test_vpcs (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 622 | 2026-01-27T01:13:51.285Z | INFO | test_vpcs (nexus): populate complete
|
| 623 | 2026-01-27T01:13:51.285Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Modify
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = BlueprintConfig
|
| 624 | 2026-01-27T01:13:51.285Z | TRAC | test_vpcs (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 625 | 2026-01-27T01:13:51.285Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 626 | 2026-01-27T01:13:51.285Z | DEBG | test_vpcs (BackgroundTasks): roles
roles = RoleSet { roles: {} }
|
| 627 | 2026-01-27T01:13:51.286Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 628 | 2026-01-27T01:13:51.294Z | DEBG | test_vpcs (init_with_steps): Running step start_gateway_switch0
|
| 629 | 2026-01-27T01:13:51.294Z | DEBG | test_vpcs: Starting Management Gateway
|
| 630 | 2026-01-27T01:13:51.346Z | DEBG | test_vpcs (BackgroundTasks): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 631 | 2026-01-27T01:13:51.352Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Modify
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = BlueprintConfig
result = Ok(())
|
| 632 | 2026-01-27T01:13:51.352Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 633 | 2026-01-27T01:13:51.352Z | DEBG | test_vpcs (BackgroundTasks): roles
roles = RoleSet { roles: {} }
|
| 634 | 2026-01-27T01:13:51.353Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 635 | 2026-01-27T01:13:51.370Z | INFO | test_vpcs (nexus): activating background tasks
|
| 636 | 2026-01-27T01:13:51.379Z | DEBG | test_vpcs (BackgroundTasks): activating
background_task = support_bundle_collector
iteration = 1
reason = Timeout
|
| 637 | 2026-01-27T01:13:51.379Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = support_bundle_collector
resource = Fleet
|
| 638 | 2026-01-27T01:13:51.379Z | TRAC | test_vpcs (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = support_bundle_collector
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 639 | 2026-01-27T01:13:51.379Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = support_bundle_collector
resource = Database
|
| 640 | 2026-01-27T01:13:51.379Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = support_bundle_collector
roles = RoleSet { roles: {} }
|
| 641 | 2026-01-27T01:13:51.381Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = support_bundle_collector
resource = Database
result = Ok(())
|
| 642 | 2026-01-27T01:13:51.385Z | DEBG | test_vpcs (BackgroundTasks): activating
background_task = physical_disk_adoption
iteration = 1
reason = Timeout
|
| 643 | 2026-01-27T01:13:51.385Z | DEBG | test_vpcs (BackgroundTasks): activation complete
background_task = physical_disk_adoption
elapsed = 215.433\u{b5}s
iteration = 1
status = {"error":"task disabled"}
|
| 644 | 2026-01-27T01:13:51.385Z | DEBG | test_vpcs (BackgroundTasks): activating
background_task = blueprint_rendezvous
iteration = 1
reason = Timeout
|
| 645 | 2026-01-27T01:13:51.385Z | WARN | test_vpcs (BackgroundTasks): Blueprint rendezvous: skipped
background_task = blueprint_rendezvous
reason = no blueprint
|
| 646 | 2026-01-27T01:13:51.385Z | DEBG | test_vpcs (BackgroundTasks): activation complete
background_task = blueprint_rendezvous
elapsed = 150.295\u{b5}s
iteration = 1
status = {"error":"no blueprint"}
|
| 647 | 2026-01-27T01:13:51.386Z | DEBG | test_vpcs (BackgroundTasks): activating
background_task = dns_config_internal
dns_group = internal
iteration = 1
reason = Timeout
|
| 648 | 2026-01-27T01:13:51.386Z | DEBG | test_vpcs (BackgroundTasks): reading DNS version
background_task = dns_config_internal
dns_group = internal
|
| 649 | 2026-01-27T01:13:51.386Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = dns_config_internal
dns_group = internal
resource = Database
|
| 650 | 2026-01-27T01:13:51.386Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = dns_config_internal
dns_group = internal
roles = RoleSet { roles: {} }
|
| 651 | 2026-01-27T01:13:51.387Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = dns_config_internal
dns_group = internal
resource = Database
result = Ok(())
|
| 652 | 2026-01-27T01:13:51.390Z | DEBG | test_vpcs (BackgroundTasks): activating
background_task = dns_servers_internal
dns_group = internal
iteration = 1
reason = Timeout
|
| 653 | 2026-01-27T01:13:51.390Z | TRAC | test_vpcs (DnsResolver): lookup_all_socket_v6 srv
dns_name = _nameservice._tcp.control-plane.oxide.internal
|
| 654 | 2026-01-27T01:13:51.390Z | DEBG | test_vpcs (BackgroundTasks): activating
background_task = dns_propagation_internal
dns_group = internal
iteration = 1
reason = Timeout
|
| 655 | 2026-01-27T01:13:51.390Z | WARN | test_vpcs (BackgroundTasks): DNS propagation: skipped
background_task = dns_propagation_internal
dns_group = internal
reason = no config nor servers
|
| 656 | 2026-01-27T01:13:51.390Z | DEBG | test_vpcs (BackgroundTasks): activation complete
background_task = dns_propagation_internal
dns_group = internal
elapsed = 67.102\u{b5}s
iteration = 1
status = {"error":"no config nor servers"}
|
| 657 | 2026-01-27T01:13:51.390Z | DEBG | test_vpcs (BackgroundTasks): activating
background_task = dns_config_external
dns_group = external
iteration = 1
reason = Timeout
|
| 658 | 2026-01-27T01:13:51.390Z | DEBG | test_vpcs (BackgroundTasks): reading DNS version
background_task = dns_config_external
dns_group = external
|
| 659 | 2026-01-27T01:13:51.390Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = dns_config_external
dns_group = external
resource = Database
|
| 660 | 2026-01-27T01:13:51.390Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = dns_config_external
dns_group = external
roles = RoleSet { roles: {} }
|
| 661 | 2026-01-27T01:13:51.393Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = dns_config_external
dns_group = external
resource = Database
result = Ok(())
|
| 662 | 2026-01-27T01:13:51.394Z | DEBG | test_vpcs (BackgroundTasks): activating
background_task = dns_servers_external
dns_group = external
iteration = 1
reason = Timeout
|
| 663 | 2026-01-27T01:13:51.394Z | TRAC | test_vpcs (DnsResolver): lookup_all_socket_v6 srv
dns_name = _external-dns._tcp.control-plane.oxide.internal
|
| 664 | 2026-01-27T01:13:51.394Z | DEBG | test_vpcs (BackgroundTasks): activating
background_task = dns_propagation_external
dns_group = external
iteration = 1
reason = Timeout
|
| 665 | 2026-01-27T01:13:51.394Z | WARN | test_vpcs (BackgroundTasks): DNS propagation: skipped
background_task = dns_propagation_external
dns_group = external
reason = no config nor servers
|
| 666 | 2026-01-27T01:13:51.394Z | DEBG | test_vpcs (BackgroundTasks): activation complete
background_task = dns_propagation_external
dns_group = external
elapsed = 56.531\u{b5}s
iteration = 1
status = {"error":"no config nor servers"}
|
| 667 | 2026-01-27T01:13:51.394Z | DEBG | test_vpcs (BackgroundTasks): activating
background_task = metrics_producer_gc
iteration = 1
reason = Timeout
|
| 668 | 2026-01-27T01:13:51.394Z | INFO | test_vpcs (BackgroundTasks): Metric producer GC running
background_task = metrics_producer_gc
expiration = 2026-01-27 01:03:51.394482868 UTC
|
| 669 | 2026-01-27T01:13:51.394Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = metrics_producer_gc
resource = Database
|
| 670 | 2026-01-27T01:13:51.394Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = metrics_producer_gc
roles = RoleSet { roles: {} }
|
| 671 | 2026-01-27T01:13:51.396Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = metrics_producer_gc
resource = Database
result = Ok(())
|
| 672 | 2026-01-27T01:13:51.476Z | DEBG | test_vpcs (BackgroundTasks): activating
background_task = external_endpoints
iteration = 1
reason = Timeout
|
| 673 | 2026-01-27T01:13:51.477Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = external_endpoints
resource = Fleet
|
| 674 | 2026-01-27T01:13:51.477Z | TRAC | test_vpcs (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = external_endpoints
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 675 | 2026-01-27T01:13:51.477Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = external_endpoints
resource = Database
|
| 676 | 2026-01-27T01:13:51.477Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = external_endpoints
roles = RoleSet { roles: {} }
|
| 677 | 2026-01-27T01:13:51.479Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = external_endpoints
resource = Database
result = Ok(())
|
| 678 | 2026-01-27T01:13:51.479Z | DEBG | test_vpcs (BackgroundTasks): activating
background_task = nat_garbage_collector
iteration = 1
reason = Timeout
|
| 679 | 2026-01-27T01:13:51.480Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = nat_garbage_collector
resource = Database
|
| 680 | 2026-01-27T01:13:51.480Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = nat_garbage_collector
roles = RoleSet { roles: {} }
|
| 681 | 2026-01-27T01:13:51.480Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = nat_garbage_collector
resource = Database
result = Ok(())
|
| 682 | 2026-01-27T01:13:51.481Z | DEBG | test_vpcs (BackgroundTasks): activating
background_task = bfd_manager
iteration = 1
reason = Timeout
|
| 683 | 2026-01-27T01:13:51.481Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = bfd_manager
resource = Database
|
| 684 | 2026-01-27T01:13:51.481Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = bfd_manager
roles = RoleSet { roles: {} }
|
| 685 | 2026-01-27T01:13:51.482Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = bfd_manager
resource = Database
result = Ok(())
|
| 686 | 2026-01-27T01:13:51.483Z | DEBG | test_vpcs (BackgroundTasks): activating
background_task = phantom_disks
iteration = 1
reason = Timeout
|
| 687 | 2026-01-27T01:13:51.483Z | DEBG | test_vpcs (BackgroundTasks): activating
background_task = blueprint_executor
iteration = 1
reason = Timeout
|
| 688 | 2026-01-27T01:13:51.484Z | WARN | test_vpcs (BackgroundTasks): Blueprint execution: skipped
background_task = blueprint_executor
reason = no blueprint
|
| 689 | 2026-01-27T01:13:51.484Z | DEBG | test_vpcs (BackgroundTasks): activation complete
background_task = blueprint_executor
elapsed = 73.023\u{b5}s
iteration = 1
status = {"error":"no blueprint"}
|
| 690 | 2026-01-27T01:13:51.484Z | DEBG | test_vpcs (BackgroundTasks): activating
background_task = inventory_collection
iteration = 1
reason = Timeout
|
| 691 | 2026-01-27T01:13:51.484Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Modify
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = inventory_collection
resource = Inventory
|
| 692 | 2026-01-27T01:13:51.484Z | TRAC | test_vpcs (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = inventory_collection
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 693 | 2026-01-27T01:13:51.484Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = inventory_collection
resource = Database
|
| 694 | 2026-01-27T01:13:51.484Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = inventory_collection
roles = RoleSet { roles: {} }
|
| 695 | 2026-01-27T01:13:51.484Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = inventory_collection
resource = Database
result = Ok(())
|
| 696 | 2026-01-27T01:13:51.486Z | DEBG | test_vpcs (BackgroundTasks): activating
background_task = inventory_loader
iteration = 1
reason = Timeout
|
| 697 | 2026-01-27T01:13:51.486Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = inventory_loader
resource = Inventory
|
| 698 | 2026-01-27T01:13:51.486Z | TRAC | test_vpcs (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = inventory_loader
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 699 | 2026-01-27T01:13:51.486Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = inventory_loader
resource = Database
|
| 700 | 2026-01-27T01:13:51.486Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = inventory_loader
roles = RoleSet { roles: {} }
|
| 701 | 2026-01-27T01:13:51.486Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = inventory_loader
resource = Database
result = Ok(())
|
| 702 | 2026-01-27T01:13:51.487Z | DEBG | test_vpcs (BackgroundTasks): activating
background_task = reconfigurator_config_watcher
iteration = 1
reason = Timeout
|
| 703 | 2026-01-27T01:13:51.487Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = reconfigurator_config_watcher
resource = BlueprintConfig
|
| 704 | 2026-01-27T01:13:51.487Z | TRAC | test_vpcs (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = reconfigurator_config_watcher
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 705 | 2026-01-27T01:13:51.487Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = reconfigurator_config_watcher
resource = Database
|
| 706 | 2026-01-27T01:13:51.487Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = reconfigurator_config_watcher
roles = RoleSet { roles: {} }
|
| 707 | 2026-01-27T01:13:51.488Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = reconfigurator_config_watcher
resource = Database
result = Ok(())
|
| 708 | 2026-01-27T01:13:51.493Z | DEBG | test_vpcs (BackgroundTasks): activating
background_task = blueprint_planner
iteration = 1
reason = Timeout
|
| 709 | 2026-01-27T01:13:51.493Z | DEBG | test_vpcs (BackgroundTasks): reconfigurator config not yet loaded; doing nothing
background_task = blueprint_planner
|
| 710 | 2026-01-27T01:13:51.493Z | DEBG | test_vpcs (BackgroundTasks): activation complete
background_task = blueprint_planner
elapsed = 155.526\u{b5}s
iteration = 1
status = "Disabled"
|
| 711 | 2026-01-27T01:13:51.493Z | DEBG | test_vpcs (BackgroundTasks): activating
background_task = blueprint_loader
iteration = 1
reason = Timeout
|
| 712 | 2026-01-27T01:13:51.493Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = blueprint_loader
resource = BlueprintConfig
|
| 713 | 2026-01-27T01:13:51.493Z | TRAC | test_vpcs (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = blueprint_loader
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 714 | 2026-01-27T01:13:51.493Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = blueprint_loader
resource = Database
|
| 715 | 2026-01-27T01:13:51.493Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = blueprint_loader
roles = RoleSet { roles: {} }
|
| 716 | 2026-01-27T01:13:51.494Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = blueprint_loader
resource = Database
result = Ok(())
|
| 717 | 2026-01-27T01:13:51.496Z | DEBG | test_vpcs (BackgroundTasks): activating
background_task = crdb_node_id_collector
iteration = 1
reason = Timeout
|
| 718 | 2026-01-27T01:13:51.496Z | WARN | test_vpcs (BackgroundTasks): Blueprint execution: skipped
background_task = crdb_node_id_collector
reason = no blueprint
|
| 719 | 2026-01-27T01:13:51.496Z | DEBG | test_vpcs (BackgroundTasks): activation complete
background_task = crdb_node_id_collector
elapsed = 84.185\u{b5}s
iteration = 1
status = {"error":"no blueprint"}
|
| 720 | 2026-01-27T01:13:51.496Z | DEBG | test_vpcs (BackgroundTasks): activating
background_task = decommissioned_disk_cleaner
iteration = 1
reason = Timeout
|
| 721 | 2026-01-27T01:13:51.496Z | INFO | test_vpcs (BackgroundTasks): Decommissioned Disk Cleaner disabled
background_task = decommissioned_disk_cleaner
|
| 722 | 2026-01-27T01:13:51.496Z | DEBG | test_vpcs (BackgroundTasks): activation complete
background_task = decommissioned_disk_cleaner
elapsed = 101.088\u{b5}s
iteration = 1
status = {"deleted":0,"error":null,"error_count":0,"found":0,"not_ready_to_be_deleted":0}
|
| 723 | 2026-01-27T01:13:51.496Z | DEBG | test_vpcs (BackgroundTasks): activating
background_task = service_zone_nat_tracker
iteration = 1
reason = Timeout
|
| 724 | 2026-01-27T01:13:51.496Z | WARN | test_vpcs (BackgroundTasks): inventory collection is None
background_task = service_zone_nat_tracker
|
| 725 | 2026-01-27T01:13:51.496Z | DEBG | test_vpcs (BackgroundTasks): activation complete
background_task = service_zone_nat_tracker
elapsed = 69.237\u{b5}s
iteration = 1
status = {"error":"inventory collection is None"}
|
| 726 | 2026-01-27T01:13:51.496Z | DEBG | test_vpcs (BackgroundTasks): activating
background_task = switch_port_config_manager
iteration = 1
reason = Timeout
|
| 727 | 2026-01-27T01:13:51.496Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = switch_port_config_manager
resource = Fleet
|
| 728 | 2026-01-27T01:13:51.496Z | TRAC | test_vpcs (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = switch_port_config_manager
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 729 | 2026-01-27T01:13:51.497Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = switch_port_config_manager
resource = Database
|
| 730 | 2026-01-27T01:13:51.497Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = switch_port_config_manager
roles = RoleSet { roles: {} }
|
| 731 | 2026-01-27T01:13:51.497Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = switch_port_config_manager
resource = Database
result = Ok(())
|
| 732 | 2026-01-27T01:13:51.499Z | DEBG | test_vpcs (BackgroundTasks): activating
background_task = v2p_manager
iteration = 1
reason = Timeout
|
| 733 | 2026-01-27T01:13:51.500Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = v2p_manager
resource = Database
|
| 734 | 2026-01-27T01:13:51.500Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = v2p_manager
roles = RoleSet { roles: {} }
|
| 735 | 2026-01-27T01:13:51.501Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = v2p_manager
resource = Database
result = Ok(())
|
| 736 | 2026-01-27T01:13:51.502Z | DEBG | test_vpcs (BackgroundTasks): activating
background_task = region_replacement
iteration = 1
reason = Timeout
|
| 737 | 2026-01-27T01:13:51.502Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = region_replacement
resource = Database
|
| 738 | 2026-01-27T01:13:51.503Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = region_replacement
roles = RoleSet { roles: {} }
|
| 739 | 2026-01-27T01:13:51.503Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = region_replacement
resource = Database
result = Ok(())
|
| 740 | 2026-01-27T01:13:51.504Z | DEBG | test_vpcs (BackgroundTasks): activating
background_task = region_replacement_driver
iteration = 1
reason = Timeout
|
| 741 | 2026-01-27T01:13:51.504Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = region_replacement_driver
resource = Database
|
| 742 | 2026-01-27T01:13:51.504Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = region_replacement_driver
roles = RoleSet { roles: {} }
|
| 743 | 2026-01-27T01:13:51.505Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = region_replacement_driver
resource = Database
result = Ok(())
|
| 744 | 2026-01-27T01:13:51.506Z | DEBG | test_vpcs (BackgroundTasks): activating
background_task = instance_watcher
iteration = 1
reason = Timeout
|
| 745 | 2026-01-27T01:13:51.506Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = instance_watcher
resource = Fleet
|
| 746 | 2026-01-27T01:13:51.506Z | TRAC | test_vpcs (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = instance_watcher
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 747 | 2026-01-27T01:13:51.506Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = instance_watcher
resource = Database
|
| 748 | 2026-01-27T01:13:51.506Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = instance_watcher
roles = RoleSet { roles: {} }
|
| 749 | 2026-01-27T01:13:51.507Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = instance_watcher
resource = Database
result = Ok(())
|
| 750 | 2026-01-27T01:13:51.508Z | DEBG | test_vpcs (BackgroundTasks): activating
background_task = instance_updater
iteration = 1
reason = Timeout
|
| 751 | 2026-01-27T01:13:51.508Z | INFO | test_vpcs (BackgroundTasks): background instance updater explicitly disabled
background_task = instance_updater
|
| 752 | 2026-01-27T01:13:51.508Z | DEBG | test_vpcs (BackgroundTasks): activation complete
background_task = instance_updater
elapsed = 385.227\u{b5}s
iteration = 1
status = {"destroyed_active_vmms":0,"disabled":true,"failed_active_vmms":0,"query_errors":[],"saga_errors":[],"sagas_completed":0,"sagas_started":0,"terminated_active_migrations":0}
|
| 753 | 2026-01-27T01:13:51.508Z | DEBG | test_vpcs (BackgroundTasks): activating
background_task = instance_reincarnation
iteration = 1
reason = Timeout
|
| 754 | 2026-01-27T01:13:51.508Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = instance_reincarnation
resource = Database
|
| 755 | 2026-01-27T01:13:51.508Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = instance_reincarnation
roles = RoleSet { roles: {} }
|
| 756 | 2026-01-27T01:13:51.509Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = instance_reincarnation
resource = Database
result = Ok(())
|
| 757 | 2026-01-27T01:13:51.601Z | DEBG | test_vpcs (init_with_steps): Running step start_dendrite_switch0
|
| 758 | 2026-01-27T01:13:51.601Z | DEBG | test_vpcs: Starting Dendrite for switch0
|
| 759 | 2026-01-27T01:13:51.612Z | DEBG | test_vpcs (BackgroundTasks): activating
background_task = service_firewall_rule_propagation
iteration = 1
reason = Timeout
|
| 760 | 2026-01-27T01:13:51.612Z | DEBG | test_vpcs (service-firewall-rule-progator): starting background task for service firewall rule propagation
background_task = service_firewall_rule_propagation
|
| 761 | 2026-01-27T01:13:51.612Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
|
| 762 | 2026-01-27T01:13:51.612Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {} }
|
| 763 | 2026-01-27T01:13:51.613Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
result = Ok(())
|
| 764 | 2026-01-27T01:13:51.614Z | DEBG | test_vpcs (BackgroundTasks): activating
background_task = vpc_route_manager
iteration = 1
reason = Timeout
|
| 765 | 2026-01-27T01:13:51.614Z | INFO | test_vpcs (BackgroundTasks): VPC route manager running
background_task = vpc_route_manager
|
| 766 | 2026-01-27T01:13:51.614Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = vpc_route_manager
resource = Fleet
|
| 767 | 2026-01-27T01:13:51.614Z | TRAC | test_vpcs (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = vpc_route_manager
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 768 | 2026-01-27T01:13:51.614Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = vpc_route_manager
resource = Database
|
| 769 | 2026-01-27T01:13:51.614Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = vpc_route_manager
roles = RoleSet { roles: {} }
|
| 770 | 2026-01-27T01:13:51.615Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = vpc_route_manager
resource = Database
result = Ok(())
|
| 771 | 2026-01-27T01:13:51.616Z | DEBG | test_vpcs (BackgroundTasks): activating
background_task = abandoned_vmm_reaper
iteration = 1
reason = Timeout
|
| 772 | 2026-01-27T01:13:51.617Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = abandoned_vmm_reaper
resource = Database
|
| 773 | 2026-01-27T01:13:51.617Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = abandoned_vmm_reaper
roles = RoleSet { roles: {} }
|
| 774 | 2026-01-27T01:13:51.617Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = abandoned_vmm_reaper
resource = Database
result = Ok(())
|
| 775 | 2026-01-27T01:13:51.618Z | DEBG | test_vpcs (BackgroundTasks): activating
background_task = saga_recovery
iteration = 1
reason = Timeout
|
| 776 | 2026-01-27T01:13:51.618Z | INFO | test_vpcs (SagaQuiesceHandle): saga recovery pass starting
|
| 777 | 2026-01-27T01:13:51.618Z | DEBG | test_vpcs (SagaRecoverer): listing candidate sagas for recovery
|
| 778 | 2026-01-27T01:13:51.618Z | TRAC | test_vpcs (SagaRecoverer): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000003a8a (built_in_user), .. })
resource = Database
|
| 779 | 2026-01-27T01:13:51.618Z | DEBG | test_vpcs (SagaRecoverer): roles
roles = RoleSet { roles: {} }
|
| 780 | 2026-01-27T01:13:51.620Z | DEBG | test_vpcs (SagaRecoverer): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000003a8a (built_in_user), .. })
resource = Database
result = Ok(())
|
| 781 | 2026-01-27T01:13:51.621Z | DEBG | test_vpcs (BackgroundTasks): activating
background_task = lookup_region_port
iteration = 1
reason = Timeout
|
| 782 | 2026-01-27T01:13:51.621Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = lookup_region_port
resource = Database
|
| 783 | 2026-01-27T01:13:51.621Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = lookup_region_port
roles = RoleSet { roles: {} }
|
| 784 | 2026-01-27T01:13:51.622Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = lookup_region_port
resource = Database
result = Ok(())
|
| 785 | 2026-01-27T01:13:51.623Z | DEBG | test_vpcs (BackgroundTasks): activating
background_task = region_snapshot_replacement_start
iteration = 1
reason = Timeout
|
| 786 | 2026-01-27T01:13:51.623Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = region_snapshot_replacement_start
resource = Database
|
| 787 | 2026-01-27T01:13:51.623Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = region_snapshot_replacement_start
roles = RoleSet { roles: {} }
|
| 788 | 2026-01-27T01:13:51.625Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = region_snapshot_replacement_start
resource = Database
result = Ok(())
|
| 789 | 2026-01-27T01:13:51.626Z | DEBG | test_vpcs (BackgroundTasks): activating
background_task = region_snapshot_replacement_garbage_collection
iteration = 1
reason = Timeout
|
| 790 | 2026-01-27T01:13:51.626Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = region_snapshot_replacement_garbage_collection
resource = Database
|
| 791 | 2026-01-27T01:13:51.626Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = region_snapshot_replacement_garbage_collection
roles = RoleSet { roles: {} }
|
| 792 | 2026-01-27T01:13:51.628Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = region_snapshot_replacement_garbage_collection
resource = Database
result = Ok(())
|
| 793 | 2026-01-27T01:13:51.629Z | DEBG | test_vpcs (BackgroundTasks): activating
background_task = region_snapshot_replacement_step
iteration = 1
reason = Timeout
|
| 794 | 2026-01-27T01:13:51.629Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = region_snapshot_replacement_step
resource = Database
|
| 795 | 2026-01-27T01:13:51.630Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = region_snapshot_replacement_step
roles = RoleSet { roles: {} }
|
| 796 | 2026-01-27T01:13:51.631Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = region_snapshot_replacement_step
resource = Database
result = Ok(())
|
| 797 | 2026-01-27T01:13:51.632Z | DEBG | test_vpcs (BackgroundTasks): activating
background_task = region_snapshot_replacement_finish
iteration = 1
reason = Timeout
|
| 798 | 2026-01-27T01:13:51.632Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = region_snapshot_replacement_finish
resource = Database
|
| 799 | 2026-01-27T01:13:51.632Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = region_snapshot_replacement_finish
roles = RoleSet { roles: {} }
|
| 800 | 2026-01-27T01:13:51.634Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = region_snapshot_replacement_finish
resource = Database
result = Ok(())
|
| 801 | 2026-01-27T01:13:51.636Z | DEBG | test_vpcs (BackgroundTasks): activating
background_task = tuf_artifact_replication
iteration = 1
reason = Timeout
|
| 802 | 2026-01-27T01:13:51.636Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = tuf_artifact_replication
resource = Fleet
|
| 803 | 2026-01-27T01:13:51.636Z | TRAC | test_vpcs (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = tuf_artifact_replication
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 804 | 2026-01-27T01:13:51.636Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = tuf_artifact_replication
resource = Database
|
| 805 | 2026-01-27T01:13:51.636Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = tuf_artifact_replication
roles = RoleSet { roles: {} }
|
| 806 | 2026-01-27T01:13:51.637Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = tuf_artifact_replication
resource = Database
result = Ok(())
|
| 807 | 2026-01-27T01:13:51.640Z | DEBG | test_vpcs (BackgroundTasks): activating
background_task = tuf_repo_pruner
iteration = 1
reason = Timeout
|
| 808 | 2026-01-27T01:13:51.640Z | INFO | test_vpcs (BackgroundTasks): reconfigurator config not yet loaded; doing nothing
background_task = tuf_repo_pruner
|
| 809 | 2026-01-27T01:13:51.640Z | DEBG | test_vpcs (BackgroundTasks): activation complete
background_task = tuf_repo_pruner
elapsed = 173.451\u{b5}s
iteration = 1
status = {"reason":"reconfigurator config not yet loaded","status":"disabled"}
|
| 810 | 2026-01-27T01:13:51.641Z | DEBG | test_vpcs (BackgroundTasks): activating
background_task = read_only_region_replacement_start
iteration = 1
reason = Timeout
|
| 811 | 2026-01-27T01:13:51.641Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = read_only_region_replacement_start
resource = Database
|
| 812 | 2026-01-27T01:13:51.641Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = read_only_region_replacement_start
roles = RoleSet { roles: {} }
|
| 813 | 2026-01-27T01:13:51.642Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = read_only_region_replacement_start
resource = Database
result = Ok(())
|
| 814 | 2026-01-27T01:13:51.643Z | DEBG | test_vpcs (BackgroundTasks): activating
background_task = alert_dispatcher
iteration = 1
reason = Timeout
|
| 815 | 2026-01-27T01:13:51.643Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = alert_dispatcher
resource = Database
|
| 816 | 2026-01-27T01:13:51.643Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = alert_dispatcher
roles = RoleSet { roles: {} }
|
| 817 | 2026-01-27T01:13:51.644Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = alert_dispatcher
resource = Database
result = Ok(())
|
| 818 | 2026-01-27T01:13:51.646Z | DEBG | test_vpcs (BackgroundTasks): activating
background_task = webhook_deliverator
iteration = 1
reason = Timeout
|
| 819 | 2026-01-27T01:13:51.646Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = webhook_deliverator
resource = Database
|
| 820 | 2026-01-27T01:13:51.646Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = webhook_deliverator
roles = RoleSet { roles: {} }
|
| 821 | 2026-01-27T01:13:51.648Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = webhook_deliverator
resource = Database
result = Ok(())
|
| 822 | 2026-01-27T01:13:51.650Z | DEBG | test_vpcs (BackgroundTasks): activating
background_task = multicast_reconciler
iteration = 1
reason = Timeout
|
| 823 | 2026-01-27T01:13:51.650Z | TRAC | test_vpcs (BackgroundTasks): multicast group reconciler activating
background_task = multicast_reconciler
|
| 824 | 2026-01-27T01:13:51.650Z | TRAC | test_vpcs (BackgroundTasks): starting multicast reconciliation pass
background_task = multicast_reconciler
|
| 825 | 2026-01-27T01:13:51.650Z | TRAC | test_vpcs (DnsResolver): lookup_all_socket_v6 srv
dns_name = _dendrite._tcp.control-plane.oxide.internal
|
| 826 | 2026-01-27T01:13:51.650Z | DEBG | test_vpcs (BackgroundTasks): activating
background_task = sp_ereport_ingester
iteration = 1
reason = Timeout
|
| 827 | 2026-01-27T01:13:51.650Z | TRAC | test_vpcs (DnsResolver): lookup_all_socket_v6 srv
dns_name = _mgs._tcp.control-plane.oxide.internal
|
| 828 | 2026-01-27T01:13:51.650Z | DEBG | test_vpcs (BackgroundTasks): activating
background_task = fm_sitrep_loader
iteration = 1
reason = Timeout
|
| 829 | 2026-01-27T01:13:51.650Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = fm_sitrep_loader
resource = Fleet
|
| 830 | 2026-01-27T01:13:51.651Z | TRAC | test_vpcs (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = fm_sitrep_loader
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 831 | 2026-01-27T01:13:51.651Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = fm_sitrep_loader
resource = Database
|
| 832 | 2026-01-27T01:13:51.651Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = fm_sitrep_loader
roles = RoleSet { roles: {} }
|
| 833 | 2026-01-27T01:13:51.663Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = fm_sitrep_loader
resource = Database
result = Ok(())
|
| 834 | 2026-01-27T01:13:51.665Z | DEBG | test_vpcs (BackgroundTasks): activating
background_task = fm_sitrep_gc
iteration = 1
reason = Timeout
|
| 835 | 2026-01-27T01:13:51.665Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = fm_sitrep_gc
resource = Database
|
| 836 | 2026-01-27T01:13:51.665Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = fm_sitrep_gc
roles = RoleSet { roles: {} }
|
| 837 | 2026-01-27T01:13:51.665Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = fm_sitrep_gc
resource = Database
result = Ok(())
|
| 838 | 2026-01-27T01:13:51.666Z | DEBG | test_vpcs (BackgroundTasks): activating
background_task = probe_distributor
iteration = 1
reason = Timeout
|
| 839 | 2026-01-27T01:13:51.666Z | INFO | test_vpcs (BackgroundTasks): distributing networking probes to sleds
background_task = probe_distributor
|
| 840 | 2026-01-27T01:13:51.666Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = probe_distributor
resource = Fleet
|
| 841 | 2026-01-27T01:13:51.666Z | TRAC | test_vpcs (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = probe_distributor
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 842 | 2026-01-27T01:13:51.666Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = probe_distributor
resource = Database
|
| 843 | 2026-01-27T01:13:51.666Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = probe_distributor
roles = RoleSet { roles: {} }
|
| 844 | 2026-01-27T01:13:51.667Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = probe_distributor
resource = Database
result = Ok(())
|
| 845 | 2026-01-27T01:13:51.668Z | DEBG | test_vpcs (BackgroundTasks): activating
background_task = trust_quorum_manager
iteration = 1
reason = Timeout
|
| 846 | 2026-01-27T01:13:51.668Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = trust_quorum_manager
bgtask = TrustQuorumManager
resource = Fleet
|
| 847 | 2026-01-27T01:13:51.668Z | TRAC | test_vpcs (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = trust_quorum_manager
bgtask = TrustQuorumManager
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 848 | 2026-01-27T01:13:51.668Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = trust_quorum_manager
bgtask = TrustQuorumManager
resource = Database
|
| 849 | 2026-01-27T01:13:51.668Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = trust_quorum_manager
bgtask = TrustQuorumManager
roles = RoleSet { roles: {} }
|
| 850 | 2026-01-27T01:13:51.669Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = trust_quorum_manager
bgtask = TrustQuorumManager
resource = Database
result = Ok(())
|
| 851 | 2026-01-27T01:13:51.672Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = dns_config_internal
dns_group = internal
resource = DnsConfig
|
| 852 | 2026-01-27T01:13:51.672Z | TRAC | test_vpcs (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = dns_config_internal
dns_group = internal
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 853 | 2026-01-27T01:13:51.672Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = dns_config_internal
dns_group = internal
resource = Database
|
| 854 | 2026-01-27T01:13:51.672Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = dns_config_internal
dns_group = internal
roles = RoleSet { roles: {} }
|
| 855 | 2026-01-27T01:13:51.674Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = dns_config_internal
dns_group = internal
resource = Database
result = Ok(())
|
| 856 | 2026-01-27T01:13:51.677Z | TRAC | test_vpcs (dns): buffer
buffer = Length: 75 (0x4b) bytes\n0000: 7b 5d 01 00 00 01 00 00 00 00 00 01 0c 5f 6e 61 {]..........._na\n0010: 6d 65 73 65 72 76 69 63 65 04 5f 74 63 70 0d 63 meservice._tcp.c\n0020: 6f 6e 74 72 6f 6c 2d 70 6c 61 6e 65 05 6f 78 69 ontrol-plane.oxi\n0030: 64 65 08 69 6e 74 65 72 6e 61 6c 00 00 21 00 01 de.internal..!..\n0040: 00 00 29 04 d0 00 00 00 00 00 00 ..)........
kind = dns
peer_addr = [::1]:15449
req_id = 2b64e19c-877a-4ff9-b0df-6588f58de00c
|
| 857 | 2026-01-27T01:13:51.678Z | DEBG | test_vpcs (dns): message_request
kind = dns
mr = MessageRequest {\n header: Header {\n id: 31581,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n queries: Queries {\n queries: [\n LowerQuery {\n name: LowerName(\n Name("_nameservice._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_nameservice._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n ],\n original: [\n 12,\n 95,\n 110,\n 97,\n 109,\n 101,\n 115,\n 101,\n 114,\n 118,\n 105,\n 99,\n 101,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n flags: EdnsFlags {\n dnssec_ok: false,\n z: 0,\n },\n max_payload: 1232,\n options: OPT {\n options: [],\n },\n },\n ),\n}
peer_addr = [::1]:15449
req_id = 2b64e19c-877a-4ff9-b0df-6588f58de00c
|
| 858 | 2026-01-27T01:13:51.679Z | ERRO | test_vpcs (dns): failed to handle incoming DNS message: MessageRequest {
header: Header {
id: 31581,
message_type: Query,
op_code: Query,
authoritative: false,
truncation: false,
recursion_desired: true,
recursion_available: false,
authentic_data: false,
checking_disabled: false,
response_code: NoError,
query_count: 1,
answer_count: 0,
name_server_count: 0,
additional_count: 1,
},
queries: Queries {
queries: [
LowerQuery {
name: LowerName(
Name("_nameservice._tcp.control-plane.oxide.internal."),
),
original: Query {
name: Name("_nameservice._tcp.control-plane.oxide.internal."),
query_type: SRV,
query_class: IN,
},
},
],
original: [
12,
95,
110,
97,
109,
101,
115,
101,
114,
118,
105,
99,
101,
4,
95,
116,
99,
112,
13,
99,
111,
110,
116,
114,
111,
108,
45,
112,
108,
97,
110,
101,
5,
111,
120,
105,
100,
101,
8,
105,
110,
116,
101,
114,
110,
97,
108,
0,
0,
33,
0,
1,
],
},
answers: [],
name_servers: [],
additionals: [],
sig0: [],
edns: Some(
Edns {
rcode_high: 0,
version: 0,
flags: EdnsFlags {
dnssec_ok: false,
z: 0,
},
max_payload: 1232,
options: OPT {
options: [],
},
},
),
} SERVFAIL: server is not authoritative for name: "_nameservice._tcp.control-plane.oxide.internal."
kind = dns
peer_addr = [::1]:15449
req_id = 2b64e19c-877a-4ff9-b0df-6588f58de00c
|
| 859 | 2026-01-27T01:13:51.679Z | TRAC | test_vpcs (dns): buffer
buffer = Length: 76 (0x4c) bytes\n0000: 08 10 01 00 00 01 00 00 00 00 00 01 0d 5f 65 78 ............._ex\n0010: 74 65 72 6e 61 6c 2d 64 6e 73 04 5f 74 63 70 0d ternal-dns._tcp.\n0020: 63 6f 6e 74 72 6f 6c 2d 70 6c 61 6e 65 05 6f 78 control-plane.ox\n0030: 69 64 65 08 69 6e 74 65 72 6e 61 6c 00 00 21 00 ide.internal..!.\n0040: 01 00 00 29 04 d0 00 00 00 00 00 00 ...)........
kind = dns
peer_addr = [::1]:26564
req_id = 89fe79eb-cdb3-4ce0-8af9-354d759054cf
|
| 860 | 2026-01-27T01:13:51.679Z | DEBG | test_vpcs (dns): message_request
kind = dns
mr = MessageRequest {\n header: Header {\n id: 2064,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n queries: Queries {\n queries: [\n LowerQuery {\n name: LowerName(\n Name("_external-dns._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_external-dns._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n ],\n original: [\n 13,\n 95,\n 101,\n 120,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 45,\n 100,\n 110,\n 115,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n flags: EdnsFlags {\n dnssec_ok: false,\n z: 0,\n },\n max_payload: 1232,\n options: OPT {\n options: [],\n },\n },\n ),\n}
peer_addr = [::1]:26564
req_id = 89fe79eb-cdb3-4ce0-8af9-354d759054cf
|
| 861 | 2026-01-27T01:13:51.680Z | ERRO | test_vpcs (dns): failed to handle incoming DNS message: MessageRequest {
header: Header {
id: 2064,
message_type: Query,
op_code: Query,
authoritative: false,
truncation: false,
recursion_desired: true,
recursion_available: false,
authentic_data: false,
checking_disabled: false,
response_code: NoError,
query_count: 1,
answer_count: 0,
name_server_count: 0,
additional_count: 1,
},
queries: Queries {
queries: [
LowerQuery {
name: LowerName(
Name("_external-dns._tcp.control-plane.oxide.internal."),
),
original: Query {
name: Name("_external-dns._tcp.control-plane.oxide.internal."),
query_type: SRV,
query_class: IN,
},
},
],
original: [
13,
95,
101,
120,
116,
101,
114,
110,
97,
108,
45,
100,
110,
115,
4,
95,
116,
99,
112,
13,
99,
111,
110,
116,
114,
111,
108,
45,
112,
108,
97,
110,
101,
5,
111,
120,
105,
100,
101,
8,
105,
110,
116,
101,
114,
110,
97,
108,
0,
0,
33,
0,
1,
],
},
answers: [],
name_servers: [],
additionals: [],
sig0: [],
edns: Some(
Edns {
rcode_high: 0,
version: 0,
flags: EdnsFlags {
dnssec_ok: false,
z: 0,
},
max_payload: 1232,
options: OPT {
options: [],
},
},
),
} SERVFAIL: server is not authoritative for name: "_external-dns._tcp.control-plane.oxide.internal."
kind = dns
peer_addr = [::1]:26564
req_id = 89fe79eb-cdb3-4ce0-8af9-354d759054cf
|
| 862 | 2026-01-27T01:13:51.684Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = support_bundle_collector
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 863 | 2026-01-27T01:13:51.693Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = support_bundle_collector
resource = Fleet
result = Ok(())
|
| 864 | 2026-01-27T01:13:51.693Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = support_bundle_collector
resource = Database
|
| 865 | 2026-01-27T01:13:51.693Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = support_bundle_collector
roles = RoleSet { roles: {} }
|
| 866 | 2026-01-27T01:13:51.694Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = support_bundle_collector
resource = Database
result = Ok(())
|
| 867 | 2026-01-27T01:13:51.697Z | DEBG | test_vpcs (init_with_steps): Running step start_mgd_switch0
|
| 868 | 2026-01-27T01:13:51.697Z | DEBG | test_vpcs: Starting mgd for switch0
|
| 869 | 2026-01-27T01:13:51.700Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = dns_config_external
dns_group = external
resource = DnsConfig
|
| 870 | 2026-01-27T01:13:51.701Z | TRAC | test_vpcs (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = dns_config_external
dns_group = external
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 871 | 2026-01-27T01:13:51.701Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = dns_config_external
dns_group = external
resource = Database
|
| 872 | 2026-01-27T01:13:51.702Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = dns_config_external
dns_group = external
roles = RoleSet { roles: {} }
|
| 873 | 2026-01-27T01:13:51.703Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = dns_config_external
dns_group = external
resource = Database
result = Ok(())
|
| 874 | 2026-01-27T01:13:51.707Z | WARN | test_vpcs (BackgroundTasks): failed to lookup DNS servers
background_task = dns_servers_internal
dns_group = internal
error = proto error: no records found for Query { name: Name("_nameservice._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN }
|
| 875 | 2026-01-27T01:13:51.708Z | DEBG | test_vpcs (BackgroundTasks): activation complete
background_task = dns_servers_internal
dns_group = internal
elapsed = 317.947881ms
iteration = 1
status = {"error":"failed to read list of DNS servers: proto error: no records found for Query { name: Name(\\"_nameservice._tcp.control-plane.oxide.internal.\\"), query_type: SRV, query_class: IN }"}
|
| 876 | 2026-01-27T01:13:51.708Z | WARN | test_vpcs (BackgroundTasks): failed to lookup DNS servers
background_task = dns_servers_external
dns_group = external
error = proto error: no records found for Query { name: Name("_external-dns._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN }
|
| 877 | 2026-01-27T01:13:51.709Z | DEBG | test_vpcs (BackgroundTasks): activation complete
background_task = dns_servers_external
dns_group = external
elapsed = 315.14723ms
iteration = 1
status = {"error":"failed to read list of DNS servers: proto error: no records found for Query { name: Name(\\"_external-dns._tcp.control-plane.oxide.internal.\\"), query_type: SRV, query_class: IN }"}
|
| 878 | 2026-01-27T01:13:51.709Z | TRAC | test_vpcs (dns): buffer
buffer = Length: 72 (0x48) bytes\n0000: 66 ca 01 00 00 01 00 00 00 00 00 01 09 5f 64 65 f............_de\n0010: 6e 64 72 69 74 65 04 5f 74 63 70 0d 63 6f 6e 74 ndrite._tcp.cont\n0020: 72 6f 6c 2d 70 6c 61 6e 65 05 6f 78 69 64 65 08 rol-plane.oxide.\n0030: 69 6e 74 65 72 6e 61 6c 00 00 21 00 01 00 00 29 internal..!....)\n0040: 04 d0 00 00 00 00 00 00 ........
kind = dns
peer_addr = [::1]:21252
req_id = 1241f2f6-c329-45a5-a344-359b29d7d4ea
|
| 879 | 2026-01-27T01:13:51.709Z | DEBG | test_vpcs (dns): message_request
kind = dns
mr = MessageRequest {\n header: Header {\n id: 26314,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n queries: Queries {\n queries: [\n LowerQuery {\n name: LowerName(\n Name("_dendrite._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_dendrite._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n ],\n original: [\n 9,\n 95,\n 100,\n 101,\n 110,\n 100,\n 114,\n 105,\n 116,\n 101,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n flags: EdnsFlags {\n dnssec_ok: false,\n z: 0,\n },\n max_payload: 1232,\n options: OPT {\n options: [],\n },\n },\n ),\n}
peer_addr = [::1]:21252
req_id = 1241f2f6-c329-45a5-a344-359b29d7d4ea
|
| 880 | 2026-01-27T01:13:51.710Z | ERRO | test_vpcs (dns): failed to handle incoming DNS message: MessageRequest {
header: Header {
id: 26314,
message_type: Query,
op_code: Query,
authoritative: false,
truncation: false,
recursion_desired: true,
recursion_available: false,
authentic_data: false,
checking_disabled: false,
response_code: NoError,
query_count: 1,
answer_count: 0,
name_server_count: 0,
additional_count: 1,
},
queries: Queries {
queries: [
LowerQuery {
name: LowerName(
Name("_dendrite._tcp.control-plane.oxide.internal."),
),
original: Query {
name: Name("_dendrite._tcp.control-plane.oxide.internal."),
query_type: SRV,
query_class: IN,
},
},
],
original: [
9,
95,
100,
101,
110,
100,
114,
105,
116,
101,
4,
95,
116,
99,
112,
13,
99,
111,
110,
116,
114,
111,
108,
45,
112,
108,
97,
110,
101,
5,
111,
120,
105,
100,
101,
8,
105,
110,
116,
101,
114,
110,
97,
108,
0,
0,
33,
0,
1,
],
},
answers: [],
name_servers: [],
additionals: [],
sig0: [],
edns: Some(
Edns {
rcode_high: 0,
version: 0,
flags: EdnsFlags {
dnssec_ok: false,
z: 0,
},
max_payload: 1232,
options: OPT {
options: [],
},
},
),
} SERVFAIL: server is not authoritative for name: "_dendrite._tcp.control-plane.oxide.internal."
kind = dns
peer_addr = [::1]:21252
req_id = 1241f2f6-c329-45a5-a344-359b29d7d4ea
|
| 881 | 2026-01-27T01:13:51.710Z | TRAC | test_vpcs (dns): buffer
buffer = Length: 67 (0x43) bytes\n0000: 5f 94 01 00 00 01 00 00 00 00 00 01 04 5f 6d 67 _............_mg\n0010: 73 04 5f 74 63 70 0d 63 6f 6e 74 72 6f 6c 2d 70 s._tcp.control-p\n0020: 6c 61 6e 65 05 6f 78 69 64 65 08 69 6e 74 65 72 lane.oxide.inter\n0030: 6e 61 6c 00 00 21 00 01 00 00 29 04 d0 00 00 00 nal..!....).....\n0040: 00 00 00 ...
kind = dns
peer_addr = [::1]:50178
req_id = 69900724-6b16-48de-a6be-d14e4ea528f7
|
| 882 | 2026-01-27T01:13:51.710Z | DEBG | test_vpcs (dns): message_request
kind = dns
mr = MessageRequest {\n header: Header {\n id: 24468,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n queries: Queries {\n queries: [\n LowerQuery {\n name: LowerName(\n Name("_mgs._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_mgs._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n ],\n original: [\n 4,\n 95,\n 109,\n 103,\n 115,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n flags: EdnsFlags {\n dnssec_ok: false,\n z: 0,\n },\n max_payload: 1232,\n options: OPT {\n options: [],\n },\n },\n ),\n}
peer_addr = [::1]:50178
req_id = 69900724-6b16-48de-a6be-d14e4ea528f7
|
| 883 | 2026-01-27T01:13:51.711Z | ERRO | test_vpcs (dns): failed to handle incoming DNS message: MessageRequest {
header: Header {
id: 24468,
message_type: Query,
op_code: Query,
authoritative: false,
truncation: false,
recursion_desired: true,
recursion_available: false,
authentic_data: false,
checking_disabled: false,
response_code: NoError,
query_count: 1,
answer_count: 0,
name_server_count: 0,
additional_count: 1,
},
queries: Queries {
queries: [
LowerQuery {
name: LowerName(
Name("_mgs._tcp.control-plane.oxide.internal."),
),
original: Query {
name: Name("_mgs._tcp.control-plane.oxide.internal."),
query_type: SRV,
query_class: IN,
},
},
],
original: [
4,
95,
109,
103,
115,
4,
95,
116,
99,
112,
13,
99,
111,
110,
116,
114,
111,
108,
45,
112,
108,
97,
110,
101,
5,
111,
120,
105,
100,
101,
8,
105,
110,
116,
101,
114,
110,
97,
108,
0,
0,
33,
0,
1,
],
},
answers: [],
name_servers: [],
additionals: [],
sig0: [],
edns: Some(
Edns {
rcode_high: 0,
version: 0,
flags: EdnsFlags {
dnssec_ok: false,
z: 0,
},
max_payload: 1232,
options: OPT {
options: [],
},
},
),
} SERVFAIL: server is not authoritative for name: "_mgs._tcp.control-plane.oxide.internal."
kind = dns
peer_addr = [::1]:50178
req_id = 69900724-6b16-48de-a6be-d14e4ea528f7
|
| 884 | 2026-01-27T01:13:51.720Z | ERRO | test_vpcs (BackgroundTasks): failed to resolve addresses for Dendrite services
background_task = multicast_reconciler
error = proto error: no records found for Query { name: Name("_dendrite._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN }
|
| 885 | 2026-01-27T01:13:51.721Z | ERRO | test_vpcs (BackgroundTasks): failed to build DPD clients
background_task = multicast_reconciler
error = proto error: no records found for Query { name: Name("_dendrite._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN }
|
| 886 | 2026-01-27T01:13:51.721Z | ERRO | test_vpcs (BackgroundTasks): multicast RPW reconciliation pass completed with dataplane inconsistencies
active_groups_verified = 0
background_task = multicast_reconciler
dataplane_error_count = 1
external_groups_created = 0
external_groups_deleted = 0
member_state_transitions = 0
orphaned_members_cleaned = 0
|
| 887 | 2026-01-27T01:13:51.721Z | DEBG | test_vpcs (BackgroundTasks): activation complete
background_task = multicast_reconciler
elapsed = 71.466948ms
iteration = 1
status = {"disabled":false,"empty_groups_marked":0,"errors":["failed to create multicast dataplane client: Internal Error: failed to build DPD clients"],"groups_created":0,"groups_deleted":0,"groups_verified":0,"members_deleted":0,"members_processed":0}
|
| 888 | 2026-01-27T01:13:51.722Z | ERRO | test_vpcs (BackgroundTasks): failed to resolve MGS addresses
background_task = sp_ereport_ingester
error = Resolve(ResolveError { kind: Proto(ProtoError { kind: NoRecordsFound { query: Query { name: Name("_mgs._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN }, soa: None, ns: None, negative_ttl: None, response_code: ServFail, trusted: true, authorities: None } }) })
|
| 889 | 2026-01-27T01:13:51.722Z | DEBG | test_vpcs (BackgroundTasks): activation complete
background_task = sp_ereport_ingester
elapsed = 72.029704ms
iteration = 1
status = {"disabled":false,"errors":["failed to resolve MGS addresses: proto error: no records found for Query { name: Name(\\"_mgs._tcp.control-plane.oxide.internal.\\"), query_type: SRV, query_class: IN }"],"sps":[]}
|
| 890 | 2026-01-27T01:13:51.767Z | TRAC | test_vpcs (DnsResolver): lookup_all_socket_v6 srv
dns_name = _dendrite._tcp.control-plane.oxide.internal
|
| 891 | 2026-01-27T01:13:51.769Z | INFO | test_vpcs (BackgroundTasks): Metric producer GC complete (no errors)
background_task = metrics_producer_gc
expiration = 2026-01-27 01:03:51.394482868 UTC
pruned = {}
|
| 892 | 2026-01-27T01:13:51.769Z | DEBG | test_vpcs (BackgroundTasks): activation complete
background_task = metrics_producer_gc
elapsed = 374.892803ms
iteration = 1
status = {"expiration":"2026-01-27T01:03:51.394482868Z","pruned":[]}
|
| 893 | 2026-01-27T01:13:51.770Z | TRAC | test_vpcs (DnsResolver): lookup_all_ipv6 srv
dns_name = _dendrite._tcp.control-plane.oxide.internal
|
| 894 | 2026-01-27T01:13:51.774Z | DEBG | test_vpcs (BackgroundTasks): activation complete
background_task = phantom_disks
elapsed = 291.426754ms
iteration = 1
status = {"phantom_disk_deleted_err":0,"phantom_disk_deleted_ok":0}
|
| 895 | 2026-01-27T01:13:51.787Z | TRAC | test_vpcs (dns): buffer
buffer = Length: 72 (0x48) bytes\n0000: 8d 58 01 00 00 01 00 00 00 00 00 01 09 5f 64 65 .X..........._de\n0010: 6e 64 72 69 74 65 04 5f 74 63 70 0d 63 6f 6e 74 ndrite._tcp.cont\n0020: 72 6f 6c 2d 70 6c 61 6e 65 05 6f 78 69 64 65 08 rol-plane.oxide.\n0030: 69 6e 74 65 72 6e 61 6c 00 00 21 00 01 00 00 29 internal..!....)\n0040: 04 d0 00 00 00 00 00 00 ........
kind = dns
peer_addr = [::1]:60664
req_id = 2cae67e7-e9b5-4522-b8ff-09d836ad8efc
|
| 896 | 2026-01-27T01:13:51.788Z | DEBG | test_vpcs (dns): message_request
kind = dns
mr = MessageRequest {\n header: Header {\n id: 36184,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n queries: Queries {\n queries: [\n LowerQuery {\n name: LowerName(\n Name("_dendrite._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_dendrite._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n ],\n original: [\n 9,\n 95,\n 100,\n 101,\n 110,\n 100,\n 114,\n 105,\n 116,\n 101,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n flags: EdnsFlags {\n dnssec_ok: false,\n z: 0,\n },\n max_payload: 1232,\n options: OPT {\n options: [],\n },\n },\n ),\n}
peer_addr = [::1]:60664
req_id = 2cae67e7-e9b5-4522-b8ff-09d836ad8efc
|
| 897 | 2026-01-27T01:13:51.793Z | ERRO | test_vpcs (dns): failed to handle incoming DNS message: MessageRequest {
header: Header {
id: 36184,
message_type: Query,
op_code: Query,
authoritative: false,
truncation: false,
recursion_desired: true,
recursion_available: false,
authentic_data: false,
checking_disabled: false,
response_code: NoError,
query_count: 1,
answer_count: 0,
name_server_count: 0,
additional_count: 1,
},
queries: Queries {
queries: [
LowerQuery {
name: LowerName(
Name("_dendrite._tcp.control-plane.oxide.internal."),
),
original: Query {
name: Name("_dendrite._tcp.control-plane.oxide.internal."),
query_type: SRV,
query_class: IN,
},
},
],
original: [
9,
95,
100,
101,
110,
100,
114,
105,
116,
101,
4,
95,
116,
99,
112,
13,
99,
111,
110,
116,
114,
111,
108,
45,
112,
108,
97,
110,
101,
5,
111,
120,
105,
100,
101,
8,
105,
110,
116,
101,
114,
110,
97,
108,
0,
0,
33,
0,
1,
],
},
answers: [],
name_servers: [],
additionals: [],
sig0: [],
edns: Some(
Edns {
rcode_high: 0,
version: 0,
flags: EdnsFlags {
dnssec_ok: false,
z: 0,
},
max_payload: 1232,
options: OPT {
options: [],
},
},
),
} SERVFAIL: server is not authoritative for name: "_dendrite._tcp.control-plane.oxide.internal."
kind = dns
peer_addr = [::1]:60664
req_id = 2cae67e7-e9b5-4522-b8ff-09d836ad8efc
|
| 898 | 2026-01-27T01:13:51.881Z | ERRO | test_vpcs (BackgroundTasks): failed to resolve addresses for Dendrite services
background_task = nat_garbage_collector
error = proto error: no records found for Query { name: Name("_dendrite._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN }
|
| 899 | 2026-01-27T01:13:51.881Z | ERRO | test_vpcs (BackgroundTasks): failed to resolve addresses for Dendrite services
background_task = nat_garbage_collector
error = proto error: no records found for Query { name: Name("_dendrite._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN }
|
| 900 | 2026-01-27T01:13:51.881Z | DEBG | test_vpcs (BackgroundTasks): activation complete
background_task = nat_garbage_collector
elapsed = 401.822001ms
iteration = 1
status = {"error":"failed to resolve addresses for Dendrite services: proto error: no records found for Query { name: Name(\\"_dendrite._tcp.control-plane.oxide.internal.\\"), query_type: SRV, query_class: IN }"}
|
| 901 | 2026-01-27T01:13:51.881Z | TRAC | test_vpcs (dns): buffer
buffer = Length: 72 (0x48) bytes\n0000: 79 e1 01 00 00 01 00 00 00 00 00 01 09 5f 64 65 y............_de\n0010: 6e 64 72 69 74 65 04 5f 74 63 70 0d 63 6f 6e 74 ndrite._tcp.cont\n0020: 72 6f 6c 2d 70 6c 61 6e 65 05 6f 78 69 64 65 08 rol-plane.oxide.\n0030: 69 6e 74 65 72 6e 61 6c 00 00 21 00 01 00 00 29 internal..!....)\n0040: 04 d0 00 00 00 00 00 00 ........
kind = dns
peer_addr = [::1]:46383
req_id = 5bcbd124-1a6a-4705-ae65-c0a4189d8f3f
|
| 902 | 2026-01-27T01:13:51.882Z | DEBG | test_vpcs (dns): message_request
kind = dns
mr = MessageRequest {\n header: Header {\n id: 31201,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n queries: Queries {\n queries: [\n LowerQuery {\n name: LowerName(\n Name("_dendrite._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_dendrite._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n ],\n original: [\n 9,\n 95,\n 100,\n 101,\n 110,\n 100,\n 114,\n 105,\n 116,\n 101,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n flags: EdnsFlags {\n dnssec_ok: false,\n z: 0,\n },\n max_payload: 1232,\n options: OPT {\n options: [],\n },\n },\n ),\n}
peer_addr = [::1]:46383
req_id = 5bcbd124-1a6a-4705-ae65-c0a4189d8f3f
|
| 903 | 2026-01-27T01:13:51.882Z | ERRO | test_vpcs (dns): failed to handle incoming DNS message: MessageRequest {
header: Header {
id: 31201,
message_type: Query,
op_code: Query,
authoritative: false,
truncation: false,
recursion_desired: true,
recursion_available: false,
authentic_data: false,
checking_disabled: false,
response_code: NoError,
query_count: 1,
answer_count: 0,
name_server_count: 0,
additional_count: 1,
},
queries: Queries {
queries: [
LowerQuery {
name: LowerName(
Name("_dendrite._tcp.control-plane.oxide.internal."),
),
original: Query {
name: Name("_dendrite._tcp.control-plane.oxide.internal."),
query_type: SRV,
query_class: IN,
},
},
],
original: [
9,
95,
100,
101,
110,
100,
114,
105,
116,
101,
4,
95,
116,
99,
112,
13,
99,
111,
110,
116,
114,
111,
108,
45,
112,
108,
97,
110,
101,
5,
111,
120,
105,
100,
101,
8,
105,
110,
116,
101,
114,
110,
97,
108,
0,
0,
33,
0,
1,
],
},
answers: [],
name_servers: [],
additionals: [],
sig0: [],
edns: Some(
Edns {
rcode_high: 0,
version: 0,
flags: EdnsFlags {
dnssec_ok: false,
z: 0,
},
max_payload: 1232,
options: OPT {
options: [],
},
},
),
} SERVFAIL: server is not authoritative for name: "_dendrite._tcp.control-plane.oxide.internal."
kind = dns
peer_addr = [::1]:46383
req_id = 5bcbd124-1a6a-4705-ae65-c0a4189d8f3f
|
| 904 | 2026-01-27T01:13:51.883Z | ERRO | test_vpcs (BackgroundTasks): failed to resolve addresses for Dendrite services
background_task = bfd_manager
error = proto error: no records found for Query { name: Name("_dendrite._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN }
|
| 905 | 2026-01-27T01:13:51.883Z | ERRO | test_vpcs (BackgroundTasks): failed to resolve addresses for Dendrite services
background_task = bfd_manager
error = proto error: no records found for Query { name: Name("_dendrite._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN }
|
| 906 | 2026-01-27T01:13:51.883Z | DEBG | test_vpcs (BackgroundTasks): activation complete
background_task = bfd_manager
elapsed = 401.644994ms
iteration = 1
status = {"error":"failed to resolve addresses for Dendrite services: proto error: no records found for Query { name: Name(\\"_dendrite._tcp.control-plane.oxide.internal.\\"), query_type: SRV, query_class: IN }"}
|
| 907 | 2026-01-27T01:13:51.909Z | DEBG | test_vpcs: mgd port is 53789
|
| 908 | 2026-01-27T01:13:51.909Z | DEBG | test_vpcs (init_with_steps): Running step record_switch_dns
|
| 909 | 2026-01-27T01:13:51.909Z | DEBG | test_vpcs: Recording DNS for the switch zones
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
switch_location = switch0
|
| 910 | 2026-01-27T01:13:51.909Z | DEBG | test_vpcs (init_with_steps): Running step start_sled1
|
| 911 | 2026-01-27T01:13:51.910Z | INFO | test_vpcs (omicron_sled_agent::sim::Server): setting up sled agent server
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
| 912 | 2026-01-27T01:13:51.985Z | INFO | test_vpcs (SledAgent): created simulated sled agent
server = b6d65341-167c-41df-9b5c-41cded99c229
sim_mode = Explicit
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
| 913 | 2026-01-27T01:13:51.985Z | INFO | test_vpcs (omicron_sled_agent::sim::SimulatedUpstairs): registered sled b6d65341-167c-41df-9b5c-41cded99c229 storage
|
| 914 | 2026-01-27T01:13:51.987Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = instance_watcher
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 915 | 2026-01-27T01:13:51.996Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = instance_watcher
resource = Fleet
result = Ok(())
|
| 916 | 2026-01-27T01:13:51.996Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = instance_watcher
resource = Database
|
| 917 | 2026-01-27T01:13:51.996Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = instance_watcher
roles = RoleSet { roles: {} }
|
| 918 | 2026-01-27T01:13:51.997Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = instance_watcher
resource = Database
result = Ok(())
|
| 919 | 2026-01-27T01:13:52.011Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
|
| 920 | 2026-01-27T01:13:52.011Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {} }
|
| 921 | 2026-01-27T01:13:52.013Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
result = Ok(())
|
| 922 | 2026-01-27T01:13:52.014Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = external_endpoints
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 923 | 2026-01-27T01:13:52.046Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = external_endpoints
resource = Fleet
result = Ok(())
|
| 924 | 2026-01-27T01:13:52.047Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = external_endpoints
resource = Database
|
| 925 | 2026-01-27T01:13:52.047Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = external_endpoints
roles = RoleSet { roles: {} }
|
| 926 | 2026-01-27T01:13:52.048Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = external_endpoints
resource = Database
result = Ok(())
|
| 927 | 2026-01-27T01:13:52.049Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = blueprint_loader
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 928 | 2026-01-27T01:13:52.074Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = blueprint_loader
resource = BlueprintConfig
result = Ok(())
|
| 929 | 2026-01-27T01:13:52.074Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = blueprint_loader
resource = Database
|
| 930 | 2026-01-27T01:13:52.074Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = blueprint_loader
roles = RoleSet { roles: {} }
|
| 931 | 2026-01-27T01:13:52.075Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = blueprint_loader
resource = Database
result = Ok(())
|
| 932 | 2026-01-27T01:13:52.077Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = reconfigurator_config_watcher
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 933 | 2026-01-27T01:13:52.094Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = reconfigurator_config_watcher
resource = BlueprintConfig
result = Ok(())
|
| 934 | 2026-01-27T01:13:52.094Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = reconfigurator_config_watcher
resource = Database
|
| 935 | 2026-01-27T01:13:52.094Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = reconfigurator_config_watcher
roles = RoleSet { roles: {} }
|
| 936 | 2026-01-27T01:13:52.095Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = reconfigurator_config_watcher
resource = Database
result = Ok(())
|
| 937 | 2026-01-27T01:13:52.098Z | INFO | test_vpcs (ArtifactStore): No ledger in /var/tmp/omicron_tmp/.tmpRZLK7V/artifact-config.json
server = b6d65341-167c-41df-9b5c-41cded99c229
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
| 938 | 2026-01-27T01:13:52.098Z | DEBG | test_vpcs (ArtifactStore): Failed to read ledger: Not found in storage
path = /var/tmp/omicron_tmp/.tmpRZLK7V/artifact-config.json
server = b6d65341-167c-41df-9b5c-41cded99c229
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
| 939 | 2026-01-27T01:13:52.098Z | INFO | test_vpcs (ArtifactStore): No ledger in /var/tmp/omicron_tmp/.tmpNYh8YN/artifact-config.json
server = b6d65341-167c-41df-9b5c-41cded99c229
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
| 940 | 2026-01-27T01:13:52.098Z | DEBG | test_vpcs (ArtifactStore): Failed to read ledger: Not found in storage
path = /var/tmp/omicron_tmp/.tmpNYh8YN/artifact-config.json
server = b6d65341-167c-41df-9b5c-41cded99c229
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
| 941 | 2026-01-27T01:13:52.263Z | DEBG | test_vpcs (dropshot (Repo Depot)): registered endpoint
local_addr = [::1]:50229
method = GET
path = /artifact/sha256/{sha256}
server = b6d65341-167c-41df-9b5c-41cded99c229
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
| 942 | 2026-01-27T01:13:52.263Z | INFO | test_vpcs (dropshot (Repo Depot)): listening
local_addr = [::1]:50229
server = b6d65341-167c-41df-9b5c-41cded99c229
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
| 943 | 2026-01-27T01:13:52.268Z | DEBG | test_vpcs (dropshot (Repo Depot)): successfully registered DTrace USDT probes
local_addr = [::1]:50229
server = b6d65341-167c-41df-9b5c-41cded99c229
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
| 944 | 2026-01-27T01:13:52.278Z | DEBG | test_vpcs (dropshot): registered endpoint
local_addr = [::1]:59842
method = GET
path = /artifacts
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
| 945 | 2026-01-27T01:13:52.278Z | DEBG | test_vpcs (dropshot): registered endpoint
local_addr = [::1]:59842
method = PUT
path = /artifacts/{sha256}
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
| 946 | 2026-01-27T01:13:52.279Z | DEBG | test_vpcs (dropshot): registered endpoint
local_addr = [::1]:59842
method = POST
path = /artifacts/{sha256}/copy-from-depot
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
| 947 | 2026-01-27T01:13:52.279Z | DEBG | test_vpcs (dropshot): registered endpoint
local_addr = [::1]:59842
method = GET
path = /artifacts-config
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
| 948 | 2026-01-27T01:13:52.279Z | DEBG | test_vpcs (dropshot): registered endpoint
local_addr = [::1]:59842
method = PUT
path = /artifacts-config
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
| 949 | 2026-01-27T01:13:52.279Z | DEBG | test_vpcs (dropshot): registered endpoint
local_addr = [::1]:59842
method = GET
path = /bootstore/status
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
| 950 | 2026-01-27T01:13:52.279Z | DEBG | test_vpcs (dropshot): registered endpoint
local_addr = [::1]:59842
method = GET
path = /chicken-switch/destroy-orphaned-datasets
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all ending with 2.0.0
|
| 951 | 2026-01-27T01:13:52.279Z | DEBG | test_vpcs (dropshot): registered endpoint
local_addr = [::1]:59842
method = PUT
path = /chicken-switch/destroy-orphaned-datasets
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all ending with 3.0.0
|
| 952 | 2026-01-27T01:13:52.279Z | DEBG | test_vpcs (dropshot): registered endpoint
local_addr = [::1]:59842
method = GET
path = /debug/switch-zone-policy
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all starting from 3.0.0
|
| 953 | 2026-01-27T01:13:52.280Z | DEBG | test_vpcs (dropshot): registered endpoint
local_addr = [::1]:59842
method = PUT
path = /debug/switch-zone-policy
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all starting from 3.0.0
|
| 954 | 2026-01-27T01:13:52.280Z | DEBG | test_vpcs (dropshot): registered endpoint
local_addr = [::1]:59842
method = PUT
path = /disks/{disk_id}
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
| 955 | 2026-01-27T01:13:52.280Z | DEBG | test_vpcs (dropshot): registered endpoint
local_addr = [::1]:59842
method = POST
path = /disks/{disk_id}/poke
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
| 956 | 2026-01-27T01:13:52.280Z | DEBG | test_vpcs (dropshot): registered endpoint
local_addr = [::1]:59842
method = PUT
path = /eip-gateways
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
| 957 | 2026-01-27T01:13:52.280Z | DEBG | test_vpcs (dropshot): registered endpoint
local_addr = [::1]:59842
method = GET
path = /inventory
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all starting from 14.0.0
|
| 958 | 2026-01-27T01:13:52.280Z | DEBG | test_vpcs (dropshot): registered endpoint
local_addr = [::1]:59842
method = GET
path = /inventory
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = from 12.0.0 to 14.0.0
|
| 959 | 2026-01-27T01:13:52.280Z | DEBG | test_vpcs (dropshot): registered endpoint
local_addr = [::1]:59842
method = GET
path = /inventory
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = from 11.0.0 to 12.0.0
|
| 960 | 2026-01-27T01:13:52.280Z | DEBG | test_vpcs (dropshot): registered endpoint
local_addr = [::1]:59842
method = GET
path = /inventory
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = from 10.0.0 to 11.0.0
|
| 961 | 2026-01-27T01:13:52.280Z | DEBG | test_vpcs (dropshot): registered endpoint
local_addr = [::1]:59842
method = GET
path = /inventory
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = from 4.0.0 to 10.0.0
|
| 962 | 2026-01-27T01:13:52.280Z | DEBG | test_vpcs (dropshot): registered endpoint
local_addr = [::1]:59842
method = GET
path = /inventory
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all ending with 4.0.0
|
| 963 | 2026-01-27T01:13:52.281Z | DEBG | test_vpcs (dropshot): registered endpoint
local_addr = [::1]:59842
method = DELETE
path = /local-storage/{zpool_id}/{dataset_id}
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all starting from 9.0.0
|
| 964 | 2026-01-27T01:13:52.281Z | DEBG | test_vpcs (dropshot): registered endpoint
local_addr = [::1]:59842
method = POST
path = /local-storage/{zpool_id}/{dataset_id}
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all starting from 9.0.0
|
| 965 | 2026-01-27T01:13:52.281Z | DEBG | test_vpcs (dropshot): registered endpoint
local_addr = [::1]:59842
method = GET
path = /network-bootstore-config
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
| 966 | 2026-01-27T01:13:52.281Z | DEBG | test_vpcs (dropshot): registered endpoint
local_addr = [::1]:59842
method = PUT
path = /network-bootstore-config
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
| 967 | 2026-01-27T01:13:52.281Z | DEBG | test_vpcs (dropshot): registered endpoint
local_addr = [::1]:59842
method = PUT
path = /omicron-config
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all starting from 14.0.0
|
| 968 | 2026-01-27T01:13:52.281Z | DEBG | test_vpcs (dropshot): registered endpoint
local_addr = [::1]:59842
method = PUT
path = /omicron-config
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = from 11.0.0 to 14.0.0
|
| 969 | 2026-01-27T01:13:52.281Z | DEBG | test_vpcs (dropshot): registered endpoint
local_addr = [::1]:59842
method = PUT
path = /omicron-config
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = from 10.0.0 to 11.0.0
|
| 970 | 2026-01-27T01:13:52.282Z | DEBG | test_vpcs (dropshot): registered endpoint
local_addr = [::1]:59842
method = PUT
path = /omicron-config
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = from 4.0.0 to 10.0.0
|
| 971 | 2026-01-27T01:13:52.282Z | DEBG | test_vpcs (dropshot): registered endpoint
local_addr = [::1]:59842
method = PUT
path = /omicron-config
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all ending with 4.0.0
|
| 972 | 2026-01-27T01:13:52.282Z | DEBG | test_vpcs (dropshot): registered endpoint
local_addr = [::1]:59842
method = PUT
path = /probes
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all starting from 10.0.0
|
| 973 | 2026-01-27T01:13:52.282Z | DEBG | test_vpcs (dropshot): registered endpoint
local_addr = [::1]:59842
method = PUT
path = /probes
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = from 6.0.0 to 10.0.0
|
| 974 | 2026-01-27T01:13:52.282Z | DEBG | test_vpcs (dropshot): registered endpoint
local_addr = [::1]:59842
method = GET
path = /sled-identifiers
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
| 975 | 2026-01-27T01:13:52.282Z | DEBG | test_vpcs (dropshot): registered endpoint
local_addr = [::1]:59842
method = GET
path = /sled-role
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all ending with 8.0.0
|
| 976 | 2026-01-27T01:13:52.282Z | DEBG | test_vpcs (dropshot): registered endpoint
local_addr = [::1]:59842
method = PUT
path = /sleds
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
| 977 | 2026-01-27T01:13:52.282Z | DEBG | test_vpcs (dropshot): registered endpoint
local_addr = [::1]:59842
method = GET
path = /support/dladm-info
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
| 978 | 2026-01-27T01:13:52.282Z | DEBG | test_vpcs (dropshot): registered endpoint
local_addr = [::1]:59842
method = GET
path = /support/health-check
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
| 979 | 2026-01-27T01:13:52.282Z | DEBG | test_vpcs (dropshot): registered endpoint
local_addr = [::1]:59842
method = GET
path = /support/ipadm-info
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
| 980 | 2026-01-27T01:13:52.283Z | DEBG | test_vpcs (dropshot): registered endpoint
local_addr = [::1]:59842
method = GET
path = /support/logs/download/{zone}
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
| 981 | 2026-01-27T01:13:52.283Z | DEBG | test_vpcs (dropshot): registered endpoint
local_addr = [::1]:59842
method = GET
path = /support/logs/zones
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
| 982 | 2026-01-27T01:13:52.283Z | DEBG | test_vpcs (dropshot): registered endpoint
local_addr = [::1]:59842
method = GET
path = /support/nvmeadm-info
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
| 983 | 2026-01-27T01:13:52.283Z | DEBG | test_vpcs (dropshot): registered endpoint
local_addr = [::1]:59842
method = GET
path = /support/pargs-info
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
| 984 | 2026-01-27T01:13:52.283Z | DEBG | test_vpcs (dropshot): registered endpoint
local_addr = [::1]:59842
method = GET
path = /support/pfiles-info
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
| 985 | 2026-01-27T01:13:52.283Z | DEBG | test_vpcs (dropshot): registered endpoint
local_addr = [::1]:59842
method = GET
path = /support/pstack-info
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
| 986 | 2026-01-27T01:13:52.283Z | DEBG | test_vpcs (dropshot): registered endpoint
local_addr = [::1]:59842
method = GET
path = /support/zfs-info
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
| 987 | 2026-01-27T01:13:52.283Z | DEBG | test_vpcs (dropshot): registered endpoint
local_addr = [::1]:59842
method = GET
path = /support/zoneadm-info
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
| 988 | 2026-01-27T01:13:52.283Z | DEBG | test_vpcs (dropshot): registered endpoint
local_addr = [::1]:59842
method = GET
path = /support/zpool-info
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
| 989 | 2026-01-27T01:13:52.283Z | DEBG | test_vpcs (dropshot): registered endpoint
local_addr = [::1]:59842
method = GET
path = /support-bundles/{zpool_id}/{dataset_id}
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
| 990 | 2026-01-27T01:13:52.284Z | DEBG | test_vpcs (dropshot): registered endpoint
local_addr = [::1]:59842
method = DELETE
path = /support-bundles/{zpool_id}/{dataset_id}/{support_bundle_id}
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
| 991 | 2026-01-27T01:13:52.284Z | DEBG | test_vpcs (dropshot): registered endpoint
local_addr = [::1]:59842
method = POST
path = /support-bundles/{zpool_id}/{dataset_id}/{support_bundle_id}
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
| 992 | 2026-01-27T01:13:52.284Z | DEBG | test_vpcs (dropshot): registered endpoint
local_addr = [::1]:59842
method = GET
path = /support-bundles/{zpool_id}/{dataset_id}/{support_bundle_id}/download
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
| 993 | 2026-01-27T01:13:52.284Z | DEBG | test_vpcs (dropshot): registered endpoint
local_addr = [::1]:59842
method = HEAD
path = /support-bundles/{zpool_id}/{dataset_id}/{support_bundle_id}/download
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
| 994 | 2026-01-27T01:13:52.284Z | DEBG | test_vpcs (dropshot): registered endpoint
local_addr = [::1]:59842
method = GET
path = /support-bundles/{zpool_id}/{dataset_id}/{support_bundle_id}/download/{file}
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
| 995 | 2026-01-27T01:13:52.284Z | DEBG | test_vpcs (dropshot): registered endpoint
local_addr = [::1]:59842
method = HEAD
path = /support-bundles/{zpool_id}/{dataset_id}/{support_bundle_id}/download/{file}
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
| 996 | 2026-01-27T01:13:52.284Z | DEBG | test_vpcs (dropshot): registered endpoint
local_addr = [::1]:59842
method = POST
path = /support-bundles/{zpool_id}/{dataset_id}/{support_bundle_id}/finalize
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
| 997 | 2026-01-27T01:13:52.284Z | DEBG | test_vpcs (dropshot): registered endpoint
local_addr = [::1]:59842
method = GET
path = /support-bundles/{zpool_id}/{dataset_id}/{support_bundle_id}/index
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
| 998 | 2026-01-27T01:13:52.284Z | DEBG | test_vpcs (dropshot): registered endpoint
local_addr = [::1]:59842
method = HEAD
path = /support-bundles/{zpool_id}/{dataset_id}/{support_bundle_id}/index
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
| 999 | 2026-01-27T01:13:52.284Z | DEBG | test_vpcs (dropshot): registered endpoint
local_addr = [::1]:59842
method = PUT
path = /support-bundles/{zpool_id}/{dataset_id}/{support_bundle_id}/transfer
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
| 1000 | 2026-01-27T01:13:52.284Z | DEBG | test_vpcs (dropshot): registered endpoint
local_addr = [::1]:59842
method = POST
path = /switch-ports
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
| 1001 | 2026-01-27T01:13:52.284Z | DEBG | test_vpcs (dropshot): registered endpoint
local_addr = [::1]:59842
method = PUT
path = /trust-quorum/commit
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all starting from 13.0.0
|
| 1002 | 2026-01-27T01:13:52.285Z | DEBG | test_vpcs (dropshot): registered endpoint
local_addr = [::1]:59842
method = POST
path = /trust-quorum/configuration
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all starting from 13.0.0
|
| 1003 | 2026-01-27T01:13:52.285Z | DEBG | test_vpcs (dropshot): registered endpoint
local_addr = [::1]:59842
method = GET
path = /trust-quorum/coordinator-status
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all starting from 13.0.0
|
| 1004 | 2026-01-27T01:13:52.285Z | DEBG | test_vpcs (dropshot): registered endpoint
local_addr = [::1]:59842
method = GET
path = /trust-quorum/network-config
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all starting from 15.0.0
|
| 1005 | 2026-01-27T01:13:52.285Z | DEBG | test_vpcs (dropshot): registered endpoint
local_addr = [::1]:59842
method = PUT
path = /trust-quorum/network-config
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all starting from 15.0.0
|
| 1006 | 2026-01-27T01:13:52.285Z | DEBG | test_vpcs (dropshot): registered endpoint
local_addr = [::1]:59842
method = PUT
path = /trust-quorum/prepare-and-commit
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all starting from 13.0.0
|
| 1007 | 2026-01-27T01:13:52.285Z | DEBG | test_vpcs (dropshot): registered endpoint
local_addr = [::1]:59842
method = PUT
path = /trust-quorum/proxy/commit
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all starting from 13.0.0
|
| 1008 | 2026-01-27T01:13:52.285Z | DEBG | test_vpcs (dropshot): registered endpoint
local_addr = [::1]:59842
method = PUT
path = /trust-quorum/proxy/prepare-and-commit
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all starting from 13.0.0
|
| 1009 | 2026-01-27T01:13:52.285Z | DEBG | test_vpcs (dropshot): registered endpoint
local_addr = [::1]:59842
method = GET
path = /trust-quorum/proxy/status
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all starting from 13.0.0
|
| 1010 | 2026-01-27T01:13:52.285Z | DEBG | test_vpcs (dropshot): registered endpoint
local_addr = [::1]:59842
method = GET
path = /trust-quorum/status
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all starting from 15.0.0
|
| 1011 | 2026-01-27T01:13:52.285Z | DEBG | test_vpcs (dropshot): registered endpoint
local_addr = [::1]:59842
method = POST
path = /trust-quorum/upgrade
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all starting from 13.0.0
|
| 1012 | 2026-01-27T01:13:52.285Z | DEBG | test_vpcs (dropshot): registered endpoint
local_addr = [::1]:59842
method = DELETE
path = /v2p
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
| 1013 | 2026-01-27T01:13:52.286Z | DEBG | test_vpcs (dropshot): registered endpoint
local_addr = [::1]:59842
method = GET
path = /v2p
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
| 1014 | 2026-01-27T01:13:52.286Z | DEBG | test_vpcs (dropshot): registered endpoint
local_addr = [::1]:59842
method = PUT
path = /v2p
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
| 1015 | 2026-01-27T01:13:52.286Z | DEBG | test_vpcs (dropshot): registered endpoint
local_addr = [::1]:59842
method = DELETE
path = /vmms/{propolis_id}
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
| 1016 | 2026-01-27T01:13:52.286Z | DEBG | test_vpcs (dropshot): registered endpoint
local_addr = [::1]:59842
method = PUT
path = /vmms/{propolis_id}
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all starting from 11.0.0
|
| 1017 | 2026-01-27T01:13:52.286Z | DEBG | test_vpcs (dropshot): registered endpoint
local_addr = [::1]:59842
method = PUT
path = /vmms/{propolis_id}
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = from 10.0.0 to 11.0.0
|
| 1018 | 2026-01-27T01:13:52.286Z | DEBG | test_vpcs (dropshot): registered endpoint
local_addr = [::1]:59842
method = PUT
path = /vmms/{propolis_id}
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = from 9.0.0 to 10.0.0
|
| 1019 | 2026-01-27T01:13:52.286Z | DEBG | test_vpcs (dropshot): registered endpoint
local_addr = [::1]:59842
method = PUT
path = /vmms/{propolis_id}
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = from 7.0.0 to 9.0.0
|
| 1020 | 2026-01-27T01:13:52.286Z | DEBG | test_vpcs (dropshot): registered endpoint
local_addr = [::1]:59842
method = PUT
path = /vmms/{propolis_id}
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all ending with 7.0.0
|
| 1021 | 2026-01-27T01:13:52.286Z | DEBG | test_vpcs (dropshot): registered endpoint
local_addr = [::1]:59842
method = POST
path = /vmms/{propolis_id}/disks/{disk_id}/snapshot
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
| 1022 | 2026-01-27T01:13:52.286Z | DEBG | test_vpcs (dropshot): registered endpoint
local_addr = [::1]:59842
method = DELETE
path = /vmms/{propolis_id}/external-ip
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
| 1023 | 2026-01-27T01:13:52.286Z | DEBG | test_vpcs (dropshot): registered endpoint
local_addr = [::1]:59842
method = PUT
path = /vmms/{propolis_id}/external-ip
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
| 1024 | 2026-01-27T01:13:52.287Z | DEBG | test_vpcs (dropshot): registered endpoint
local_addr = [::1]:59842
method = DELETE
path = /vmms/{propolis_id}/multicast-group
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all starting from 7.0.0
|
| 1025 | 2026-01-27T01:13:52.287Z | DEBG | test_vpcs (dropshot): registered endpoint
local_addr = [::1]:59842
method = PUT
path = /vmms/{propolis_id}/multicast-group
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all starting from 7.0.0
|
| 1026 | 2026-01-27T01:13:52.287Z | DEBG | test_vpcs (dropshot): registered endpoint
local_addr = [::1]:59842
method = POST
path = /vmms/{propolis_id}/poke
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
| 1027 | 2026-01-27T01:13:52.287Z | DEBG | test_vpcs (dropshot): registered endpoint
local_addr = [::1]:59842
method = POST
path = /vmms/{propolis_id}/poke-single-step
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
| 1028 | 2026-01-27T01:13:52.287Z | DEBG | test_vpcs (dropshot): registered endpoint
local_addr = [::1]:59842
method = POST
path = /vmms/{propolis_id}/sim-migration-source
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
| 1029 | 2026-01-27T01:13:52.287Z | DEBG | test_vpcs (dropshot): registered endpoint
local_addr = [::1]:59842
method = GET
path = /vmms/{propolis_id}/state
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
| 1030 | 2026-01-27T01:13:52.287Z | DEBG | test_vpcs (dropshot): registered endpoint
local_addr = [::1]:59842
method = PUT
path = /vmms/{propolis_id}/state
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
| 1031 | 2026-01-27T01:13:52.287Z | DEBG | test_vpcs (dropshot): registered endpoint
local_addr = [::1]:59842
method = PUT
path = /vpc/{vpc_id}/firewall/rules
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all starting from 10.0.0
|
| 1032 | 2026-01-27T01:13:52.287Z | DEBG | test_vpcs (dropshot): registered endpoint
local_addr = [::1]:59842
method = PUT
path = /vpc/{vpc_id}/firewall/rules
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all ending with 10.0.0
|
| 1033 | 2026-01-27T01:13:52.287Z | DEBG | test_vpcs (dropshot): registered endpoint
local_addr = [::1]:59842
method = GET
path = /vpc-routes
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
| 1034 | 2026-01-27T01:13:52.288Z | DEBG | test_vpcs (dropshot): registered endpoint
local_addr = [::1]:59842
method = PUT
path = /vpc-routes
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
| 1035 | 2026-01-27T01:13:52.288Z | DEBG | test_vpcs (dropshot): registered endpoint
local_addr = [::1]:59842
method = GET
path = /zones
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
| 1036 | 2026-01-27T01:13:52.288Z | DEBG | test_vpcs (dropshot): registered endpoint
local_addr = [::1]:59842
method = POST
path = /zones/bundle-cleanup
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
| 1037 | 2026-01-27T01:13:52.288Z | DEBG | test_vpcs (dropshot): registered endpoint
local_addr = [::1]:59842
method = GET
path = /zones/bundle-cleanup/context
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
| 1038 | 2026-01-27T01:13:52.288Z | DEBG | test_vpcs (dropshot): registered endpoint
local_addr = [::1]:59842
method = PUT
path = /zones/bundle-cleanup/context
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
| 1039 | 2026-01-27T01:13:52.288Z | DEBG | test_vpcs (dropshot): registered endpoint
local_addr = [::1]:59842
method = GET
path = /zones/bundle-cleanup/utilization
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
| 1040 | 2026-01-27T01:13:52.288Z | DEBG | test_vpcs (dropshot): registered endpoint
local_addr = [::1]:59842
method = GET
path = /zones/bundles
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
| 1041 | 2026-01-27T01:13:52.288Z | DEBG | test_vpcs (dropshot): registered endpoint
local_addr = [::1]:59842
method = GET
path = /zones/bundles/{zone_name}
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
| 1042 | 2026-01-27T01:13:52.288Z | DEBG | test_vpcs (dropshot): registered endpoint
local_addr = [::1]:59842
method = DELETE
path = /zones/bundles/{zone_name}/{bundle_id}
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
| 1043 | 2026-01-27T01:13:52.288Z | DEBG | test_vpcs (dropshot): registered endpoint
local_addr = [::1]:59842
method = GET
path = /zones/bundles/{zone_name}/{bundle_id}
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
| 1044 | 2026-01-27T01:13:52.289Z | INFO | test_vpcs (dropshot): listening
local_addr = [::1]:59842
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
| 1045 | 2026-01-27T01:13:52.291Z | DEBG | test_vpcs (dropshot): successfully registered DTrace USDT probes
local_addr = [::1]:59842
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
| 1046 | 2026-01-27T01:13:52.291Z | INFO | test_vpcs (dropshot_internal): accepted connection
local_addr = 127.0.0.1:46983
remote_addr = 127.0.0.1:63662
|
| 1047 | 2026-01-27T01:13:52.293Z | DEBG | test_vpcs (omicron_sled_agent::sim::Server): contacting server nexus
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
| 1048 | 2026-01-27T01:13:52.293Z | DEBG | test_vpcs (NexusClient): client request
body = Some(Body)
method = POST
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
uri = http://127.0.0.1:46983/sled-agents/b6d65341-167c-41df-9b5c-41cded99c229
|
| 1049 | 2026-01-27T01:13:52.297Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = region_replacement_driver
resource = Database
|
| 1050 | 2026-01-27T01:13:52.297Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = region_replacement_driver
roles = RoleSet { roles: {} }
|
| 1051 | 2026-01-27T01:13:52.298Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = region_replacement_driver
resource = Database
result = Ok(())
|
| 1052 | 2026-01-27T01:13:52.301Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = inventory_collection
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 1053 | 2026-01-27T01:13:52.307Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Modify
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = inventory_collection
resource = Inventory
result = Ok(())
|
| 1054 | 2026-01-27T01:13:52.307Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = inventory_collection
resource = Database
|
| 1055 | 2026-01-27T01:13:52.308Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = inventory_collection
roles = RoleSet { roles: {} }
|
| 1056 | 2026-01-27T01:13:52.309Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = inventory_collection
resource = Database
result = Ok(())
|
| 1057 | 2026-01-27T01:13:52.311Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = vpc_route_manager
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 1058 | 2026-01-27T01:13:52.327Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = vpc_route_manager
resource = Fleet
result = Ok(())
|
| 1059 | 2026-01-27T01:13:52.327Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = vpc_route_manager
resource = Fleet
|
| 1060 | 2026-01-27T01:13:52.327Z | TRAC | test_vpcs (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = vpc_route_manager
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 1061 | 2026-01-27T01:13:52.327Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = vpc_route_manager
resource = Database
|
| 1062 | 2026-01-27T01:13:52.327Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = vpc_route_manager
roles = RoleSet { roles: {} }
|
| 1063 | 2026-01-27T01:13:52.328Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = vpc_route_manager
resource = Database
result = Ok(())
|
| 1064 | 2026-01-27T01:13:52.331Z | INFO | test_vpcs (dropshot_internal): accepted connection
local_addr = 127.0.0.1:46983
remote_addr = 127.0.0.1:36890
|
| 1065 | 2026-01-27T01:13:52.332Z | TRAC | test_vpcs (dropshot_internal): incoming request
local_addr = 127.0.0.1:46983
method = GET
remote_addr = 127.0.0.1:63662
req_id = e3db9b9f-f198-46ef-93ee-3a99b412fcc8
uri = /nat/ipv4/changeset/0?limit=100
|
| 1066 | 2026-01-27T01:13:52.332Z | DEBG | test_vpcs (dropshot_internal): determined request API version
local_addr = 127.0.0.1:46983
method = GET
remote_addr = 127.0.0.1:63662
req_id = e3db9b9f-f198-46ef-93ee-3a99b412fcc8
uri = /nat/ipv4/changeset/0?limit=100
version = 1.0.0
|
| 1067 | 2026-01-27T01:13:52.334Z | TRAC | test_vpcs (dropshot_internal): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
authenticated = true
local_addr = 127.0.0.1:46983
method = GET
remote_addr = 127.0.0.1:63662
req_id = e3db9b9f-f198-46ef-93ee-3a99b412fcc8
resource = Database
type = user_builtin
uri = /nat/ipv4/changeset/0?limit=100
user_builtin_id = 001de000-05e4-4000-8000-000000000002
|
| 1068 | 2026-01-27T01:13:52.334Z | DEBG | test_vpcs (dropshot_internal): roles
authenticated = true
local_addr = 127.0.0.1:46983
method = GET
remote_addr = 127.0.0.1:63662
req_id = e3db9b9f-f198-46ef-93ee-3a99b412fcc8
roles = RoleSet { roles: {} }
type = user_builtin
uri = /nat/ipv4/changeset/0?limit=100
user_builtin_id = 001de000-05e4-4000-8000-000000000002
|
| 1069 | 2026-01-27T01:13:52.335Z | DEBG | test_vpcs (dropshot_internal): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
authenticated = true
local_addr = 127.0.0.1:46983
method = GET
remote_addr = 127.0.0.1:63662
req_id = e3db9b9f-f198-46ef-93ee-3a99b412fcc8
resource = Database
result = Ok(())
type = user_builtin
uri = /nat/ipv4/changeset/0?limit=100
user_builtin_id = 001de000-05e4-4000-8000-000000000002
|
| 1070 | 2026-01-27T01:13:52.412Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = switch_port_config_manager
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 1071 | 2026-01-27T01:13:52.418Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = switch_port_config_manager
resource = Fleet
result = Ok(())
|
| 1072 | 2026-01-27T01:13:52.418Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = switch_port_config_manager
resource = Database
|
| 1073 | 2026-01-27T01:13:52.418Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = switch_port_config_manager
roles = RoleSet { roles: {} }
|
| 1074 | 2026-01-27T01:13:52.418Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = switch_port_config_manager
resource = Database
result = Ok(())
|
| 1075 | 2026-01-27T01:13:52.420Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = inventory_loader
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 1076 | 2026-01-27T01:13:52.426Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = inventory_loader
resource = Inventory
result = Ok(())
|
| 1077 | 2026-01-27T01:13:52.427Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = inventory_loader
resource = Database
|
| 1078 | 2026-01-27T01:13:52.427Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = inventory_loader
roles = RoleSet { roles: {} }
|
| 1079 | 2026-01-27T01:13:52.427Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = inventory_loader
resource = Database
result = Ok(())
|
| 1080 | 2026-01-27T01:13:52.430Z | DEBG | test_vpcs (BackgroundTasks): Found abandoned VMMs
background_task = abandoned_vmm_reaper
count = 0
total = 0
|
| 1081 | 2026-01-27T01:13:52.430Z | INFO | test_vpcs (BackgroundTasks): Abandoned VMMs reaped
background_task = abandoned_vmm_reaper
sled_reservations_deleted = 0
vmms_already_deleted = 0
vmms_deleted = 0
vmms_found = 0
|
| 1082 | 2026-01-27T01:13:52.430Z | DEBG | test_vpcs (BackgroundTasks): activation complete
background_task = abandoned_vmm_reaper
elapsed = 813.844662ms
iteration = 1
status = {"errors":[],"sled_reservations_deleted":0,"vmms_already_deleted":0,"vmms_deleted":0,"vmms_found":0}
|
| 1083 | 2026-01-27T01:13:52.431Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = region_replacement
resource = Database
|
| 1084 | 2026-01-27T01:13:52.431Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = region_replacement
roles = RoleSet { roles: {} }
|
| 1085 | 2026-01-27T01:13:52.431Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = region_replacement
resource = Database
result = Ok(())
|
| 1086 | 2026-01-27T01:13:52.433Z | TRAC | test_vpcs (dropshot_internal): incoming request
local_addr = 127.0.0.1:46983
method = POST
remote_addr = 127.0.0.1:36890
req_id = 6ecdb88c-8de5-4bb4-bf39-561995c8df28
uri = /sled-agents/b6d65341-167c-41df-9b5c-41cded99c229
|
| 1087 | 2026-01-27T01:13:52.433Z | DEBG | test_vpcs (dropshot_internal): determined request API version
local_addr = 127.0.0.1:46983
method = POST
remote_addr = 127.0.0.1:36890
req_id = 6ecdb88c-8de5-4bb4-bf39-561995c8df28
uri = /sled-agents/b6d65341-167c-41df-9b5c-41cded99c229
version = 1.0.0
|
| 1088 | 2026-01-27T01:13:52.435Z | INFO | test_vpcs (nexus): registered sled agent
sled_uuid = b6d65341-167c-41df-9b5c-41cded99c229
|
| 1089 | 2026-01-27T01:13:52.438Z | TRAC | test_vpcs (BackgroundTasks): no more instances in need of reincarnation
background_task = instance_reincarnation
reincarnation_reason = instance failed
total_found = 0
|
| 1090 | 2026-01-27T01:13:52.438Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = instance_reincarnation
resource = Database
|
| 1091 | 2026-01-27T01:13:52.438Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = instance_reincarnation
roles = RoleSet { roles: {} }
|
| 1092 | 2026-01-27T01:13:52.438Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = instance_reincarnation
resource = Database
result = Ok(())
|
| 1093 | 2026-01-27T01:13:52.439Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = v2p_manager
resource = Database
|
| 1094 | 2026-01-27T01:13:52.439Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = v2p_manager
roles = RoleSet { roles: {} }
|
| 1095 | 2026-01-27T01:13:52.440Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = v2p_manager
resource = Database
result = Ok(())
|
| 1096 | 2026-01-27T01:13:52.441Z | INFO | test_vpcs (SagaRecoverer): listed in-progress sagas
count = 0
|
| 1097 | 2026-01-27T01:13:52.441Z | INFO | test_vpcs (SagaQuiesceHandle): saga recovery pass finished
blueprint_id = None
generation = 1
|
| 1098 | 2026-01-27T01:13:52.442Z | DEBG | test_vpcs (BackgroundTasks): activation complete
background_task = saga_recovery
elapsed = 823.602951ms
iteration = 1
status = {"last_pass":{"Success":{"nfailed":0,"nfound":0,"nrecovered":0,"nremoved":0,"nskipped":0}},"ntotal_failures":0,"ntotal_finished":0,"ntotal_recovered":0,"ntotal_sec_errors_bad_state":0,"ntotal_sec_errors_missing":0,"ntotal_started":0,"recent_failures":[],"recent_recoveries":[]}
|
| 1099 | 2026-01-27T01:13:52.451Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = tuf_artifact_replication
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 1100 | 2026-01-27T01:13:52.461Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = tuf_artifact_replication
resource = Fleet
result = Ok(())
|
| 1101 | 2026-01-27T01:13:52.461Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = tuf_artifact_replication
resource = Fleet
|
| 1102 | 2026-01-27T01:13:52.461Z | TRAC | test_vpcs (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = tuf_artifact_replication
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 1103 | 2026-01-27T01:13:52.461Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = tuf_artifact_replication
resource = Database
|
| 1104 | 2026-01-27T01:13:52.461Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = tuf_artifact_replication
roles = RoleSet { roles: {} }
|
| 1105 | 2026-01-27T01:13:52.461Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = tuf_artifact_replication
resource = Database
result = Ok(())
|
| 1106 | 2026-01-27T01:13:52.468Z | DEBG | test_vpcs (BackgroundTasks): activation complete
background_task = lookup_region_port
elapsed = 847.225174ms
iteration = 1
status = {"errors":[],"found_port_ok":[]}
|
| 1107 | 2026-01-27T01:13:52.495Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Modify
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = fm_sitrep_gc
resource = Fleet
|
| 1108 | 2026-01-27T01:13:52.495Z | TRAC | test_vpcs (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = fm_sitrep_gc
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 1109 | 2026-01-27T01:13:52.495Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = fm_sitrep_gc
resource = Database
|
| 1110 | 2026-01-27T01:13:52.495Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = fm_sitrep_gc
roles = RoleSet { roles: {} }
|
| 1111 | 2026-01-27T01:13:52.496Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = fm_sitrep_gc
resource = Database
result = Ok(())
|
| 1112 | 2026-01-27T01:13:52.514Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = probe_distributor
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 1113 | 2026-01-27T01:13:52.519Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = probe_distributor
resource = Fleet
result = Ok(())
|
| 1114 | 2026-01-27T01:13:52.519Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = probe_distributor
resource = Fleet
|
| 1115 | 2026-01-27T01:13:52.519Z | TRAC | test_vpcs (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = probe_distributor
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 1116 | 2026-01-27T01:13:52.519Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = probe_distributor
resource = Database
|
| 1117 | 2026-01-27T01:13:52.519Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = probe_distributor
roles = RoleSet { roles: {} }
|
| 1118 | 2026-01-27T01:13:52.520Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = probe_distributor
resource = Database
result = Ok(())
|
| 1119 | 2026-01-27T01:13:52.521Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = dns_config_external
dns_group = external
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 1120 | 2026-01-27T01:13:52.530Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = dns_config_external
dns_group = external
resource = DnsConfig
result = Ok(())
|
| 1121 | 2026-01-27T01:13:52.710Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
|
| 1122 | 2026-01-27T01:13:52.710Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {} }
|
| 1123 | 2026-01-27T01:13:52.713Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
result = Ok(())
|
| 1124 | 2026-01-27T01:13:52.714Z | DEBG | test_vpcs (BackgroundTasks): activation complete
background_task = read_only_region_replacement_start
elapsed = 1.073678726s
iteration = 1
status = {"errors":[],"requests_created_ok":[]}
|
| 1125 | 2026-01-27T01:13:52.714Z | INFO | test_vpcs (BackgroundTasks): all webhook delivery tasks completed
background_task = webhook_deliverator
num_receivers = 0
|
| 1126 | 2026-01-27T01:13:52.715Z | DEBG | test_vpcs (BackgroundTasks): activation complete
background_task = webhook_deliverator
elapsed = 1.068947322s
iteration = 1
status = {"by_rx":{},"error":null}
|
| 1127 | 2026-01-27T01:13:52.731Z | DEBG | test_vpcs (BackgroundTasks): activation complete
background_task = region_snapshot_replacement_garbage_collection
elapsed = 1.104874617s
iteration = 1
status = {"errors":[],"garbage_collect_requested":[]}
|
| 1128 | 2026-01-27T01:13:52.777Z | DEBG | test_vpcs (BackgroundTasks): activation complete
background_task = region_snapshot_replacement_finish
elapsed = 1.144419398s
iteration = 1
status = {"errors":[],"finish_invoked_ok":[]}
|
| 1129 | 2026-01-27T01:13:52.785Z | DEBG | test_vpcs (BackgroundTasks): activation complete
background_task = region_replacement_driver
elapsed = 1.280664714s
iteration = 1
status = {"drive_invoked_ok":[],"errors":[],"finish_invoked_ok":[]}
|
| 1130 | 2026-01-27T01:13:52.785Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = support_bundle_collector
resource = Fleet
|
| 1131 | 2026-01-27T01:13:52.785Z | TRAC | test_vpcs (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = support_bundle_collector
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 1132 | 2026-01-27T01:13:52.785Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = support_bundle_collector
resource = Database
|
| 1133 | 2026-01-27T01:13:52.785Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = support_bundle_collector
roles = RoleSet { roles: {} }
|
| 1134 | 2026-01-27T01:13:52.786Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = support_bundle_collector
resource = Database
result = Ok(())
|
| 1135 | 2026-01-27T01:13:52.787Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = region_snapshot_replacement_step
resource = Database
|
| 1136 | 2026-01-27T01:13:52.787Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = region_snapshot_replacement_step
roles = RoleSet { roles: {} }
|
| 1137 | 2026-01-27T01:13:52.788Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = region_snapshot_replacement_step
resource = Database
result = Ok(())
|
| 1138 | 2026-01-27T01:13:52.791Z | DEBG | test_vpcs (BackgroundTasks): reconfigurator config load complete
background_task = reconfigurator_config_watcher
switches = Loaded(ReconfiguratorConfigView { version: 1, config: ReconfiguratorConfig { planner_enabled: false, planner_config: PlannerConfig { add_zones_with_mupdate_override: false }, tuf_repo_pruner_enabled: true }, time_modified: 2026-01-27T01:13:51.285464Z })
|
| 1139 | 2026-01-27T01:13:52.792Z | DEBG | test_vpcs (BackgroundTasks): activation complete
background_task = reconfigurator_config_watcher
elapsed = 1.304518683s
iteration = 1
status = {"config_updated":true}
|
| 1140 | 2026-01-27T01:13:52.792Z | DEBG | test_vpcs (BackgroundTasks): activating
background_task = tuf_repo_pruner
iteration = 2
reason = Dependency
|
| 1141 | 2026-01-27T01:13:52.792Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = tuf_repo_pruner
resource = Fleet
|
| 1142 | 2026-01-27T01:13:52.792Z | TRAC | test_vpcs (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = tuf_repo_pruner
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 1143 | 2026-01-27T01:13:52.792Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = tuf_repo_pruner
resource = Database
|
| 1144 | 2026-01-27T01:13:52.792Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = tuf_repo_pruner
roles = RoleSet { roles: {} }
|
| 1145 | 2026-01-27T01:13:52.793Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = tuf_repo_pruner
resource = Database
result = Ok(())
|
| 1146 | 2026-01-27T01:13:52.794Z | DEBG | test_vpcs (BackgroundTasks): activating
background_task = blueprint_planner
iteration = 2
reason = Dependency
|
| 1147 | 2026-01-27T01:13:52.794Z | DEBG | test_vpcs (BackgroundTasks): blueprint planning disabled, doing nothing
background_task = blueprint_planner
|
| 1148 | 2026-01-27T01:13:52.794Z | DEBG | test_vpcs (BackgroundTasks): activation complete
background_task = blueprint_planner
elapsed = 66.411\u{b5}s
iteration = 2
status = "Disabled"
|
| 1149 | 2026-01-27T01:13:52.795Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = external_endpoints
resource = DnsConfig
|
| 1150 | 2026-01-27T01:13:52.795Z | TRAC | test_vpcs (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = external_endpoints
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 1151 | 2026-01-27T01:13:52.795Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = external_endpoints
resource = Database
|
| 1152 | 2026-01-27T01:13:52.795Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = external_endpoints
roles = RoleSet { roles: {} }
|
| 1153 | 2026-01-27T01:13:52.795Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = external_endpoints
resource = Database
result = Ok(())
|
| 1154 | 2026-01-27T01:13:52.797Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = fm_sitrep_loader
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 1155 | 2026-01-27T01:13:52.803Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = fm_sitrep_loader
resource = Fleet
result = Ok(())
|
| 1156 | 2026-01-27T01:13:52.804Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = fm_sitrep_loader
resource = Database
|
| 1157 | 2026-01-27T01:13:52.804Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = fm_sitrep_loader
roles = RoleSet { roles: {} }
|
| 1158 | 2026-01-27T01:13:52.804Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = fm_sitrep_loader
resource = Database
result = Ok(())
|
| 1159 | 2026-01-27T01:13:52.806Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = trust_quorum_manager
bgtask = TrustQuorumManager
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 1160 | 2026-01-27T01:13:52.811Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = trust_quorum_manager
bgtask = TrustQuorumManager
resource = Fleet
result = Ok(())
|
| 1161 | 2026-01-27T01:13:52.811Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = trust_quorum_manager
bgtask = TrustQuorumManager
resource = Database
|
| 1162 | 2026-01-27T01:13:52.811Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = trust_quorum_manager
bgtask = TrustQuorumManager
roles = RoleSet { roles: {} }
|
| 1163 | 2026-01-27T01:13:52.812Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = trust_quorum_manager
bgtask = TrustQuorumManager
resource = Database
result = Ok(())
|
| 1164 | 2026-01-27T01:13:52.813Z | WARN | test_vpcs (BackgroundTasks): failed to read target blueprint
background_task = blueprint_loader
error = Internal Error: no target blueprint set
|
| 1165 | 2026-01-27T01:13:52.813Z | DEBG | test_vpcs (BackgroundTasks): activation complete
background_task = blueprint_loader
elapsed = 1.320261157s
iteration = 1
status = {"error":"failed to read target blueprint: Internal Error: no target blueprint set"}
|
| 1166 | 2026-01-27T01:13:52.814Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = dns_config_internal
dns_group = internal
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 1167 | 2026-01-27T01:13:52.821Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = dns_config_internal
dns_group = internal
resource = DnsConfig
result = Ok(())
|
| 1168 | 2026-01-27T01:13:52.821Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = region_snapshot_replacement_start
resource = Database
|
| 1169 | 2026-01-27T01:13:52.821Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = region_snapshot_replacement_start
roles = RoleSet { roles: {} }
|
| 1170 | 2026-01-27T01:13:52.822Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = region_snapshot_replacement_start
resource = Database
result = Ok(())
|
| 1171 | 2026-01-27T01:13:52.823Z | WARN | test_vpcs (BackgroundTasks): failed to read DNS config
background_task = dns_config_external
dns_group = external
error = Internal Error: expected exactly one latest version for DNS group External, found 0
|
| 1172 | 2026-01-27T01:13:52.823Z | DEBG | test_vpcs (BackgroundTasks): activation complete
background_task = dns_config_external
dns_group = external
elapsed = 1.432864523s
iteration = 1
status = {"error":"failed to read DNS config: Internal Error: expected exactly one latest version for DNS group External, found 0"}
|
| 1173 | 2026-01-27T01:13:52.836Z | DEBG | test_vpcs (BackgroundTasks): inventory_prune_one: nothing eligible for removal (too few)
background_task = inventory_collection
candidates = []
|
| 1174 | 2026-01-27T01:13:52.836Z | TRAC | test_vpcs (DnsResolver): lookup_all_socket_v6 srv
dns_name = _mgs._tcp.control-plane.oxide.internal
|
| 1175 | 2026-01-27T01:13:52.838Z | TRAC | test_vpcs (dns): buffer
buffer = Length: 67 (0x43) bytes\n0000: b6 93 01 00 00 01 00 00 00 00 00 01 04 5f 6d 67 ............._mg\n0010: 73 04 5f 74 63 70 0d 63 6f 6e 74 72 6f 6c 2d 70 s._tcp.control-p\n0020: 6c 61 6e 65 05 6f 78 69 64 65 08 69 6e 74 65 72 lane.oxide.inter\n0030: 6e 61 6c 00 00 21 00 01 00 00 29 04 d0 00 00 00 nal..!....).....\n0040: 00 00 00 ...
kind = dns
peer_addr = [::1]:56847
req_id = 7ed2971c-49df-4c40-9eb1-9b9632be7d18
|
| 1176 | 2026-01-27T01:13:52.838Z | DEBG | test_vpcs (dns): message_request
kind = dns
mr = MessageRequest {\n header: Header {\n id: 46739,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n queries: Queries {\n queries: [\n LowerQuery {\n name: LowerName(\n Name("_mgs._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_mgs._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n ],\n original: [\n 4,\n 95,\n 109,\n 103,\n 115,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n flags: EdnsFlags {\n dnssec_ok: false,\n z: 0,\n },\n max_payload: 1232,\n options: OPT {\n options: [],\n },\n },\n ),\n}
peer_addr = [::1]:56847
req_id = 7ed2971c-49df-4c40-9eb1-9b9632be7d18
|
| 1177 | 2026-01-27T01:13:52.838Z | ERRO | test_vpcs (dns): failed to handle incoming DNS message: MessageRequest {
header: Header {
id: 46739,
message_type: Query,
op_code: Query,
authoritative: false,
truncation: false,
recursion_desired: true,
recursion_available: false,
authentic_data: false,
checking_disabled: false,
response_code: NoError,
query_count: 1,
answer_count: 0,
name_server_count: 0,
additional_count: 1,
},
queries: Queries {
queries: [
LowerQuery {
name: LowerName(
Name("_mgs._tcp.control-plane.oxide.internal."),
),
original: Query {
name: Name("_mgs._tcp.control-plane.oxide.internal."),
query_type: SRV,
query_class: IN,
},
},
],
original: [
4,
95,
109,
103,
115,
4,
95,
116,
99,
112,
13,
99,
111,
110,
116,
114,
111,
108,
45,
112,
108,
97,
110,
101,
5,
111,
120,
105,
100,
101,
8,
105,
110,
116,
101,
114,
110,
97,
108,
0,
0,
33,
0,
1,
],
},
answers: [],
name_servers: [],
additionals: [],
sig0: [],
edns: Some(
Edns {
rcode_high: 0,
version: 0,
flags: EdnsFlags {
dnssec_ok: false,
z: 0,
},
max_payload: 1232,
options: OPT {
options: [],
},
},
),
} SERVFAIL: server is not authoritative for name: "_mgs._tcp.control-plane.oxide.internal."
kind = dns
peer_addr = [::1]:56847
req_id = 7ed2971c-49df-4c40-9eb1-9b9632be7d18
|
| 1178 | 2026-01-27T01:13:52.839Z | WARN | test_vpcs (BackgroundTasks): inventory collection failed
background_task = inventory_collection
error = failed to collect inventory: looking up MGS addresses: proto error: no records found for Query { name: Name("_mgs._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN }
|
| 1179 | 2026-01-27T01:13:52.839Z | DEBG | test_vpcs (BackgroundTasks): activation complete
background_task = inventory_collection
elapsed = 1.355322191s
iteration = 1
status = {"error":"failed to collect inventory: looking up MGS addresses: proto error: no records found for Query { name: Name(\\"_mgs._tcp.control-plane.oxide.internal.\\"), query_type: SRV, query_class: IN }"}
|
| 1180 | 2026-01-27T01:13:52.846Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = vpc_route_manager
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 1181 | 2026-01-27T01:13:52.856Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = vpc_route_manager
resource = Fleet
result = Ok(())
|
| 1182 | 2026-01-27T01:13:52.856Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = vpc_route_manager
resource = Database
|
| 1183 | 2026-01-27T01:13:52.856Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = vpc_route_manager
roles = RoleSet { roles: {} }
|
| 1184 | 2026-01-27T01:13:52.857Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = vpc_route_manager
resource = Database
result = Ok(())
|
| 1185 | 2026-01-27T01:13:52.861Z | INFO | test_vpcs (BackgroundTasks): all instance checks complete
background_task = instance_watcher
pruned_instances = 0
total_completed = 0
total_failed = 0
total_incomplete = 0
total_instances = 0
update_sagas_queued = 0
|
| 1186 | 2026-01-27T01:13:52.861Z | DEBG | test_vpcs (BackgroundTasks): activation complete
background_task = instance_watcher
elapsed = 1.355061218s
iteration = 1
status = {"failed_checks":{},"incomplete_checks":{},"instance_states":{},"pruned_instances":0,"total_instances":0,"update_sagas_queued":0}
|
| 1187 | 2026-01-27T01:13:52.865Z | DEBG | test_vpcs (BackgroundTasks): activation complete
background_task = inventory_loader
elapsed = 1.379503572s
iteration = 1
status = "NoCollections"
|
| 1188 | 2026-01-27T01:13:52.866Z | DEBG | test_vpcs (BackgroundTasks): activation complete
background_task = switch_port_config_manager
elapsed = 1.369839688s
iteration = 1
status = {}
|
| 1189 | 2026-01-27T01:13:52.867Z | INFO | test_vpcs (dropshot_internal): request completed
latency_us = 535356
local_addr = 127.0.0.1:46983
method = GET
remote_addr = 127.0.0.1:63662
req_id = e3db9b9f-f198-46ef-93ee-3a99b412fcc8
response_code = 200
uri = /nat/ipv4/changeset/0?limit=100
|
| 1190 | 2026-01-27T01:13:52.907Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = probe_distributor
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 1191 | 2026-01-27T01:13:52.914Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = probe_distributor
resource = Fleet
result = Ok(())
|
| 1192 | 2026-01-27T01:13:52.914Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = probe_distributor
resource = Database
|
| 1193 | 2026-01-27T01:13:52.914Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = probe_distributor
roles = RoleSet { roles: {} }
|
| 1194 | 2026-01-27T01:13:52.914Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = probe_distributor
resource = Database
result = Ok(())
|
| 1195 | 2026-01-27T01:13:52.922Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = support_bundle_collector
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 1196 | 2026-01-27T01:13:52.929Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = support_bundle_collector
resource = Fleet
result = Ok(())
|
| 1197 | 2026-01-27T01:13:52.929Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = support_bundle_collector
resource = Database
|
| 1198 | 2026-01-27T01:13:52.929Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = support_bundle_collector
roles = RoleSet { roles: {} }
|
| 1199 | 2026-01-27T01:13:52.929Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = support_bundle_collector
resource = Database
result = Ok(())
|
| 1200 | 2026-01-27T01:13:52.931Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = tuf_repo_pruner
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 1201 | 2026-01-27T01:13:52.937Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = tuf_repo_pruner
resource = Fleet
result = Ok(())
|
| 1202 | 2026-01-27T01:13:52.937Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = tuf_repo_pruner
resource = Database
|
| 1203 | 2026-01-27T01:13:52.937Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = tuf_repo_pruner
roles = RoleSet { roles: {} }
|
| 1204 | 2026-01-27T01:13:52.938Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = tuf_repo_pruner
resource = Database
result = Ok(())
|
| 1205 | 2026-01-27T01:13:52.971Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
|
| 1206 | 2026-01-27T01:13:52.971Z | TRAC | test_vpcs (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = service_firewall_rule_propagation
resource_id = 001de000-4401-4000-8000-000000000000
resource_type = Project
|
| 1207 | 2026-01-27T01:13:52.971Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
|
| 1208 | 2026-01-27T01:13:52.971Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {} }
|
| 1209 | 2026-01-27T01:13:52.978Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
result = Ok(())
|
| 1210 | 2026-01-27T01:13:53.018Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = external_endpoints
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 1211 | 2026-01-27T01:13:53.026Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = external_endpoints
resource = DnsConfig
result = Ok(())
|
| 1212 | 2026-01-27T01:13:53.026Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = external_endpoints
resource = Database
|
| 1213 | 2026-01-27T01:13:53.026Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = external_endpoints
roles = RoleSet { roles: {} }
|
| 1214 | 2026-01-27T01:13:53.027Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = external_endpoints
resource = Database
result = Ok(())
|
| 1215 | 2026-01-27T01:13:53.028Z | TRAC | test_vpcs (BackgroundTasks): reprocessing 0 outdated webhook globs...
background_task = alert_dispatcher
|
| 1216 | 2026-01-27T01:13:53.029Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = alert_dispatcher
resource = Database
|
| 1217 | 2026-01-27T01:13:53.029Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = alert_dispatcher
roles = RoleSet { roles: {} }
|
| 1218 | 2026-01-27T01:13:53.029Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = alert_dispatcher
resource = Database
result = Ok(())
|
| 1219 | 2026-01-27T01:13:53.052Z | DEBG | test_vpcs (BackgroundTasks): activation complete
background_task = fm_sitrep_loader
elapsed = 1.4010157s
iteration = 1
status = "NoSitrep"
|
| 1220 | 2026-01-27T01:13:53.052Z | WARN | test_vpcs (BackgroundTasks): failed to read DNS config
background_task = dns_config_internal
dns_group = internal
error = Internal Error: expected exactly one latest version for DNS group Internal, found 0
|
| 1221 | 2026-01-27T01:13:53.053Z | DEBG | test_vpcs (BackgroundTasks): activation complete
background_task = dns_config_internal
dns_group = internal
elapsed = 1.666869509s
iteration = 1
status = {"error":"failed to read DNS config: Internal Error: expected exactly one latest version for DNS group Internal, found 0"}
|
| 1222 | 2026-01-27T01:13:53.054Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = tuf_artifact_replication
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 1223 | 2026-01-27T01:13:53.059Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = tuf_artifact_replication
resource = Fleet
result = Ok(())
|
| 1224 | 2026-01-27T01:13:53.059Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = tuf_artifact_replication
resource = Database
|
| 1225 | 2026-01-27T01:13:53.059Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = tuf_artifact_replication
roles = RoleSet { roles: {} }
|
| 1226 | 2026-01-27T01:13:53.060Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = tuf_artifact_replication
resource = Database
result = Ok(())
|
| 1227 | 2026-01-27T01:13:53.109Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = fm_sitrep_gc
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 1228 | 2026-01-27T01:13:53.113Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Modify
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = fm_sitrep_gc
resource = Fleet
result = Ok(())
|
| 1229 | 2026-01-27T01:13:53.122Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = tuf_repo_pruner
resource = Fleet
|
| 1230 | 2026-01-27T01:13:53.122Z | TRAC | test_vpcs (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = tuf_repo_pruner
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 1231 | 2026-01-27T01:13:53.122Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = tuf_repo_pruner
resource = Database
|
| 1232 | 2026-01-27T01:13:53.122Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = tuf_repo_pruner
roles = RoleSet { roles: {} }
|
| 1233 | 2026-01-27T01:13:53.123Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = tuf_repo_pruner
resource = Database
result = Ok(())
|
| 1234 | 2026-01-27T01:13:53.126Z | TRAC | test_vpcs (BackgroundTasks): no more instances in need of reincarnation
background_task = instance_reincarnation
reincarnation_reason = start saga failed
total_found = 0
|
| 1235 | 2026-01-27T01:13:53.127Z | INFO | test_vpcs (BackgroundTasks): instance reincarnation completed successfully
background_task = instance_reincarnation
instances_changed_state = 0
instances_found = 0
instances_reincarnated = 0
|
| 1236 | 2026-01-27T01:13:53.127Z | DEBG | test_vpcs (BackgroundTasks): activation complete
background_task = instance_reincarnation
elapsed = 1.619157104s
iteration = 1
status = {"changed_state":[],"disabled":false,"errors":[],"instances_found":{"Failed":0,"SagaUnwound":0},"instances_reincarnated":[],"restart_errors":[]}
|
| 1237 | 2026-01-27T01:13:53.139Z | TRAC | test_vpcs (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = service_firewall_rule_propagation
resource_id = 001de000-5110-4000-8000-000000000001
resource_type = Silo
|
| 1238 | 2026-01-27T01:13:53.139Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
|
| 1239 | 2026-01-27T01:13:53.139Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {} }
|
| 1240 | 2026-01-27T01:13:53.139Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
result = Ok(())
|
| 1241 | 2026-01-27T01:13:53.173Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = fm_sitrep_gc
resource = Database
|
| 1242 | 2026-01-27T01:13:53.173Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = fm_sitrep_gc
roles = RoleSet { roles: {} }
|
| 1243 | 2026-01-27T01:13:53.174Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = fm_sitrep_gc
resource = Database
result = Ok(())
|
| 1244 | 2026-01-27T01:13:53.175Z | DEBG | test_vpcs (BackgroundTasks): activation complete
background_task = region_replacement
elapsed = 1.673051193s
iteration = 1
status = {"errors":[],"requests_completed_ok":[],"requests_created_ok":[],"start_invoked_ok":[]}
|
| 1245 | 2026-01-27T01:13:53.223Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Modify
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = fm_sitrep_gc
resource = Fleet
|
| 1246 | 2026-01-27T01:13:53.224Z | TRAC | test_vpcs (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = fm_sitrep_gc
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 1247 | 2026-01-27T01:13:53.224Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = fm_sitrep_gc
resource = Database
|
| 1248 | 2026-01-27T01:13:53.224Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = fm_sitrep_gc
roles = RoleSet { roles: {} }
|
| 1249 | 2026-01-27T01:13:53.224Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = fm_sitrep_gc
resource = Database
result = Ok(())
|
| 1250 | 2026-01-27T01:13:53.231Z | TRAC | test_vpcs (BackgroundTasks): webhook dispatching completed successfully
background_task = alert_dispatcher
events_dispatched = 0
events_without_receivers = 0
|
| 1251 | 2026-01-27T01:13:53.231Z | DEBG | test_vpcs (BackgroundTasks): activation complete
background_task = alert_dispatcher
elapsed = 1.588199932s
iteration = 1
status = {"dispatched":[],"errors":[],"glob_version":"225.0.0","globs_reprocessed":{},"no_receivers":[]}
|
| 1252 | 2026-01-27T01:13:53.281Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = fm_sitrep_gc
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 1253 | 2026-01-27T01:13:53.284Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Modify
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = fm_sitrep_gc
resource = Fleet
result = Ok(())
|
| 1254 | 2026-01-27T01:13:53.300Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = region_snapshot_replacement_step
resource = Database
|
| 1255 | 2026-01-27T01:13:53.301Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = region_snapshot_replacement_step
roles = RoleSet { roles: {} }
|
| 1256 | 2026-01-27T01:13:53.303Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = region_snapshot_replacement_step
resource = Database
result = Ok(())
|
| 1257 | 2026-01-27T01:13:53.303Z | INFO | test_vpcs (BackgroundTasks): Loaded 0 active trust quorum configurations from database
background_task = trust_quorum_manager
bgtask = TrustQuorumManager
|
| 1258 | 2026-01-27T01:13:53.303Z | DEBG | test_vpcs (BackgroundTasks): activation complete
background_task = trust_quorum_manager
elapsed = 1.635357266s
iteration = 1
status = {"PerRackStatus":{"errors":[],"statuses":[]}}
|
| 1259 | 2026-01-27T01:13:53.356Z | TRAC | test_vpcs (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = service_firewall_rule_propagation
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 1260 | 2026-01-27T01:13:53.356Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
|
| 1261 | 2026-01-27T01:13:53.356Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {} }
|
| 1262 | 2026-01-27T01:13:53.357Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
result = Ok(())
|
| 1263 | 2026-01-27T01:13:53.420Z | DEBG | test_vpcs (BackgroundTasks): activation complete
background_task = region_snapshot_replacement_start
elapsed = 1.796934185s
iteration = 1
status = {"errors":[],"requests_completed_ok":[],"requests_created_ok":[],"start_invoked_ok":[]}
|
| 1264 | 2026-01-27T01:13:53.433Z | DEBG | test_vpcs (BackgroundTasks): activation complete
background_task = region_snapshot_replacement_step
elapsed = 1.803318557s
iteration = 1
status = {"errors":[],"step_garbage_collect_invoked_ok":[],"step_invoked_ok":[],"step_records_created_ok":[],"step_set_volume_deleted_ok":[]}
|
| 1265 | 2026-01-27T01:13:53.434Z | WARN | test_vpcs (BackgroundTasks): failed to read Silo/DNS/TLS configuration
background_task = external_endpoints
error = Internal Error: expected at least one external DNS zone
|
| 1266 | 2026-01-27T01:13:53.434Z | DEBG | test_vpcs (BackgroundTasks): activation complete
background_task = external_endpoints
elapsed = 1.957381496s
iteration = 1
status = {"error":"failed to read Silo/DNS/TLS configuration: Internal Error: expected at least one external DNS zone"}
|
| 1267 | 2026-01-27T01:13:53.479Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 1268 | 2026-01-27T01:13:53.489Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
result = Ok(())
|
| 1269 | 2026-01-27T01:13:53.489Z | TRAC | test_vpcs (BackgroundTasks): successful lookup of siloed resource "Vpc" using built-in user
background_task = service_firewall_rule_propagation
|
| 1270 | 2026-01-27T01:13:53.489Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
|
| 1271 | 2026-01-27T01:13:53.489Z | TRAC | test_vpcs (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = service_firewall_rule_propagation
resource_id = 001de000-4401-4000-8000-000000000000
resource_type = Project
|
| 1272 | 2026-01-27T01:13:53.490Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
|
| 1273 | 2026-01-27T01:13:53.490Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {} }
|
| 1274 | 2026-01-27T01:13:53.490Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
result = Ok(())
|
| 1275 | 2026-01-27T01:13:53.508Z | INFO | test_vpcs (BackgroundTasks): No bundles to collect
background_task = support_bundle_collector
|
| 1276 | 2026-01-27T01:13:53.508Z | DEBG | test_vpcs (BackgroundTasks): activation complete
background_task = support_bundle_collector
elapsed = 2.128661155s
iteration = 1
status = {"cleanup_err":null,"cleanup_report":{"db_destroying_bundles_removed":0,"db_failing_bundles_updated":0,"sled_bundles_delete_failed":0,"sled_bundles_deleted_not_found":0,"sled_bundles_deleted_ok":0},"collection_err":null,"collection_report":null}
|
| 1277 | 2026-01-27T01:13:53.544Z | DEBG | test_vpcs (BackgroundTasks): activation complete
background_task = vpc_route_manager
elapsed = 1.929522089s
iteration = 1
status = {}
|
| 1278 | 2026-01-27T01:13:53.546Z | TRAC | test_vpcs (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = service_firewall_rule_propagation
resource_id = 001de000-5110-4000-8000-000000000001
resource_type = Silo
|
| 1279 | 2026-01-27T01:13:53.553Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
|
| 1280 | 2026-01-27T01:13:53.554Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {} }
|
| 1281 | 2026-01-27T01:13:53.555Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
result = Ok(())
|
| 1282 | 2026-01-27T01:13:53.558Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = tuf_artifact_replication
resource = Fleet
|
| 1283 | 2026-01-27T01:13:53.558Z | TRAC | test_vpcs (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = tuf_artifact_replication
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 1284 | 2026-01-27T01:13:53.558Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = tuf_artifact_replication
resource = Database
|
| 1285 | 2026-01-27T01:13:53.558Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = tuf_artifact_replication
roles = RoleSet { roles: {} }
|
| 1286 | 2026-01-27T01:13:53.559Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = tuf_artifact_replication
resource = Database
result = Ok(())
|
| 1287 | 2026-01-27T01:13:53.565Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = tuf_repo_pruner
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 1288 | 2026-01-27T01:13:53.574Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = tuf_repo_pruner
resource = Fleet
result = Ok(())
|
| 1289 | 2026-01-27T01:13:53.574Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = tuf_repo_pruner
resource = Database
|
| 1290 | 2026-01-27T01:13:53.574Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = tuf_repo_pruner
roles = RoleSet { roles: {} }
|
| 1291 | 2026-01-27T01:13:53.575Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = tuf_repo_pruner
resource = Database
result = Ok(())
|
| 1292 | 2026-01-27T01:13:53.579Z | INFO | test_vpcs (BackgroundTasks): deleted 0 of 0 sitreps sitreps
background_task = fm_sitrep_gc
case_ereports_deleted = 0
cases_deleted = 0
ids = []
sitreps_deleted = 0
|
| 1293 | 2026-01-27T01:13:53.579Z | TRAC | test_vpcs (BackgroundTasks): all 0 orphaned sitreps in this batch have already been deleted
background_task = fm_sitrep_gc
|
| 1294 | 2026-01-27T01:13:53.579Z | INFO | test_vpcs (BackgroundTasks): sitrep garbage collection found 0 orphaned sitreps, deleted 0
background_task = fm_sitrep_gc
|
| 1295 | 2026-01-27T01:13:53.579Z | DEBG | test_vpcs (BackgroundTasks): activation complete
background_task = fm_sitrep_gc
elapsed = 1.914651577s
iteration = 1
status = {"errors":[],"orphaned_sitreps_deleted":0,"orphaned_sitreps_found":0}
|
| 1296 | 2026-01-27T01:13:53.579Z | TRAC | test_vpcs (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = service_firewall_rule_propagation
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 1297 | 2026-01-27T01:13:53.580Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
|
| 1298 | 2026-01-27T01:13:53.580Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {} }
|
| 1299 | 2026-01-27T01:13:53.581Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
result = Ok(())
|
| 1300 | 2026-01-27T01:13:53.587Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = tuf_artifact_replication
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 1301 | 2026-01-27T01:13:53.597Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = tuf_artifact_replication
resource = Fleet
result = Ok(())
|
| 1302 | 2026-01-27T01:13:53.597Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = tuf_artifact_replication
resource = Database
|
| 1303 | 2026-01-27T01:13:53.597Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = tuf_artifact_replication
roles = RoleSet { roles: {} }
|
| 1304 | 2026-01-27T01:13:53.598Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = tuf_artifact_replication
resource = Database
result = Ok(())
|
| 1305 | 2026-01-27T01:13:53.602Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = tuf_repo_pruner
resource = TargetReleaseConfig
|
| 1306 | 2026-01-27T01:13:53.602Z | TRAC | test_vpcs (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = tuf_repo_pruner
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 1307 | 2026-01-27T01:13:53.602Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = tuf_repo_pruner
resource = Database
|
| 1308 | 2026-01-27T01:13:53.602Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = tuf_repo_pruner
roles = RoleSet { roles: {} }
|
| 1309 | 2026-01-27T01:13:53.604Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = tuf_repo_pruner
resource = Database
result = Ok(())
|
| 1310 | 2026-01-27T01:13:53.606Z | INFO | test_vpcs (BackgroundTasks): finished distributing probes to sleds
background_task = probe_distributor
n_pushed_probes = 0
|
| 1311 | 2026-01-27T01:13:53.606Z | DEBG | test_vpcs (BackgroundTasks): activation complete
background_task = probe_distributor
elapsed = 1.939462507s
iteration = 1
status = {"errors":[],"probes_by_sled":{}}
|
| 1312 | 2026-01-27T01:13:53.606Z | DEBG | test_vpcs (BackgroundTasks): activating
background_task = vpc_route_manager
iteration = 2
reason = Dependency
|
| 1313 | 2026-01-27T01:13:53.606Z | INFO | test_vpcs (BackgroundTasks): VPC route manager running
background_task = vpc_route_manager
|
| 1314 | 2026-01-27T01:13:53.606Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = vpc_route_manager
resource = Fleet
|
| 1315 | 2026-01-27T01:13:53.606Z | TRAC | test_vpcs (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = vpc_route_manager
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 1316 | 2026-01-27T01:13:53.606Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = vpc_route_manager
resource = Database
|
| 1317 | 2026-01-27T01:13:53.606Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = vpc_route_manager
roles = RoleSet { roles: {} }
|
| 1318 | 2026-01-27T01:13:53.607Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = vpc_route_manager
resource = Database
result = Ok(())
|
| 1319 | 2026-01-27T01:13:53.609Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 1320 | 2026-01-27T01:13:53.626Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
result = Ok(())
|
| 1321 | 2026-01-27T01:13:53.626Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
|
| 1322 | 2026-01-27T01:13:53.626Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {} }
|
| 1323 | 2026-01-27T01:13:53.627Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
result = Ok(())
|
| 1324 | 2026-01-27T01:13:53.629Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = v2p_manager
resource = Fleet
|
| 1325 | 2026-01-27T01:13:53.629Z | TRAC | test_vpcs (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = v2p_manager
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 1326 | 2026-01-27T01:13:53.629Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = v2p_manager
resource = Database
|
| 1327 | 2026-01-27T01:13:53.629Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = v2p_manager
roles = RoleSet { roles: {} }
|
| 1328 | 2026-01-27T01:13:53.629Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = v2p_manager
resource = Database
result = Ok(())
|
| 1329 | 2026-01-27T01:13:53.632Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = tuf_artifact_replication
resource = Fleet
|
| 1330 | 2026-01-27T01:13:53.632Z | TRAC | test_vpcs (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = tuf_artifact_replication
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 1331 | 2026-01-27T01:13:53.632Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = tuf_artifact_replication
resource = Database
|
| 1332 | 2026-01-27T01:13:53.633Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = tuf_artifact_replication
roles = RoleSet { roles: {} }
|
| 1333 | 2026-01-27T01:13:53.633Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = tuf_artifact_replication
resource = Database
result = Ok(())
|
| 1334 | 2026-01-27T01:13:53.634Z | DEBG | test_vpcs (BackgroundTasks): activating
background_task = inventory_collection
iteration = 2
reason = Signaled
|
| 1335 | 2026-01-27T01:13:53.634Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Modify
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = inventory_collection
resource = Inventory
|
| 1336 | 2026-01-27T01:13:53.634Z | TRAC | test_vpcs (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = inventory_collection
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 1337 | 2026-01-27T01:13:53.634Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = inventory_collection
resource = Database
|
| 1338 | 2026-01-27T01:13:53.634Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = inventory_collection
roles = RoleSet { roles: {} }
|
| 1339 | 2026-01-27T01:13:53.635Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = inventory_collection
resource = Database
result = Ok(())
|
| 1340 | 2026-01-27T01:13:53.636Z | INFO | test_vpcs (dropshot_internal): request completed
latency_us = 1202914
local_addr = 127.0.0.1:46983
method = POST
remote_addr = 127.0.0.1:36890
req_id = 6ecdb88c-8de5-4bb4-bf39-561995c8df28
response_code = 204
uri = /sled-agents/b6d65341-167c-41df-9b5c-41cded99c229
|
| 1341 | 2026-01-27T01:13:53.637Z | DEBG | test_vpcs (NexusClient): client response
result = Ok(Response { url: "http://127.0.0.1:46983/sled-agents/b6d65341-167c-41df-9b5c-41cded99c229", status: 204, headers: {"x-request-id": "6ecdb88c-8de5-4bb4-bf39-561995c8df28", "date": "Tue, 27 Jan 2026 01:13:53 GMT"} })
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
| 1342 | 2026-01-27T01:13:53.638Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = vpc_route_manager
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 1343 | 2026-01-27T01:13:53.646Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = vpc_route_manager
resource = Fleet
result = Ok(())
|
| 1344 | 2026-01-27T01:13:53.647Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = vpc_route_manager
resource = Fleet
|
| 1345 | 2026-01-27T01:13:53.647Z | TRAC | test_vpcs (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = vpc_route_manager
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 1346 | 2026-01-27T01:13:53.648Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = vpc_route_manager
resource = Database
|
| 1347 | 2026-01-27T01:13:53.648Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = vpc_route_manager
roles = RoleSet { roles: {} }
|
| 1348 | 2026-01-27T01:13:53.650Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = vpc_route_manager
resource = Database
result = Ok(())
|
| 1349 | 2026-01-27T01:13:53.652Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = tuf_repo_pruner
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 1350 | 2026-01-27T01:13:53.661Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = tuf_repo_pruner
resource = TargetReleaseConfig
result = Ok(())
|
| 1351 | 2026-01-27T01:13:53.661Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = tuf_repo_pruner
resource = Database
|
| 1352 | 2026-01-27T01:13:53.661Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = tuf_repo_pruner
roles = RoleSet { roles: {} }
|
| 1353 | 2026-01-27T01:13:53.661Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = tuf_repo_pruner
resource = Database
result = Ok(())
|
| 1354 | 2026-01-27T01:13:53.664Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = v2p_manager
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 1355 | 2026-01-27T01:13:53.671Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = v2p_manager
resource = Fleet
result = Ok(())
|
| 1356 | 2026-01-27T01:13:53.671Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = v2p_manager
resource = Fleet
|
| 1357 | 2026-01-27T01:13:53.671Z | TRAC | test_vpcs (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = v2p_manager
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 1358 | 2026-01-27T01:13:53.671Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = v2p_manager
resource = Database
|
| 1359 | 2026-01-27T01:13:53.672Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = v2p_manager
roles = RoleSet { roles: {} }
|
| 1360 | 2026-01-27T01:13:53.672Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = v2p_manager
resource = Database
result = Ok(())
|
| 1361 | 2026-01-27T01:13:53.674Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
|
| 1362 | 2026-01-27T01:13:53.674Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {} }
|
| 1363 | 2026-01-27T01:13:53.674Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
result = Ok(())
|
| 1364 | 2026-01-27T01:13:53.676Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = inventory_collection
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 1365 | 2026-01-27T01:13:53.683Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Modify
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = inventory_collection
resource = Inventory
result = Ok(())
|
| 1366 | 2026-01-27T01:13:53.683Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = inventory_collection
resource = Database
|
| 1367 | 2026-01-27T01:13:53.683Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = inventory_collection
roles = RoleSet { roles: {} }
|
| 1368 | 2026-01-27T01:13:53.684Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = inventory_collection
resource = Database
result = Ok(())
|
| 1369 | 2026-01-27T01:13:53.685Z | DEBG | test_vpcs (init_with_steps): Running step configure_boundary_ntp
|
| 1370 | 2026-01-27T01:13:53.685Z | DEBG | test_vpcs (init_with_steps): Running step start_crucible_pantry
|
| 1371 | 2026-01-27T01:13:53.688Z | DEBG | test_vpcs (dropshot): registered endpoint
kind = pantry
local_addr = [::1]:35761
method = GET
path = /crucible/pantry/0
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
| 1372 | 2026-01-27T01:13:53.688Z | DEBG | test_vpcs (dropshot): registered endpoint
kind = pantry
local_addr = [::1]:35761
method = GET
path = /crucible/pantry/0/job/{id}/is-finished
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
| 1373 | 2026-01-27T01:13:53.688Z | DEBG | test_vpcs (dropshot): registered endpoint
kind = pantry
local_addr = [::1]:35761
method = GET
path = /crucible/pantry/0/job/{id}/ok
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
| 1374 | 2026-01-27T01:13:53.688Z | DEBG | test_vpcs (dropshot): registered endpoint
kind = pantry
local_addr = [::1]:35761
method = DELETE
path = /crucible/pantry/0/volume/{id}
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
| 1375 | 2026-01-27T01:13:53.688Z | DEBG | test_vpcs (dropshot): registered endpoint
kind = pantry
local_addr = [::1]:35761
method = GET
path = /crucible/pantry/0/volume/{id}
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
| 1376 | 2026-01-27T01:13:53.688Z | DEBG | test_vpcs (dropshot): registered endpoint
kind = pantry
local_addr = [::1]:35761
method = POST
path = /crucible/pantry/0/volume/{id}
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
| 1377 | 2026-01-27T01:13:53.688Z | DEBG | test_vpcs (dropshot): registered endpoint
kind = pantry
local_addr = [::1]:35761
method = POST
path = /crucible/pantry/0/volume/{id}/background
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
| 1378 | 2026-01-27T01:13:53.689Z | DEBG | test_vpcs (dropshot): registered endpoint
kind = pantry
local_addr = [::1]:35761
method = POST
path = /crucible/pantry/0/volume/{id}/bulk-write
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
| 1379 | 2026-01-27T01:13:53.689Z | DEBG | test_vpcs (dropshot): registered endpoint
kind = pantry
local_addr = [::1]:35761
method = POST
path = /crucible/pantry/0/volume/{id}/import-from-url
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
| 1380 | 2026-01-27T01:13:53.689Z | DEBG | test_vpcs (dropshot): registered endpoint
kind = pantry
local_addr = [::1]:35761
method = POST
path = /crucible/pantry/0/volume/{id}/scrub
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
| 1381 | 2026-01-27T01:13:53.689Z | DEBG | test_vpcs (dropshot): registered endpoint
kind = pantry
local_addr = [::1]:35761
method = POST
path = /crucible/pantry/0/volume/{id}/snapshot
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
| 1382 | 2026-01-27T01:13:53.689Z | INFO | test_vpcs (dropshot): listening
kind = pantry
local_addr = [::1]:35761
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
| 1383 | 2026-01-27T01:13:53.690Z | DEBG | test_vpcs (dropshot): successfully registered DTrace USDT probes
kind = pantry
local_addr = [::1]:35761
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
| 1384 | 2026-01-27T01:13:53.690Z | INFO | test_vpcs (omicron_sled_agent::sim::Server): Started Simulated Crucible Pantry
address = [::1]:35761
kind = pantry
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
| 1385 | 2026-01-27T01:13:53.690Z | DEBG | test_vpcs (init_with_steps): Running step populate_internal_dns
|
| 1386 | 2026-01-27T01:13:53.690Z | DEBG | test_vpcs: Populating Internal DNS
|
| 1387 | 2026-01-27T01:13:53.761Z | INFO | test_vpcs: DNS population: DnsConfigParams {
generation: Generation(
1,
),
serial: 1,
time_created: 2026-01-27T01:13:53.760606460Z,
zones: [
DnsConfigZone {
zone_name: "control-plane.oxide.internal",
records: {
"@": [
Ns(
"ns1.control-plane.oxide.internal",
),
],
"_nexus._tcp": [
Srv(
Srv {
prio: 0,
weight: 0,
port: 46983,
target: "913233fe-92a8-4635-9572-183f495429c4.host.control-plane.oxide.internal",
},
),
],
"b6d65341-167c-41df-9b5c-41cded99c229.sled": [
Aaaa(
::1,
),
],
"13c52f51-e716-421b-8ceb-7f8d0fb2e5a3.host": [
Aaaa(
::1,
),
],
"_crucible-pantry._tcp": [
Srv(
Srv {
prio: 0,
weight: 0,
port: 35761,
target: "e28e8b52-f93c-4d17-8434-be542f08e849.host.control-plane.oxide.internal",
},
),
],
"_boundary-ntp._tcp": [
Srv(
Srv {
prio: 0,
weight: 0,
port: 123,
target: "dfa9197a-b8e0-4f4b-99de-5076da34c291.host.control-plane.oxide.internal",
},
),
],
"_cockroach._tcp": [
Srv(
Srv {
prio: 0,
weight: 0,
port: 42398,
target: "13c52f51-e716-421b-8ceb-7f8d0fb2e5a3.host.control-plane.oxide.internal",
},
),
],
"_external-dns._tcp": [
Srv(
Srv {
prio: 0,
weight: 0,
port: 53796,
target: "326b5e01-f8e6-4763-80e1-2d51b531f7e2.host.control-plane.oxide.internal",
},
),
],
"_repo-depot._tcp": [
Srv(
Srv {
prio: 0,
weight: 0,
port: 50229,
target: "b6d65341-167c-41df-9b5c-41cded99c229.sled.control-plane.oxide.internal",
},
),
],
"_nexus-lockstep._tcp": [
Srv(
Srv {
prio: 0,
weight: 0,
port: 47722,
target: "913233fe-92a8-4635-9572-183f495429c4.host.control-plane.oxide.internal",
},
),
],
"_clickhouse._tcp": [
Srv(
Srv {
prio: 0,
weight: 0,
port: 58655,
target: "529b6453-5266-46d6-bff2-204bfd885e0e.host.control-plane.oxide.internal",
},
),
],
"boundary-ntp": [
Aaaa(
::1,
),
],
"529b6453-5266-46d6-bff2-204bfd885e0e.host": [
Aaaa(
::1,
),
],
"913233fe-92a8-4635-9572-183f495429c4.host": [
Aaaa(
::ffff:127.0.0.1,
),
],
"dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host": [
Aaaa(
::1,
),
],
"_clickhouse-native._tcp": [
Srv(
Srv {
prio: 0,
weight: 0,
port: 9000,
target: "529b6453-5266-46d6-bff2-204bfd885e0e.host.control-plane.oxide.internal",
},
),
],
"_nameservice._tcp": [
Srv(
Srv {
prio: 0,
weight: 0,
port: 65457,
target: "fb7e8b12-2b9b-4970-85ca-299c62844890.host.control-plane.oxide.internal",
},
),
],
"_oximeter-reader._tcp": [
Srv(
Srv {
prio: 0,
weight: 0,
port: 9000,
target: "529b6453-5266-46d6-bff2-204bfd885e0e.host.control-plane.oxide.internal",
},
),
],
"_mgs._tcp": [
Srv(
Srv {
prio: 0,
weight: 0,
port: 52572,
target: "dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal",
},
),
],
"_dendrite._tcp": [
Srv(
Srv {
prio: 0,
weight: 0,
port: 53072,
target: "dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal",
},
),
],
"_clickhouse-admin-single-server._tcp": [
Srv(
Srv {
prio: 0,
weight: 0,
port: 8888,
target: "529b6453-5266-46d6-bff2-204bfd885e0e.host.control-plane.oxide.internal",
},
),
],
"fb7e8b12-2b9b-4970-85ca-299c62844890.host": [
Aaaa(
::1,
),
],
"dfa9197a-b8e0-4f4b-99de-5076da34c291.host": [
Aaaa(
::1,
),
],
"e28e8b52-f93c-4d17-8434-be542f08e849.host": [
Aaaa(
::1,
),
],
"ns1": [
Aaaa(
::1,
),
],
"_mgd._tcp": [
Srv(
Srv {
prio: 0,
weight: 0,
port: 53789,
target: "dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal",
},
),
],
"326b5e01-f8e6-4763-80e1-2d51b531f7e2.host": [
Aaaa(
::1,
),
],
},
},
],
}
|
| 1388 | 2026-01-27T01:13:53.762Z | DEBG | test_vpcs: client request
body = Some(Body)
method = PUT
uri = http://[::1]:65457/config
|
| 1389 | 2026-01-27T01:13:53.768Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = tuf_artifact_replication
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 1390 | 2026-01-27T01:13:53.774Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = tuf_artifact_replication
resource = Fleet
result = Ok(())
|
| 1391 | 2026-01-27T01:13:53.774Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = tuf_artifact_replication
resource = Database
|
| 1392 | 2026-01-27T01:13:53.774Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = tuf_artifact_replication
roles = RoleSet { roles: {} }
|
| 1393 | 2026-01-27T01:13:53.776Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = tuf_artifact_replication
resource = Database
result = Ok(())
|
| 1394 | 2026-01-27T01:13:53.777Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = vpc_route_manager
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 1395 | 2026-01-27T01:13:53.783Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = vpc_route_manager
resource = Fleet
result = Ok(())
|
| 1396 | 2026-01-27T01:13:53.783Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = vpc_route_manager
resource = Database
|
| 1397 | 2026-01-27T01:13:53.783Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = vpc_route_manager
roles = RoleSet { roles: {} }
|
| 1398 | 2026-01-27T01:13:53.784Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = vpc_route_manager
resource = Database
result = Ok(())
|
| 1399 | 2026-01-27T01:13:53.785Z | INFO | test_vpcs (BackgroundTasks): tuf_repo_prune decision
background_task = tuf_repo_pruner
status = TufRepoPrunerDetails { nkeep_recent_releases: 3, nkeep_recent_uploads: 2, repos_keep_target_release: {}, repos_keep_recent_uploads: {}, repo_prune: None, other_repos_eligible_to_prune: {}, warnings: [] }
|
| 1400 | 2026-01-27T01:13:53.785Z | DEBG | test_vpcs (BackgroundTasks): activation complete
background_task = tuf_repo_pruner
elapsed = 993.79267ms
iteration = 2
status = {"nkeep_recent_releases":3,"nkeep_recent_uploads":2,"other_repos_eligible_to_prune":[],"repo_prune":null,"repos_keep_recent_uploads":[],"repos_keep_target_release":[],"status":"enabled","warnings":[]}
|
| 1401 | 2026-01-27T01:13:53.786Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = v2p_manager
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 1402 | 2026-01-27T01:13:53.793Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = v2p_manager
resource = Fleet
result = Ok(())
|
| 1403 | 2026-01-27T01:13:53.793Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = v2p_manager
resource = Database
|
| 1404 | 2026-01-27T01:13:53.793Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = v2p_manager
roles = RoleSet { roles: {} }
|
| 1405 | 2026-01-27T01:13:53.794Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = v2p_manager
resource = Database
result = Ok(())
|
| 1406 | 2026-01-27T01:13:53.796Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = tuf_artifact_replication
resource = Fleet
|
| 1407 | 2026-01-27T01:13:53.797Z | TRAC | test_vpcs (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = tuf_artifact_replication
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 1408 | 2026-01-27T01:13:53.797Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = tuf_artifact_replication
resource = Database
|
| 1409 | 2026-01-27T01:13:53.797Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = tuf_artifact_replication
roles = RoleSet { roles: {} }
|
| 1410 | 2026-01-27T01:13:53.798Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = tuf_artifact_replication
resource = Database
result = Ok(())
|
| 1411 | 2026-01-27T01:13:53.799Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
|
| 1412 | 2026-01-27T01:13:53.799Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {} }
|
| 1413 | 2026-01-27T01:13:53.800Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
result = Ok(())
|
| 1414 | 2026-01-27T01:13:53.802Z | INFO | test_vpcs (http): accepted connection
kind = dns
local_addr = [::1]:65457
remote_addr = [::1]:42664
|
| 1415 | 2026-01-27T01:13:53.803Z | DEBG | test_vpcs (BackgroundTasks): inventory_prune_one: nothing eligible for removal (too few)
background_task = inventory_collection
candidates = []
|
| 1416 | 2026-01-27T01:13:53.803Z | TRAC | test_vpcs (DnsResolver): lookup_all_socket_v6 srv
dns_name = _mgs._tcp.control-plane.oxide.internal
|
| 1417 | 2026-01-27T01:13:53.810Z | TRAC | test_vpcs (http): incoming request
kind = dns
local_addr = [::1]:65457
method = PUT
remote_addr = [::1]:42664
req_id = 645e1d64-ceb2-40d9-a78a-f98429fd46e1
uri = /config
|
| 1418 | 2026-01-27T01:13:53.810Z | DEBG | test_vpcs (http): determined request API version
kind = dns
local_addr = [::1]:65457
method = PUT
remote_addr = [::1]:42664
req_id = 645e1d64-ceb2-40d9-a78a-f98429fd46e1
uri = /config
version = 2.0.0
|
| 1419 | 2026-01-27T01:13:53.812Z | TRAC | test_vpcs (dns): buffer
buffer = Length: 67 (0x43) bytes\n0000: da 0a 01 00 00 01 00 00 00 00 00 01 04 5f 6d 67 ............._mg\n0010: 73 04 5f 74 63 70 0d 63 6f 6e 74 72 6f 6c 2d 70 s._tcp.control-p\n0020: 6c 61 6e 65 05 6f 78 69 64 65 08 69 6e 74 65 72 lane.oxide.inter\n0030: 6e 61 6c 00 00 21 00 01 00 00 29 04 d0 00 00 00 nal..!....).....\n0040: 00 00 00 ...
kind = dns
peer_addr = [::1]:19753
req_id = 9c4c8b58-1cd7-4f63-8e24-17441805d307
|
| 1420 | 2026-01-27T01:13:53.812Z | DEBG | test_vpcs (dns): message_request
kind = dns
mr = MessageRequest {\n header: Header {\n id: 55818,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n queries: Queries {\n queries: [\n LowerQuery {\n name: LowerName(\n Name("_mgs._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_mgs._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n ],\n original: [\n 4,\n 95,\n 109,\n 103,\n 115,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n flags: EdnsFlags {\n dnssec_ok: false,\n z: 0,\n },\n max_payload: 1232,\n options: OPT {\n options: [],\n },\n },\n ),\n}
peer_addr = [::1]:19753
req_id = 9c4c8b58-1cd7-4f63-8e24-17441805d307
|
| 1421 | 2026-01-27T01:13:53.813Z | ERRO | test_vpcs (dns): failed to handle incoming DNS message: MessageRequest {
header: Header {
id: 55818,
message_type: Query,
op_code: Query,
authoritative: false,
truncation: false,
recursion_desired: true,
recursion_available: false,
authentic_data: false,
checking_disabled: false,
response_code: NoError,
query_count: 1,
answer_count: 0,
name_server_count: 0,
additional_count: 1,
},
queries: Queries {
queries: [
LowerQuery {
name: LowerName(
Name("_mgs._tcp.control-plane.oxide.internal."),
),
original: Query {
name: Name("_mgs._tcp.control-plane.oxide.internal."),
query_type: SRV,
query_class: IN,
},
},
],
original: [
4,
95,
109,
103,
115,
4,
95,
116,
99,
112,
13,
99,
111,
110,
116,
114,
111,
108,
45,
112,
108,
97,
110,
101,
5,
111,
120,
105,
100,
101,
8,
105,
110,
116,
101,
114,
110,
97,
108,
0,
0,
33,
0,
1,
],
},
answers: [],
name_servers: [],
additionals: [],
sig0: [],
edns: Some(
Edns {
rcode_high: 0,
version: 0,
flags: EdnsFlags {
dnssec_ok: false,
z: 0,
},
max_payload: 1232,
options: OPT {
options: [],
},
},
),
} SERVFAIL: server is not authoritative for name: "_mgs._tcp.control-plane.oxide.internal."
kind = dns
peer_addr = [::1]:19753
req_id = 9c4c8b58-1cd7-4f63-8e24-17441805d307
|
| 1422 | 2026-01-27T01:13:53.814Z | INFO | test_vpcs (store): attempting generation update
new_generation = 1
req_id = 645e1d64-ceb2-40d9-a78a-f98429fd46e1
|
| 1423 | 2026-01-27T01:13:53.814Z | INFO | test_vpcs (store): pruning trees for generations newer than 0
|
| 1424 | 2026-01-27T01:13:53.814Z | DEBG | test_vpcs (store): creating tree
tree_name = generation_1_zone_control-plane.oxide.internal
|
| 1425 | 2026-01-27T01:13:53.815Z | DEBG | test_vpcs (store): updating current config
|
| 1426 | 2026-01-27T01:13:53.816Z | DEBG | test_vpcs (store): flushing default tree
|
| 1427 | 2026-01-27T01:13:53.818Z | INFO | test_vpcs (store): pruning trees for generations older than 1
keep = 3
|
| 1428 | 2026-01-27T01:13:53.818Z | INFO | test_vpcs (store): updated generation
new_generation = 1
req_id = 645e1d64-ceb2-40d9-a78a-f98429fd46e1
|
| 1429 | 2026-01-27T01:13:53.818Z | INFO | test_vpcs (http): request completed
kind = dns
latency_us = 8143
local_addr = [::1]:65457
method = PUT
remote_addr = [::1]:42664
req_id = 645e1d64-ceb2-40d9-a78a-f98429fd46e1
response_code = 204
uri = /config
|
| 1430 | 2026-01-27T01:13:53.821Z | WARN | test_vpcs (BackgroundTasks): inventory collection failed
background_task = inventory_collection
error = failed to collect inventory: looking up MGS addresses: proto error: no records found for Query { name: Name("_mgs._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN }
|
| 1431 | 2026-01-27T01:13:53.826Z | DEBG | test_vpcs (BackgroundTasks): activation complete
background_task = inventory_collection
elapsed = 192.120027ms
iteration = 2
status = {"error":"failed to collect inventory: looking up MGS addresses: proto error: no records found for Query { name: Name(\\"_mgs._tcp.control-plane.oxide.internal.\\"), query_type: SRV, query_class: IN }"}
|
| 1432 | 2026-01-27T01:13:53.826Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = tuf_artifact_replication
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 1433 | 2026-01-27T01:13:53.835Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = tuf_artifact_replication
resource = Fleet
result = Ok(())
|
| 1434 | 2026-01-27T01:13:53.835Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = tuf_artifact_replication
resource = Database
|
| 1435 | 2026-01-27T01:13:53.835Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = tuf_artifact_replication
roles = RoleSet { roles: {} }
|
| 1436 | 2026-01-27T01:13:53.836Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = tuf_artifact_replication
resource = Database
result = Ok(())
|
| 1437 | 2026-01-27T01:13:53.837Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
|
| 1438 | 2026-01-27T01:13:53.837Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {} }
|
| 1439 | 2026-01-27T01:13:53.838Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
result = Ok(())
|
| 1440 | 2026-01-27T01:13:53.840Z | DEBG | test_vpcs: client response
result = Ok(Response { url: "http://[::1]:65457/config", status: 204, headers: {"x-request-id": "645e1d64-ceb2-40d9-a78a-f98429fd46e1", "date": "Tue, 27 Jan 2026 01:13:53 GMT"} })
|
| 1441 | 2026-01-27T01:13:53.841Z | DEBG | test_vpcs (init_with_steps): Running step configure_sled_agents
|
| 1442 | 2026-01-27T01:13:53.934Z | DEBG | test_vpcs: client request
body = Some(Body)
method = PUT
uri = http://[::1]:59842/omicron-config
|
| 1443 | 2026-01-27T01:13:53.936Z | DEBG | test_vpcs (BackgroundTasks): activation complete
background_task = tuf_artifact_replication
elapsed = 2.299919051s
iteration = 1
status = {"generation":1,"last_run_counters":{"copy_err":0,"copy_ok":0,"list_err":0,"list_ok":0,"put_config_err":0,"put_config_ok":0,"put_err":0,"put_ok":0},"lifetime_counters":{"copy_err":0,"copy_ok":0,"list_err":0,"list_ok":0,"put_config_err":0,"put_config_ok":0,"put_err":0,"put_ok":0},"local_repos":0,"request_debug_ringbuf":[]}
|
| 1444 | 2026-01-27T01:13:53.936Z | INFO | test_vpcs (dropshot): accepted connection
local_addr = [::1]:59842
remote_addr = [::1]:32848
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
| 1445 | 2026-01-27T01:13:53.937Z | TRAC | test_vpcs (dropshot): incoming request
local_addr = [::1]:59842
method = PUT
remote_addr = [::1]:32848
req_id = 95dc101b-8f32-44bf-ac8c-03291e448d2c
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
uri = /omicron-config
|
| 1446 | 2026-01-27T01:13:53.937Z | DEBG | test_vpcs (dropshot): determined request API version
local_addr = [::1]:59842
method = PUT
remote_addr = [::1]:32848
req_id = 95dc101b-8f32-44bf-ac8c-03291e448d2c
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
uri = /omicron-config
version = 15.0.0
|
| 1447 | 2026-01-27T01:13:53.947Z | INFO | test_vpcs (dropshot): request completed
latency_us = 9717
local_addr = [::1]:59842
method = PUT
remote_addr = [::1]:32848
req_id = 95dc101b-8f32-44bf-ac8c-03291e448d2c
response_code = 204
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
uri = /omicron-config
|
| 1448 | 2026-01-27T01:13:53.947Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
|
| 1449 | 2026-01-27T01:13:53.947Z | TRAC | test_vpcs (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = service_firewall_rule_propagation
resource_id = 001de000-4401-4000-8000-000000000000
resource_type = Project
|
| 1450 | 2026-01-27T01:13:53.947Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
|
| 1451 | 2026-01-27T01:13:53.947Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {} }
|
| 1452 | 2026-01-27T01:13:53.950Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
result = Ok(())
|
| 1453 | 2026-01-27T01:13:53.952Z | DEBG | test_vpcs: client response
result = Ok(Response { url: "http://[::1]:59842/omicron-config", status: 204, headers: {"x-request-id": "95dc101b-8f32-44bf-ac8c-03291e448d2c", "date": "Tue, 27 Jan 2026 01:13:53 GMT"} })
|
| 1454 | 2026-01-27T01:13:53.952Z | DEBG | test_vpcs: client request
body = Some(Body)
method = PUT
uri = http://[::1]:59842/network-bootstore-config
|
| 1455 | 2026-01-27T01:13:53.953Z | TRAC | test_vpcs (dropshot): incoming request
local_addr = [::1]:59842
method = PUT
remote_addr = [::1]:32848
req_id = 57871bbb-2766-45fc-bd68-01de70742093
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
uri = /network-bootstore-config
|
| 1456 | 2026-01-27T01:13:53.953Z | DEBG | test_vpcs (dropshot): determined request API version
local_addr = [::1]:59842
method = PUT
remote_addr = [::1]:32848
req_id = 57871bbb-2766-45fc-bd68-01de70742093
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
uri = /network-bootstore-config
version = 15.0.0
|
| 1457 | 2026-01-27T01:13:53.954Z | INFO | test_vpcs (dropshot): request completed
latency_us = 948
local_addr = [::1]:59842
method = PUT
remote_addr = [::1]:32848
req_id = 57871bbb-2766-45fc-bd68-01de70742093
response_code = 204
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
uri = /network-bootstore-config
|
| 1458 | 2026-01-27T01:13:53.954Z | DEBG | test_vpcs: client response
result = Ok(Response { url: "http://[::1]:59842/network-bootstore-config", status: 204, headers: {"x-request-id": "57871bbb-2766-45fc-bd68-01de70742093", "date": "Tue, 27 Jan 2026 01:13:53 GMT"} })
|
| 1459 | 2026-01-27T01:13:53.956Z | DEBG | test_vpcs (init_with_steps): Running step start_nexus_external
|
| 1460 | 2026-01-27T01:13:53.956Z | DEBG | test_vpcs: Starting Nexus (external API)
|
| 1461 | 2026-01-27T01:13:57.138Z | TRAC | test_vpcs (InternalApi): authorize begin
action = Modify
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Fleet
|
| 1462 | 2026-01-27T01:13:57.138Z | TRAC | test_vpcs (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 1463 | 2026-01-27T01:13:57.138Z | TRAC | test_vpcs (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 1464 | 2026-01-27T01:13:57.138Z | DEBG | test_vpcs (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 1465 | 2026-01-27T01:13:57.140Z | DEBG | test_vpcs (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 1466 | 2026-01-27T01:13:57.143Z | TRAC | test_vpcs (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = service_firewall_rule_propagation
resource_id = 001de000-5110-4000-8000-000000000001
resource_type = Silo
|
| 1467 | 2026-01-27T01:13:57.143Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
|
| 1468 | 2026-01-27T01:13:57.143Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {} }
|
| 1469 | 2026-01-27T01:13:57.144Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
result = Ok(())
|
| 1470 | 2026-01-27T01:13:57.369Z | DEBG | test_vpcs (BackgroundTasks): client request
SledAgent = b6d65341-167c-41df-9b5c-41cded99c229
background_task = v2p_manager
body = None
method = GET
uri = http://[::1]:59842/v2p
|
| 1471 | 2026-01-27T01:13:57.448Z | INFO | test_vpcs (BackgroundTasks): VPC route manager sled b6d65341-167c-41df-9b5c-41cded99c229
background_task = vpc_route_manager
|
| 1472 | 2026-01-27T01:13:57.449Z | DEBG | test_vpcs (BackgroundTasks): client request
SledAgent = b6d65341-167c-41df-9b5c-41cded99c229
background_task = vpc_route_manager
body = None
method = GET
uri = http://[::1]:59842/vpc-routes
|
| 1473 | 2026-01-27T01:13:57.454Z | INFO | test_vpcs (dropshot): accepted connection
local_addr = [::1]:59842
remote_addr = [::1]:40850
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
| 1474 | 2026-01-27T01:13:57.455Z | INFO | test_vpcs (dropshot): accepted connection
local_addr = [::1]:59842
remote_addr = [::1]:59031
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
| 1475 | 2026-01-27T01:13:57.456Z | DEBG | test_vpcs (BackgroundTasks): activating
background_task = reconfigurator_config_watcher
iteration = 2
reason = Timeout
|
| 1476 | 2026-01-27T01:13:57.456Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = reconfigurator_config_watcher
resource = BlueprintConfig
|
| 1477 | 2026-01-27T01:13:57.456Z | TRAC | test_vpcs (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = reconfigurator_config_watcher
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 1478 | 2026-01-27T01:13:57.456Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = reconfigurator_config_watcher
resource = Database
|
| 1479 | 2026-01-27T01:13:57.456Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = reconfigurator_config_watcher
roles = RoleSet { roles: {} }
|
| 1480 | 2026-01-27T01:13:57.457Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = reconfigurator_config_watcher
resource = Database
result = Ok(())
|
| 1481 | 2026-01-27T01:13:57.459Z | TRAC | test_vpcs (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = service_firewall_rule_propagation
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 1482 | 2026-01-27T01:13:57.460Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
|
| 1483 | 2026-01-27T01:13:57.460Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {} }
|
| 1484 | 2026-01-27T01:13:57.460Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
result = Ok(())
|
| 1485 | 2026-01-27T01:13:57.468Z | TRAC | test_vpcs (dropshot): incoming request
local_addr = [::1]:59842
method = GET
remote_addr = [::1]:40850
req_id = 6aee9cc5-7980-459f-aa01-f3eaa1bda9e4
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
uri = /v2p
|
| 1486 | 2026-01-27T01:13:57.468Z | DEBG | test_vpcs (dropshot): determined request API version
local_addr = [::1]:59842
method = GET
remote_addr = [::1]:40850
req_id = 6aee9cc5-7980-459f-aa01-f3eaa1bda9e4
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
uri = /v2p
version = 15.0.0
|
| 1487 | 2026-01-27T01:13:57.468Z | TRAC | test_vpcs (dropshot): incoming request
local_addr = [::1]:59842
method = GET
remote_addr = [::1]:59031
req_id = 6f7db099-75cd-4358-b0b8-26368cb77819
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
uri = /vpc-routes
|
| 1488 | 2026-01-27T01:13:57.468Z | DEBG | test_vpcs (dropshot): determined request API version
local_addr = [::1]:59842
method = GET
remote_addr = [::1]:59031
req_id = 6f7db099-75cd-4358-b0b8-26368cb77819
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
uri = /vpc-routes
version = 15.0.0
|
| 1489 | 2026-01-27T01:13:57.469Z | INFO | test_vpcs (dropshot): request completed
latency_us = 1094
local_addr = [::1]:59842
method = GET
remote_addr = [::1]:40850
req_id = 6aee9cc5-7980-459f-aa01-f3eaa1bda9e4
response_code = 200
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
uri = /v2p
|
| 1490 | 2026-01-27T01:13:57.469Z | INFO | test_vpcs (dropshot): request completed
latency_us = 927
local_addr = [::1]:59842
method = GET
remote_addr = [::1]:59031
req_id = 6f7db099-75cd-4358-b0b8-26368cb77819
response_code = 200
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
uri = /vpc-routes
|
| 1491 | 2026-01-27T01:13:57.470Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = reconfigurator_config_watcher
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 1492 | 2026-01-27T01:13:57.487Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = reconfigurator_config_watcher
resource = BlueprintConfig
result = Ok(())
|
| 1493 | 2026-01-27T01:13:57.487Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = reconfigurator_config_watcher
resource = Database
|
| 1494 | 2026-01-27T01:13:57.487Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = reconfigurator_config_watcher
roles = RoleSet { roles: {} }
|
| 1495 | 2026-01-27T01:13:57.488Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = reconfigurator_config_watcher
resource = Database
result = Ok(())
|
| 1496 | 2026-01-27T01:13:57.490Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 1497 | 2026-01-27T01:13:57.504Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
result = Ok(())
|
| 1498 | 2026-01-27T01:13:57.504Z | TRAC | test_vpcs (BackgroundTasks): successful lookup of siloed resource "Vpc" using built-in user
background_task = service_firewall_rule_propagation
|
| 1499 | 2026-01-27T01:13:57.504Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
|
| 1500 | 2026-01-27T01:13:57.504Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {} }
|
| 1501 | 2026-01-27T01:13:57.506Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
result = Ok(())
|
| 1502 | 2026-01-27T01:13:57.515Z | DEBG | test_vpcs (BackgroundTasks): reconfigurator config load complete
background_task = reconfigurator_config_watcher
switches = Loaded(ReconfiguratorConfigView { version: 1, config: ReconfiguratorConfig { planner_enabled: false, planner_config: PlannerConfig { add_zones_with_mupdate_override: false }, tuf_repo_pruner_enabled: true }, time_modified: 2026-01-27T01:13:51.285464Z })
|
| 1503 | 2026-01-27T01:13:57.515Z | DEBG | test_vpcs (BackgroundTasks): activation complete
background_task = reconfigurator_config_watcher
elapsed = 59.127719ms
iteration = 2
status = {"config_updated":false}
|
| 1504 | 2026-01-27T01:13:57.515Z | DEBG | test_vpcs (InternalApi): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 1505 | 2026-01-27T01:13:57.519Z | DEBG | test_vpcs (InternalApi): authorize result
action = Modify
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Fleet
result = Ok(())
|
| 1506 | 2026-01-27T01:13:57.519Z | TRAC | test_vpcs (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 1507 | 2026-01-27T01:13:57.519Z | DEBG | test_vpcs (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 1508 | 2026-01-27T01:13:57.520Z | DEBG | test_vpcs (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 1509 | 2026-01-27T01:13:57.523Z | DEBG | test_vpcs (BackgroundTasks): client response
SledAgent = b6d65341-167c-41df-9b5c-41cded99c229
background_task = v2p_manager
result = Ok(Response { url: "http://[::1]:59842/v2p", status: 200, headers: {"content-type": "application/json", "x-request-id": "6aee9cc5-7980-459f-aa01-f3eaa1bda9e4", "content-length": "2", "date": "Tue, 27 Jan 2026 01:13:57 GMT"} })
|
| 1510 | 2026-01-27T01:13:57.523Z | INFO | test_vpcs (BackgroundTasks): found opte v2p mappings
background_task = v2p_manager
interfaces = {}
sled = SimGimlet00
|
| 1511 | 2026-01-27T01:13:57.523Z | INFO | test_vpcs (BackgroundTasks): v2p mappings to delete
background_task = v2p_manager
mappings = []
sled = SimGimlet00
|
| 1512 | 2026-01-27T01:13:57.523Z | INFO | test_vpcs (BackgroundTasks): v2p mappings to add
background_task = v2p_manager
mappings = []
sled = SimGimlet00
|
| 1513 | 2026-01-27T01:13:57.525Z | DEBG | test_vpcs (BackgroundTasks): activation complete
background_task = v2p_manager
elapsed = 6.025222663s
iteration = 1
status = {}
|
| 1514 | 2026-01-27T01:13:57.525Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
|
| 1515 | 2026-01-27T01:13:57.525Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {} }
|
| 1516 | 2026-01-27T01:13:57.526Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
result = Ok(())
|
| 1517 | 2026-01-27T01:13:57.527Z | DEBG | test_vpcs (BackgroundTasks): client response
SledAgent = b6d65341-167c-41df-9b5c-41cded99c229
background_task = vpc_route_manager
result = Ok(Response { url: "http://[::1]:59842/vpc-routes", status: 200, headers: {"content-type": "application/json", "x-request-id": "6f7db099-75cd-4358-b0b8-26368cb77819", "content-length": "2", "date": "Tue, 27 Jan 2026 01:13:57 GMT"} })
|
| 1518 | 2026-01-27T01:13:57.527Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = vpc_route_manager
resource = Database
|
| 1519 | 2026-01-27T01:13:57.527Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = vpc_route_manager
roles = RoleSet { roles: {} }
|
| 1520 | 2026-01-27T01:13:57.528Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = vpc_route_manager
resource = Database
result = Ok(())
|
| 1521 | 2026-01-27T01:13:57.539Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
|
| 1522 | 2026-01-27T01:13:57.539Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {} }
|
| 1523 | 2026-01-27T01:13:57.540Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
result = Ok(())
|
| 1524 | 2026-01-27T01:13:57.552Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
|
| 1525 | 2026-01-27T01:13:57.552Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {} }
|
| 1526 | 2026-01-27T01:13:57.553Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
result = Ok(())
|
| 1527 | 2026-01-27T01:13:57.564Z | TRAC | test_vpcs (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 1528 | 2026-01-27T01:13:57.564Z | DEBG | test_vpcs (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 1529 | 2026-01-27T01:13:57.566Z | DEBG | test_vpcs (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 1530 | 2026-01-27T01:13:57.603Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000001, lookup_type: ByName("external-dns") }
|
| 1531 | 2026-01-27T01:13:57.603Z | TRAC | test_vpcs (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = service_firewall_rule_propagation
resource_id = 001de000-4401-4000-8000-000000000000
resource_type = Project
|
| 1532 | 2026-01-27T01:13:57.603Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
|
| 1533 | 2026-01-27T01:13:57.604Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {} }
|
| 1534 | 2026-01-27T01:13:57.604Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
result = Ok(())
|
| 1535 | 2026-01-27T01:13:57.609Z | TRAC | test_vpcs (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = service_firewall_rule_propagation
resource_id = 001de000-5110-4000-8000-000000000001
resource_type = Silo
|
| 1536 | 2026-01-27T01:13:57.609Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
|
| 1537 | 2026-01-27T01:13:57.609Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {} }
|
| 1538 | 2026-01-27T01:13:57.611Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
result = Ok(())
|
| 1539 | 2026-01-27T01:13:57.634Z | INFO | test_vpcs (InternalApi): set cockroachdb setting
setting = cluster.preserve_downgrade_option
value = 22.1
|
| 1540 | 2026-01-27T01:13:57.634Z | TRAC | test_vpcs (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 1541 | 2026-01-27T01:13:57.635Z | DEBG | test_vpcs (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 1542 | 2026-01-27T01:13:57.636Z | DEBG | test_vpcs (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 1543 | 2026-01-27T01:13:57.638Z | TRAC | test_vpcs (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = service_firewall_rule_propagation
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 1544 | 2026-01-27T01:13:57.638Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
|
| 1545 | 2026-01-27T01:13:57.638Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {} }
|
| 1546 | 2026-01-27T01:13:57.639Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
result = Ok(())
|
| 1547 | 2026-01-27T01:13:57.659Z | INFO | test_vpcs (BackgroundTasks): computed internet gateway mappings for sled
assocs = {}
background_task = vpc_route_manager
sled = SimGimlet00
|
| 1548 | 2026-01-27T01:13:57.659Z | DEBG | test_vpcs (BackgroundTasks): client request
SledAgent = b6d65341-167c-41df-9b5c-41cded99c229
background_task = vpc_route_manager
body = Some(Body)
method = PUT
uri = http://[::1]:59842/eip-gateways
|
| 1549 | 2026-01-27T01:13:57.660Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 1550 | 2026-01-27T01:13:57.673Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000001, lookup_type: ByName("external-dns") }
result = Ok(())
|
| 1551 | 2026-01-27T01:13:57.686Z | TRAC | test_vpcs (BackgroundTasks): successful lookup of siloed resource "VpcSubnet" using built-in user
background_task = service_firewall_rule_propagation
|
| 1552 | 2026-01-27T01:13:57.686Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000001, lookup_type: ByName("external-dns") }
|
| 1553 | 2026-01-27T01:13:57.686Z | TRAC | test_vpcs (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = service_firewall_rule_propagation
resource_id = 001de000-4401-4000-8000-000000000000
resource_type = Project
|
| 1554 | 2026-01-27T01:13:57.686Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
|
| 1555 | 2026-01-27T01:13:57.686Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {} }
|
| 1556 | 2026-01-27T01:13:57.688Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
result = Ok(())
|
| 1557 | 2026-01-27T01:13:57.690Z | TRAC | test_vpcs (InternalApi): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Rack { parent: Fleet, key: c19a698f-c6f9-4a17-ae30-20d711b8f7dc, lookup_type: ById(c19a698f-c6f9-4a17-ae30-20d711b8f7dc) }
|
| 1558 | 2026-01-27T01:13:57.690Z | TRAC | test_vpcs (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 1559 | 2026-01-27T01:13:57.690Z | TRAC | test_vpcs (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 1560 | 2026-01-27T01:13:57.690Z | DEBG | test_vpcs (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 1561 | 2026-01-27T01:13:57.692Z | DEBG | test_vpcs (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 1562 | 2026-01-27T01:13:57.694Z | TRAC | test_vpcs (dropshot): incoming request
local_addr = [::1]:59842
method = PUT
remote_addr = [::1]:59031
req_id = 66955112-5b69-43ca-96b5-a5670f2dc3ee
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
uri = /eip-gateways
|
| 1563 | 2026-01-27T01:13:57.694Z | DEBG | test_vpcs (dropshot): determined request API version
local_addr = [::1]:59842
method = PUT
remote_addr = [::1]:59031
req_id = 66955112-5b69-43ca-96b5-a5670f2dc3ee
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
uri = /eip-gateways
version = 15.0.0
|
| 1564 | 2026-01-27T01:13:57.702Z | INFO | test_vpcs (dropshot): request completed
latency_us = 7989
local_addr = [::1]:59842
method = PUT
remote_addr = [::1]:59031
req_id = 66955112-5b69-43ca-96b5-a5670f2dc3ee
response_code = 204
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
uri = /eip-gateways
|
| 1565 | 2026-01-27T01:13:57.704Z | DEBG | test_vpcs (BackgroundTasks): client response
SledAgent = b6d65341-167c-41df-9b5c-41cded99c229
background_task = vpc_route_manager
result = Ok(Response { url: "http://[::1]:59842/eip-gateways", status: 204, headers: {"x-request-id": "66955112-5b69-43ca-96b5-a5670f2dc3ee", "date": "Tue, 27 Jan 2026 01:13:57 GMT"} })
|
| 1566 | 2026-01-27T01:13:57.710Z | DEBG | test_vpcs (BackgroundTasks): activation complete
background_task = vpc_route_manager
elapsed = 4.103761058s
iteration = 2
status = {}
|
| 1567 | 2026-01-27T01:13:57.710Z | TRAC | test_vpcs (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = service_firewall_rule_propagation
resource_id = 001de000-5110-4000-8000-000000000001
resource_type = Silo
|
| 1568 | 2026-01-27T01:13:57.710Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
|
| 1569 | 2026-01-27T01:13:57.710Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {} }
|
| 1570 | 2026-01-27T01:13:57.712Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
result = Ok(())
|
| 1571 | 2026-01-27T01:13:57.723Z | DEBG | test_vpcs (InternalApi): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 1572 | 2026-01-27T01:13:57.731Z | DEBG | test_vpcs (InternalApi): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Rack { parent: Fleet, key: c19a698f-c6f9-4a17-ae30-20d711b8f7dc, lookup_type: ById(c19a698f-c6f9-4a17-ae30-20d711b8f7dc) }
result = Ok(())
|
| 1573 | 2026-01-27T01:13:57.731Z | DEBG | test_vpcs (InternalApi): updating rack subnet for rack c19a698f-c6f9-4a17-ae30-20d711b8f7dc to Some(
V6(
Ipv6Network {
addr: fd00:1122:3344:100::,
prefix: 56,
},
),
)
|
| 1574 | 2026-01-27T01:13:57.731Z | TRAC | test_vpcs (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 1575 | 2026-01-27T01:13:57.731Z | DEBG | test_vpcs (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 1576 | 2026-01-27T01:13:57.732Z | DEBG | test_vpcs (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 1577 | 2026-01-27T01:13:57.735Z | TRAC | test_vpcs (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = service_firewall_rule_propagation
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 1578 | 2026-01-27T01:13:57.735Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
|
| 1579 | 2026-01-27T01:13:57.735Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {} }
|
| 1580 | 2026-01-27T01:13:57.736Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
result = Ok(())
|
| 1581 | 2026-01-27T01:13:57.796Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 1582 | 2026-01-27T01:13:57.809Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000001, lookup_type: ByName("external-dns") }
result = Ok(())
|
| 1583 | 2026-01-27T01:13:57.809Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
|
| 1584 | 2026-01-27T01:13:57.809Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {} }
|
| 1585 | 2026-01-27T01:13:57.809Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
result = Ok(())
|
| 1586 | 2026-01-27T01:13:57.821Z | INFO | test_vpcs (InternalApi): Using static configuration for external switchports
|
| 1587 | 2026-01-27T01:13:57.821Z | TRAC | test_vpcs (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 1588 | 2026-01-27T01:13:57.821Z | DEBG | test_vpcs (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 1589 | 2026-01-27T01:13:57.823Z | DEBG | test_vpcs (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 1590 | 2026-01-27T01:13:57.831Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
|
| 1591 | 2026-01-27T01:13:57.831Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {} }
|
| 1592 | 2026-01-27T01:13:57.832Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
result = Ok(())
|
| 1593 | 2026-01-27T01:13:57.841Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
|
| 1594 | 2026-01-27T01:13:57.841Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {} }
|
| 1595 | 2026-01-27T01:13:57.842Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
result = Ok(())
|
| 1596 | 2026-01-27T01:13:57.854Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
|
| 1597 | 2026-01-27T01:13:57.854Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {} }
|
| 1598 | 2026-01-27T01:13:57.856Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
result = Ok(())
|
| 1599 | 2026-01-27T01:13:57.870Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
|
| 1600 | 2026-01-27T01:13:57.870Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {} }
|
| 1601 | 2026-01-27T01:13:57.871Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
result = Ok(())
|
| 1602 | 2026-01-27T01:13:57.877Z | TRAC | test_vpcs (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 1603 | 2026-01-27T01:13:57.877Z | DEBG | test_vpcs (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 1604 | 2026-01-27T01:13:57.878Z | DEBG | test_vpcs (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 1605 | 2026-01-27T01:13:57.878Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000002, lookup_type: ByName("nexus") }
|
| 1606 | 2026-01-27T01:13:57.879Z | TRAC | test_vpcs (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = service_firewall_rule_propagation
resource_id = 001de000-4401-4000-8000-000000000000
resource_type = Project
|
| 1607 | 2026-01-27T01:13:57.879Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
|
| 1608 | 2026-01-27T01:13:57.879Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {} }
|
| 1609 | 2026-01-27T01:13:57.879Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
result = Ok(())
|
| 1610 | 2026-01-27T01:13:57.899Z | TRAC | test_vpcs (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = service_firewall_rule_propagation
resource_id = 001de000-5110-4000-8000-000000000001
resource_type = Silo
|
| 1611 | 2026-01-27T01:13:57.899Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
|
| 1612 | 2026-01-27T01:13:57.899Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {} }
|
| 1613 | 2026-01-27T01:13:57.900Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
result = Ok(())
|
| 1614 | 2026-01-27T01:13:57.904Z | TRAC | test_vpcs (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = service_firewall_rule_propagation
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 1615 | 2026-01-27T01:13:57.904Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
|
| 1616 | 2026-01-27T01:13:57.904Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {} }
|
| 1617 | 2026-01-27T01:13:57.908Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
result = Ok(())
|
| 1618 | 2026-01-27T01:13:57.913Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 1619 | 2026-01-27T01:13:57.928Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000002, lookup_type: ByName("nexus") }
result = Ok(())
|
| 1620 | 2026-01-27T01:13:57.928Z | TRAC | test_vpcs (BackgroundTasks): successful lookup of siloed resource "VpcSubnet" using built-in user
background_task = service_firewall_rule_propagation
|
| 1621 | 2026-01-27T01:13:57.928Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000002, lookup_type: ByName("nexus") }
|
| 1622 | 2026-01-27T01:13:57.929Z | TRAC | test_vpcs (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = service_firewall_rule_propagation
resource_id = 001de000-4401-4000-8000-000000000000
resource_type = Project
|
| 1623 | 2026-01-27T01:13:57.929Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
|
| 1624 | 2026-01-27T01:13:57.929Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {} }
|
| 1625 | 2026-01-27T01:13:57.929Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
result = Ok(())
|
| 1626 | 2026-01-27T01:13:57.931Z | INFO | test_vpcs (InternalApi): Recording Rack Network Configuration
|
| 1627 | 2026-01-27T01:13:57.931Z | TRAC | test_vpcs (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 1628 | 2026-01-27T01:13:57.931Z | DEBG | test_vpcs (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 1629 | 2026-01-27T01:13:57.932Z | DEBG | test_vpcs (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 1630 | 2026-01-27T01:13:57.935Z | TRAC | test_vpcs (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = service_firewall_rule_propagation
resource_id = 001de000-5110-4000-8000-000000000001
resource_type = Silo
|
| 1631 | 2026-01-27T01:13:57.935Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
|
| 1632 | 2026-01-27T01:13:57.935Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {} }
|
| 1633 | 2026-01-27T01:13:57.937Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
result = Ok(())
|
| 1634 | 2026-01-27T01:13:57.943Z | TRAC | test_vpcs (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = service_firewall_rule_propagation
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 1635 | 2026-01-27T01:13:57.943Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
|
| 1636 | 2026-01-27T01:13:57.943Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {} }
|
| 1637 | 2026-01-27T01:13:57.944Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
result = Ok(())
|
| 1638 | 2026-01-27T01:13:57.949Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 1639 | 2026-01-27T01:13:57.961Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000002, lookup_type: ByName("nexus") }
result = Ok(())
|
| 1640 | 2026-01-27T01:13:57.963Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
|
| 1641 | 2026-01-27T01:13:57.963Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {} }
|
| 1642 | 2026-01-27T01:13:57.965Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
result = Ok(())
|
| 1643 | 2026-01-27T01:13:57.997Z | DEBG | test_vpcs (service-firewall-rule-progator): resolved names for firewall rules
background_task = service_firewall_rule_propagation
instance_interfaces = {}
subnet_interfaces = {}
subnet_networks = {Name("external-dns"): [V4(Ipv4Network { addr: 172.30.1.0, prefix: 24 }), V6(Ipv6Network { addr: fd77:e9d2:9cd9:1::, prefix: 64 })], Name("nexus"): [V4(Ipv4Network { addr: 172.30.2.0, prefix: 24 }), V6(Ipv6Network { addr: fd77:e9d2:9cd9:2::, prefix: 64 })]}
vpc_interfaces = {}
|
| 1644 | 2026-01-27T01:13:57.998Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Fleet
|
| 1645 | 2026-01-27T01:13:57.998Z | TRAC | test_vpcs (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = service_firewall_rule_propagation
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 1646 | 2026-01-27T01:13:57.998Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
|
| 1647 | 2026-01-27T01:13:57.999Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {} }
|
| 1648 | 2026-01-27T01:13:57.999Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
result = Ok(())
|
| 1649 | 2026-01-27T01:13:58.007Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 1650 | 2026-01-27T01:13:58.017Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Fleet
result = Ok(())
|
| 1651 | 2026-01-27T01:13:58.017Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
|
| 1652 | 2026-01-27T01:13:58.017Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {} }
|
| 1653 | 2026-01-27T01:13:58.019Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
result = Ok(())
|
| 1654 | 2026-01-27T01:13:58.033Z | TRAC | test_vpcs (service-firewall-rule-progator): fetched allowlist from DB
allowed = AllowList { id: 001de000-a110-4000-8000-000000000000, time_created: 2026-01-26T23:16:37.697587Z, time_modified: 2026-01-26T23:16:37.697587Z, allowed_ips: None }
background_task = service_firewall_rule_propagation
|
| 1655 | 2026-01-27T01:13:58.033Z | DEBG | test_vpcs (service-firewall-rule-progator): Allowlist for user-facing services is set to allow any inbound traffic. Existing VPC firewall rules will not be modified.
background_task = service_firewall_rule_propagation
|
| 1656 | 2026-01-27T01:13:58.033Z | DEBG | test_vpcs (service-firewall-rule-progator): resolved firewall rules for sled agents
background_task = service_firewall_rule_propagation
sled_agent_rules = []
|
| 1657 | 2026-01-27T01:13:58.033Z | DEBG | test_vpcs (service-firewall-rule-progator): resolved 0 rules for sleds
background_task = service_firewall_rule_propagation
|
| 1658 | 2026-01-27T01:13:58.077Z | TRAC | test_vpcs (InternalApi): authorize begin
action = CreateChild
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Fleet
|
| 1659 | 2026-01-27T01:13:58.077Z | TRAC | test_vpcs (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 1660 | 2026-01-27T01:13:58.077Z | TRAC | test_vpcs (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 1661 | 2026-01-27T01:13:58.077Z | DEBG | test_vpcs (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 1662 | 2026-01-27T01:13:58.078Z | DEBG | test_vpcs (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 1663 | 2026-01-27T01:13:58.082Z | DEBG | test_vpcs (InternalApi): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 1664 | 2026-01-27T01:13:58.089Z | DEBG | test_vpcs (InternalApi): authorize result
action = CreateChild
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Fleet
result = Ok(())
|
| 1665 | 2026-01-27T01:13:58.089Z | TRAC | test_vpcs (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 1666 | 2026-01-27T01:13:58.089Z | DEBG | test_vpcs (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 1667 | 2026-01-27T01:13:58.090Z | DEBG | test_vpcs (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 1668 | 2026-01-27T01:13:58.098Z | TRAC | test_vpcs (InternalApi): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = IpPool { parent: Fleet, key: cb3a3b53-75df-46bd-8fd9-9c15d8fc0604, lookup_type: ByName("oxide-service-pool-v4") }
|
| 1669 | 2026-01-27T01:13:58.098Z | TRAC | test_vpcs (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 1670 | 2026-01-27T01:13:58.099Z | TRAC | test_vpcs (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 1671 | 2026-01-27T01:13:58.099Z | DEBG | test_vpcs (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 1672 | 2026-01-27T01:13:58.099Z | DEBG | test_vpcs (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 1673 | 2026-01-27T01:13:58.105Z | DEBG | test_vpcs (InternalApi): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 1674 | 2026-01-27T01:13:58.112Z | DEBG | test_vpcs (InternalApi): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = IpPool { parent: Fleet, key: cb3a3b53-75df-46bd-8fd9-9c15d8fc0604, lookup_type: ByName("oxide-service-pool-v4") }
result = Ok(())
|
| 1675 | 2026-01-27T01:13:58.112Z | TRAC | test_vpcs (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 1676 | 2026-01-27T01:13:58.112Z | DEBG | test_vpcs (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 1677 | 2026-01-27T01:13:58.113Z | DEBG | test_vpcs (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 1678 | 2026-01-27T01:13:58.116Z | TRAC | test_vpcs (InternalApi): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = IpPool { parent: Fleet, key: 867aa474-11ff-4274-bd22-0aea0f5c1c8c, lookup_type: ByName("oxide-service-pool-v6") }
|
| 1679 | 2026-01-27T01:13:58.117Z | TRAC | test_vpcs (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 1680 | 2026-01-27T01:13:58.117Z | TRAC | test_vpcs (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 1681 | 2026-01-27T01:13:58.117Z | DEBG | test_vpcs (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 1682 | 2026-01-27T01:13:58.117Z | DEBG | test_vpcs (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 1683 | 2026-01-27T01:13:58.122Z | DEBG | test_vpcs (InternalApi): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 1684 | 2026-01-27T01:13:58.131Z | DEBG | test_vpcs (InternalApi): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = IpPool { parent: Fleet, key: 867aa474-11ff-4274-bd22-0aea0f5c1c8c, lookup_type: ByName("oxide-service-pool-v6") }
result = Ok(())
|
| 1685 | 2026-01-27T01:13:58.131Z | TRAC | test_vpcs (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 1686 | 2026-01-27T01:13:58.131Z | DEBG | test_vpcs (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 1687 | 2026-01-27T01:13:58.132Z | DEBG | test_vpcs (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 1688 | 2026-01-27T01:13:58.139Z | TRAC | test_vpcs (InternalApi): authorize begin
action = CreateChild
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = IpPool { parent: Fleet, key: 867aa474-11ff-4274-bd22-0aea0f5c1c8c, lookup_type: ByName("oxide-service-pool-v6") }
|
| 1689 | 2026-01-27T01:13:58.139Z | TRAC | test_vpcs (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 1690 | 2026-01-27T01:13:58.139Z | TRAC | test_vpcs (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 1691 | 2026-01-27T01:13:58.139Z | DEBG | test_vpcs (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 1692 | 2026-01-27T01:13:58.140Z | DEBG | test_vpcs (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 1693 | 2026-01-27T01:13:58.187Z | DEBG | test_vpcs (service-firewall-rule-progator): resolved sleds for vpc oxide-services
background_task = service_firewall_rule_propagation
vpc_to_sled = []
|
| 1694 | 2026-01-27T01:13:58.188Z | DEBG | test_vpcs (service-firewall-rule-progator): sending firewall rules to sled agents
background_task = service_firewall_rule_propagation
|
| 1695 | 2026-01-27T01:13:58.188Z | INFO | test_vpcs (service-firewall-rule-progator): updated firewall rules on 0 sleds
background_task = service_firewall_rule_propagation
|
| 1696 | 2026-01-27T01:13:58.188Z | DEBG | test_vpcs (service-firewall-rule-progator): successfully propagated service firewall rules
background_task = service_firewall_rule_propagation
elapsed = 6.576446238s
|
| 1697 | 2026-01-27T01:13:58.188Z | DEBG | test_vpcs (BackgroundTasks): activation complete
background_task = service_firewall_rule_propagation
elapsed = 6.576548077s
iteration = 1
status = {}
|
| 1698 | 2026-01-27T01:13:58.196Z | DEBG | test_vpcs (InternalApi): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 1699 | 2026-01-27T01:13:58.203Z | DEBG | test_vpcs (InternalApi): authorize result
action = CreateChild
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = IpPool { parent: Fleet, key: 867aa474-11ff-4274-bd22-0aea0f5c1c8c, lookup_type: ByName("oxide-service-pool-v6") }
result = Ok(())
|
| 1700 | 2026-01-27T01:13:58.237Z | TRAC | test_vpcs (InternalApi): authorize begin
action = CreateChild
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = IpPool { parent: Fleet, key: cb3a3b53-75df-46bd-8fd9-9c15d8fc0604, lookup_type: ByName("oxide-service-pool-v4") }
|
| 1701 | 2026-01-27T01:13:58.237Z | TRAC | test_vpcs (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 1702 | 2026-01-27T01:13:58.237Z | TRAC | test_vpcs (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 1703 | 2026-01-27T01:13:58.237Z | DEBG | test_vpcs (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 1704 | 2026-01-27T01:13:58.238Z | DEBG | test_vpcs (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 1705 | 2026-01-27T01:13:58.242Z | DEBG | test_vpcs (InternalApi): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 1706 | 2026-01-27T01:13:58.249Z | DEBG | test_vpcs (InternalApi): authorize result
action = CreateChild
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = IpPool { parent: Fleet, key: cb3a3b53-75df-46bd-8fd9-9c15d8fc0604, lookup_type: ByName("oxide-service-pool-v4") }
result = Ok(())
|
| 1707 | 2026-01-27T01:13:58.270Z | TRAC | test_vpcs (InternalApi): authorize begin
action = CreateChild
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = IpPool { parent: Fleet, key: cb3a3b53-75df-46bd-8fd9-9c15d8fc0604, lookup_type: ByName("oxide-service-pool-v4") }
|
| 1708 | 2026-01-27T01:13:58.270Z | TRAC | test_vpcs (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 1709 | 2026-01-27T01:13:58.271Z | TRAC | test_vpcs (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 1710 | 2026-01-27T01:13:58.271Z | DEBG | test_vpcs (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 1711 | 2026-01-27T01:13:58.272Z | DEBG | test_vpcs (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 1712 | 2026-01-27T01:13:58.277Z | DEBG | test_vpcs (InternalApi): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 1713 | 2026-01-27T01:13:58.292Z | DEBG | test_vpcs (InternalApi): authorize result
action = CreateChild
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = IpPool { parent: Fleet, key: cb3a3b53-75df-46bd-8fd9-9c15d8fc0604, lookup_type: ByName("oxide-service-pool-v4") }
result = Ok(())
|
| 1714 | 2026-01-27T01:13:58.306Z | TRAC | test_vpcs (InternalApi): authorize begin
action = Modify
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = BlueprintConfig
|
| 1715 | 2026-01-27T01:13:58.311Z | TRAC | test_vpcs (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 1716 | 2026-01-27T01:13:58.311Z | TRAC | test_vpcs (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 1717 | 2026-01-27T01:13:58.311Z | DEBG | test_vpcs (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 1718 | 2026-01-27T01:13:58.312Z | DEBG | test_vpcs (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 1719 | 2026-01-27T01:13:58.319Z | DEBG | test_vpcs (InternalApi): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 1720 | 2026-01-27T01:13:58.326Z | DEBG | test_vpcs (InternalApi): authorize result
action = Modify
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = BlueprintConfig
result = Ok(())
|
| 1721 | 2026-01-27T01:13:58.572Z | INFO | test_vpcs (InternalApi): inserted blueprint
blueprint_id = c01a6e26-b5bc-40f6-ba41-c1d23b303d2d
|
| 1722 | 2026-01-27T01:13:58.572Z | TRAC | test_vpcs (InternalApi): authorize begin
action = Modify
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = BlueprintConfig
|
| 1723 | 2026-01-27T01:13:58.572Z | TRAC | test_vpcs (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 1724 | 2026-01-27T01:13:58.572Z | TRAC | test_vpcs (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 1725 | 2026-01-27T01:13:58.572Z | DEBG | test_vpcs (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 1726 | 2026-01-27T01:13:58.574Z | DEBG | test_vpcs (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 1727 | 2026-01-27T01:13:58.589Z | DEBG | test_vpcs (InternalApi): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 1728 | 2026-01-27T01:13:58.600Z | DEBG | test_vpcs (InternalApi): authorize result
action = Modify
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = BlueprintConfig
result = Ok(())
|
| 1729 | 2026-01-27T01:13:58.626Z | INFO | test_vpcs (InternalApi): No networking records needed for cockroach_db service
|
| 1730 | 2026-01-27T01:13:58.735Z | INFO | test_vpcs (InternalApi): Inserted networking records for external_dns service
|
| 1731 | 2026-01-27T01:13:58.735Z | INFO | test_vpcs (InternalApi): No networking records needed for clickhouse service
|
| 1732 | 2026-01-27T01:13:58.773Z | INFO | test_vpcs (InternalApi): Inserted networking records for nexus service
|
| 1733 | 2026-01-27T01:13:58.819Z | INFO | test_vpcs (InternalApi): Inserted networking records for boundary_ntp service
|
| 1734 | 2026-01-27T01:13:58.820Z | INFO | test_vpcs (InternalApi): No networking records needed for crucible_pantry service
|
| 1735 | 2026-01-27T01:13:58.820Z | INFO | test_vpcs (InternalApi): No networking records needed for internal_dns service
|
| 1736 | 2026-01-27T01:13:58.820Z | INFO | test_vpcs (InternalApi): Inserted service networking records
|
| 1737 | 2026-01-27T01:13:58.820Z | INFO | test_vpcs (InternalApi): Inserted physical disks
|
| 1738 | 2026-01-27T01:13:58.820Z | INFO | test_vpcs (InternalApi): Inserted zpools
|
| 1739 | 2026-01-27T01:13:58.820Z | INFO | test_vpcs (InternalApi): Inserted datasets
|
| 1740 | 2026-01-27T01:13:58.847Z | INFO | test_vpcs (InternalApi): Populated DNS tables for internal DNS
|
| 1741 | 2026-01-27T01:13:58.854Z | INFO | test_vpcs (InternalApi): Populated DNS tables for external DNS
|
| 1742 | 2026-01-27T01:13:58.855Z | TRAC | test_vpcs (InternalApi): authorize begin
action = CreateChild
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Fleet
|
| 1743 | 2026-01-27T01:13:58.855Z | TRAC | test_vpcs (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 1744 | 2026-01-27T01:13:58.855Z | TRAC | test_vpcs (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 1745 | 2026-01-27T01:13:58.855Z | DEBG | test_vpcs (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 1746 | 2026-01-27T01:13:58.856Z | DEBG | test_vpcs (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 1747 | 2026-01-27T01:13:58.860Z | DEBG | test_vpcs (InternalApi): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 1748 | 2026-01-27T01:13:58.865Z | DEBG | test_vpcs (InternalApi): authorize result
action = CreateChild
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Fleet
result = Ok(())
|
| 1749 | 2026-01-27T01:13:58.865Z | TRAC | test_vpcs (InternalApi): authorize begin
action = ModifyPolicy
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Fleet
|
| 1750 | 2026-01-27T01:13:58.865Z | TRAC | test_vpcs (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 1751 | 2026-01-27T01:13:58.865Z | TRAC | test_vpcs (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 1752 | 2026-01-27T01:13:58.865Z | DEBG | test_vpcs (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 1753 | 2026-01-27T01:13:58.867Z | DEBG | test_vpcs (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 1754 | 2026-01-27T01:13:58.869Z | TRAC | test_vpcs (dns): buffer
buffer = Length: 67 (0x43) bytes\n0000: dd 1a 01 00 00 01 00 00 00 00 00 01 04 5f 6d 67 ............._mg\n0010: 73 04 5f 74 63 70 0d 63 6f 6e 74 72 6f 6c 2d 70 s._tcp.control-p\n0020: 6c 61 6e 65 05 6f 78 69 64 65 08 69 6e 74 65 72 lane.oxide.inter\n0030: 6e 61 6c 00 00 21 00 01 00 00 29 04 d0 00 00 00 nal..!....).....\n0040: 00 00 00 ...
kind = dns
peer_addr = [::1]:51294
req_id = 6eac5450-0552-4e49-bd0d-413445d667f2
|
| 1755 | 2026-01-27T01:13:58.869Z | DEBG | test_vpcs (dns): message_request
kind = dns
mr = MessageRequest {\n header: Header {\n id: 56602,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n queries: Queries {\n queries: [\n LowerQuery {\n name: LowerName(\n Name("_mgs._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_mgs._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n ],\n original: [\n 4,\n 95,\n 109,\n 103,\n 115,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n flags: EdnsFlags {\n dnssec_ok: false,\n z: 0,\n },\n max_payload: 1232,\n options: OPT {\n options: [],\n },\n },\n ),\n}
peer_addr = [::1]:51294
req_id = 6eac5450-0552-4e49-bd0d-413445d667f2
|
| 1756 | 2026-01-27T01:13:58.870Z | DEBG | test_vpcs (store): query key
key = _mgs._tcp
|
| 1757 | 2026-01-27T01:13:58.870Z | DEBG | test_vpcs (store): query key
key = dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host
|
| 1758 | 2026-01-27T01:13:58.870Z | DEBG | test_vpcs (dns): dns response
additional_records = [Record { name_labels: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal"), dns_class: IN, ttl: 0, rdata: AAAA(AAAA(::1)) }]
kind = dns
peer_addr = [::1]:51294
query = LowerQuery { name: LowerName(Name("_mgs._tcp.control-plane.oxide.internal.")), original: Query { name: Name("_mgs._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN } }
records = [Record { name_labels: Name("_mgs._tcp.control-plane.oxide.internal."), dns_class: IN, ttl: 0, rdata: SRV(SRV { priority: 0, weight: 0, port: 52572, target: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal") }) }]
req_id = 6eac5450-0552-4e49-bd0d-413445d667f2
|
| 1759 | 2026-01-27T01:13:58.871Z | TRAC | test_vpcs (dns): buffer
buffer = Length: 74 (0x4a) bytes\n0000: 81 02 01 00 00 01 00 00 00 00 00 01 0b 5f 72 65 ............._re\n0010: 70 6f 2d 64 65 70 6f 74 04 5f 74 63 70 0d 63 6f po-depot._tcp.co\n0020: 6e 74 72 6f 6c 2d 70 6c 61 6e 65 05 6f 78 69 64 ntrol-plane.oxid\n0030: 65 08 69 6e 74 65 72 6e 61 6c 00 00 21 00 01 00 e.internal..!...\n0040: 00 29 04 d0 00 00 00 00 00 00 .)........
kind = dns
peer_addr = [::1]:61455
req_id = b10388c5-771c-4875-ab02-604a29bbfd07
|
| 1760 | 2026-01-27T01:13:58.871Z | DEBG | test_vpcs (dns): message_request
kind = dns
mr = MessageRequest {\n header: Header {\n id: 33026,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n queries: Queries {\n queries: [\n LowerQuery {\n name: LowerName(\n Name("_repo-depot._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_repo-depot._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n ],\n original: [\n 11,\n 95,\n 114,\n 101,\n 112,\n 111,\n 45,\n 100,\n 101,\n 112,\n 111,\n 116,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n flags: EdnsFlags {\n dnssec_ok: false,\n z: 0,\n },\n max_payload: 1232,\n options: OPT {\n options: [],\n },\n },\n ),\n}
peer_addr = [::1]:61455
req_id = b10388c5-771c-4875-ab02-604a29bbfd07
|
| 1761 | 2026-01-27T01:13:58.871Z | DEBG | test_vpcs (store): query key
key = _repo-depot._tcp
|
| 1762 | 2026-01-27T01:13:58.871Z | DEBG | test_vpcs (store): query key
key = b6d65341-167c-41df-9b5c-41cded99c229.sled
|
| 1763 | 2026-01-27T01:13:58.871Z | DEBG | test_vpcs (dns): dns response
additional_records = [Record { name_labels: Name("b6d65341-167c-41df-9b5c-41cded99c229.sled.control-plane.oxide.internal"), dns_class: IN, ttl: 0, rdata: AAAA(AAAA(::1)) }]
kind = dns
peer_addr = [::1]:61455
query = LowerQuery { name: LowerName(Name("_repo-depot._tcp.control-plane.oxide.internal.")), original: Query { name: Name("_repo-depot._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN } }
records = [Record { name_labels: Name("_repo-depot._tcp.control-plane.oxide.internal."), dns_class: IN, ttl: 0, rdata: SRV(SRV { priority: 0, weight: 0, port: 50229, target: Name("b6d65341-167c-41df-9b5c-41cded99c229.sled.control-plane.oxide.internal") }) }]
req_id = b10388c5-771c-4875-ab02-604a29bbfd07
|
| 1764 | 2026-01-27T01:13:58.871Z | TRAC | test_vpcs (dns): buffer
buffer = Length: 79 (0x4f) bytes\n0000: e6 fb 01 00 00 01 00 00 00 00 00 01 10 5f 63 72 ............._cr\n0010: 75 63 69 62 6c 65 2d 70 61 6e 74 72 79 04 5f 74 ucible-pantry._t\n0020: 63 70 0d 63 6f 6e 74 72 6f 6c 2d 70 6c 61 6e 65 cp.control-plane\n0030: 05 6f 78 69 64 65 08 69 6e 74 65 72 6e 61 6c 00 .oxide.internal.\n0040: 00 21 00 01 00 00 29 04 d0 00 00 00 00 00 00 .!....)........
kind = dns
peer_addr = [::1]:59918
req_id = 694a31e6-062c-4d99-932a-023ea71869f4
|
| 1765 | 2026-01-27T01:13:58.871Z | DEBG | test_vpcs (dns): message_request
kind = dns
mr = MessageRequest {\n header: Header {\n id: 59131,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n queries: Queries {\n queries: [\n LowerQuery {\n name: LowerName(\n Name("_crucible-pantry._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_crucible-pantry._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n ],\n original: [\n 16,\n 95,\n 99,\n 114,\n 117,\n 99,\n 105,\n 98,\n 108,\n 101,\n 45,\n 112,\n 97,\n 110,\n 116,\n 114,\n 121,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n flags: EdnsFlags {\n dnssec_ok: false,\n z: 0,\n },\n max_payload: 1232,\n options: OPT {\n options: [],\n },\n },\n ),\n}
peer_addr = [::1]:59918
req_id = 694a31e6-062c-4d99-932a-023ea71869f4
|
| 1766 | 2026-01-27T01:13:58.872Z | DEBG | test_vpcs (store): query key
key = _crucible-pantry._tcp
|
| 1767 | 2026-01-27T01:13:58.872Z | DEBG | test_vpcs (store): query key
key = e28e8b52-f93c-4d17-8434-be542f08e849.host
|
| 1768 | 2026-01-27T01:13:58.872Z | DEBG | test_vpcs (dns): dns response
additional_records = [Record { name_labels: Name("e28e8b52-f93c-4d17-8434-be542f08e849.host.control-plane.oxide.internal"), dns_class: IN, ttl: 0, rdata: AAAA(AAAA(::1)) }]
kind = dns
peer_addr = [::1]:59918
query = LowerQuery { name: LowerName(Name("_crucible-pantry._tcp.control-plane.oxide.internal.")), original: Query { name: Name("_crucible-pantry._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN } }
records = [Record { name_labels: Name("_crucible-pantry._tcp.control-plane.oxide.internal."), dns_class: IN, ttl: 0, rdata: SRV(SRV { priority: 0, weight: 0, port: 35761, target: Name("e28e8b52-f93c-4d17-8434-be542f08e849.host.control-plane.oxide.internal") }) }]
req_id = 694a31e6-062c-4d99-932a-023ea71869f4
|
| 1769 | 2026-01-27T01:13:58.873Z | TRAC | test_vpcs (dns): buffer
buffer = Length: 108 (0x6c) bytes\n0000: 67 65 01 00 00 01 00 00 00 00 00 01 2d 64 65 6e ge..........-den\n0010: 64 72 69 74 65 2d 62 36 64 36 35 33 34 31 2d 31 drite-b6d65341-1\n0020: 36 37 63 2d 34 31 64 66 2d 39 62 35 63 2d 34 31 67c-41df-9b5c-41\n0030: 63 64 65 64 39 39 63 32 32 39 04 68 6f 73 74 0d cded99c229.host.\n0040: 63 6f 6e 74 72 6f 6c 2d 70 6c 61 6e 65 05 6f 78 control-plane.ox\n0050: 69 64 65 08 69 6e 74 65 72 6e 61 6c 00 00 1c 00 ide.internal....\n0060: 01 00 00 29 04 d0 00 00 00 00 00 00 ...)........
kind = dns
peer_addr = [::1]:51555
req_id = 7e295b6b-69e1-48f0-b4f1-b57bd8d7b85f
|
| 1770 | 2026-01-27T01:13:58.873Z | DEBG | test_vpcs (dns): message_request
kind = dns
mr = MessageRequest {\n header: Header {\n id: 26469,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n queries: Queries {\n queries: [\n LowerQuery {\n name: LowerName(\n Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."),\n query_type: AAAA,\n query_class: IN,\n },\n },\n ],\n original: [\n 45,\n 100,\n 101,\n 110,\n 100,\n 114,\n 105,\n 116,\n 101,\n 45,\n 98,\n 54,\n 100,\n 54,\n 53,\n 51,\n 52,\n 49,\n 45,\n 49,\n 54,\n 55,\n 99,\n 45,\n 52,\n 49,\n 100,\n 102,\n 45,\n 57,\n 98,\n 53,\n 99,\n 45,\n 52,\n 49,\n 99,\n 100,\n 101,\n 100,\n 57,\n 57,\n 99,\n 50,\n 50,\n 57,\n 4,\n 104,\n 111,\n 115,\n 116,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 28,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n flags: EdnsFlags {\n dnssec_ok: false,\n z: 0,\n },\n max_payload: 1232,\n options: OPT {\n options: [],\n },\n },\n ),\n}
peer_addr = [::1]:51555
req_id = 7e295b6b-69e1-48f0-b4f1-b57bd8d7b85f
|
| 1771 | 2026-01-27T01:13:58.873Z | DEBG | test_vpcs (store): query key
key = dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host
|
| 1772 | 2026-01-27T01:13:58.873Z | DEBG | test_vpcs (dns): dns response
additional_records = []
kind = dns
peer_addr = [::1]:51555
query = LowerQuery { name: LowerName(Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal.")), original: Query { name: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."), query_type: AAAA, query_class: IN } }
records = [Record { name_labels: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."), dns_class: IN, ttl: 0, rdata: AAAA(AAAA(::1)) }]
req_id = 7e295b6b-69e1-48f0-b4f1-b57bd8d7b85f
|
| 1773 | 2026-01-27T01:13:58.873Z | TRAC | test_vpcs (dns): buffer
buffer = Length: 99 (0x63) bytes\n0000: e0 2b 01 00 00 01 00 00 00 00 00 01 24 62 36 64 .+..........$b6d\n0010: 36 35 33 34 31 2d 31 36 37 63 2d 34 31 64 66 2d 65341-167c-41df-\n0020: 39 62 35 63 2d 34 31 63 64 65 64 39 39 63 32 32 9b5c-41cded99c22\n0030: 39 04 73 6c 65 64 0d 63 6f 6e 74 72 6f 6c 2d 70 9.sled.control-p\n0040: 6c 61 6e 65 05 6f 78 69 64 65 08 69 6e 74 65 72 lane.oxide.inter\n0050: 6e 61 6c 00 00 1c 00 01 00 00 29 04 d0 00 00 00 nal.......).....\n0060: 00 00 00 ...
kind = dns
peer_addr = [::1]:57513
req_id = 78d5db2e-219c-4c80-9d46-b54163bd17ab
|
| 1774 | 2026-01-27T01:13:58.873Z | DEBG | test_vpcs (dns): message_request
kind = dns
mr = MessageRequest {\n header: Header {\n id: 57387,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n queries: Queries {\n queries: [\n LowerQuery {\n name: LowerName(\n Name("b6d65341-167c-41df-9b5c-41cded99c229.sled.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("b6d65341-167c-41df-9b5c-41cded99c229.sled.control-plane.oxide.internal."),\n query_type: AAAA,\n query_class: IN,\n },\n },\n ],\n original: [\n 36,\n 98,\n 54,\n 100,\n 54,\n 53,\n 51,\n 52,\n 49,\n 45,\n 49,\n 54,\n 55,\n 99,\n 45,\n 52,\n 49,\n 100,\n 102,\n 45,\n 57,\n 98,\n 53,\n 99,\n 45,\n 52,\n 49,\n 99,\n 100,\n 101,\n 100,\n 57,\n 57,\n 99,\n 50,\n 50,\n 57,\n 4,\n 115,\n 108,\n 101,\n 100,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 28,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n flags: EdnsFlags {\n dnssec_ok: false,\n z: 0,\n },\n max_payload: 1232,\n options: OPT {\n options: [],\n },\n },\n ),\n}
peer_addr = [::1]:57513
req_id = 78d5db2e-219c-4c80-9d46-b54163bd17ab
|
| 1775 | 2026-01-27T01:13:58.874Z | DEBG | test_vpcs (store): query key
key = b6d65341-167c-41df-9b5c-41cded99c229.sled
|
| 1776 | 2026-01-27T01:13:58.874Z | DEBG | test_vpcs (dns): dns response
additional_records = []
kind = dns
peer_addr = [::1]:57513
query = LowerQuery { name: LowerName(Name("b6d65341-167c-41df-9b5c-41cded99c229.sled.control-plane.oxide.internal.")), original: Query { name: Name("b6d65341-167c-41df-9b5c-41cded99c229.sled.control-plane.oxide.internal."), query_type: AAAA, query_class: IN } }
records = [Record { name_labels: Name("b6d65341-167c-41df-9b5c-41cded99c229.sled.control-plane.oxide.internal."), dns_class: IN, ttl: 0, rdata: AAAA(AAAA(::1)) }]
req_id = 78d5db2e-219c-4c80-9d46-b54163bd17ab
|
| 1777 | 2026-01-27T01:13:58.874Z | TRAC | test_vpcs (dns): buffer
buffer = Length: 99 (0x63) bytes\n0000: c5 39 01 00 00 01 00 00 00 00 00 01 24 65 32 38 .9..........$e28\n0010: 65 38 62 35 32 2d 66 39 33 63 2d 34 64 31 37 2d e8b52-f93c-4d17-\n0020: 38 34 33 34 2d 62 65 35 34 32 66 30 38 65 38 34 8434-be542f08e84\n0030: 39 04 68 6f 73 74 0d 63 6f 6e 74 72 6f 6c 2d 70 9.host.control-p\n0040: 6c 61 6e 65 05 6f 78 69 64 65 08 69 6e 74 65 72 lane.oxide.inter\n0050: 6e 61 6c 00 00 1c 00 01 00 00 29 04 d0 00 00 00 nal.......).....\n0060: 00 00 00 ...
kind = dns
peer_addr = [::1]:60277
req_id = 4c3ef69e-8efd-4939-8a10-e9ce5598193f
|
| 1778 | 2026-01-27T01:13:58.874Z | DEBG | test_vpcs (dns): message_request
kind = dns
mr = MessageRequest {\n header: Header {\n id: 50489,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n queries: Queries {\n queries: [\n LowerQuery {\n name: LowerName(\n Name("e28e8b52-f93c-4d17-8434-be542f08e849.host.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("e28e8b52-f93c-4d17-8434-be542f08e849.host.control-plane.oxide.internal."),\n query_type: AAAA,\n query_class: IN,\n },\n },\n ],\n original: [\n 36,\n 101,\n 50,\n 56,\n 101,\n 56,\n 98,\n 53,\n 50,\n 45,\n 102,\n 57,\n 51,\n 99,\n 45,\n 52,\n 100,\n 49,\n 55,\n 45,\n 56,\n 52,\n 51,\n 52,\n 45,\n 98,\n 101,\n 53,\n 52,\n 50,\n 102,\n 48,\n 56,\n 101,\n 56,\n 52,\n 57,\n 4,\n 104,\n 111,\n 115,\n 116,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 28,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n flags: EdnsFlags {\n dnssec_ok: false,\n z: 0,\n },\n max_payload: 1232,\n options: OPT {\n options: [],\n },\n },\n ),\n}
peer_addr = [::1]:60277
req_id = 4c3ef69e-8efd-4939-8a10-e9ce5598193f
|
| 1779 | 2026-01-27T01:13:58.874Z | DEBG | test_vpcs (store): query key
key = e28e8b52-f93c-4d17-8434-be542f08e849.host
|
| 1780 | 2026-01-27T01:13:58.874Z | DEBG | test_vpcs (dns): dns response
additional_records = []
kind = dns
peer_addr = [::1]:60277
query = LowerQuery { name: LowerName(Name("e28e8b52-f93c-4d17-8434-be542f08e849.host.control-plane.oxide.internal.")), original: Query { name: Name("e28e8b52-f93c-4d17-8434-be542f08e849.host.control-plane.oxide.internal."), query_type: AAAA, query_class: IN } }
records = [Record { name_labels: Name("e28e8b52-f93c-4d17-8434-be542f08e849.host.control-plane.oxide.internal."), dns_class: IN, ttl: 0, rdata: AAAA(AAAA(::1)) }]
req_id = 4c3ef69e-8efd-4939-8a10-e9ce5598193f
|
| 1781 | 2026-01-27T01:13:58.939Z | INFO | test_vpcs (dropshot): accepted connection
kind = pantry
local_addr = [::1]:35761
remote_addr = [::1]:33012
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
| 1782 | 2026-01-27T01:13:58.940Z | DEBG | test_vpcs (InternalApi): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 1783 | 2026-01-27T01:13:58.946Z | DEBG | test_vpcs (InternalApi): authorize result
action = ModifyPolicy
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Fleet
result = Ok(())
|
| 1784 | 2026-01-27T01:13:58.947Z | TRAC | test_vpcs (dropshot): incoming request
kind = pantry
local_addr = [::1]:35761
method = GET
remote_addr = [::1]:33012
req_id = 158098b1-130c-419c-9eba-45a638a3f9bc
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
uri = /crucible/pantry/0
|
| 1785 | 2026-01-27T01:13:58.948Z | INFO | test_vpcs (dropshot): request completed
kind = pantry
latency_us = 793
local_addr = [::1]:35761
method = GET
remote_addr = [::1]:33012
req_id = 158098b1-130c-419c-9eba-45a638a3f9bc
response_code = 200
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
uri = /crucible/pantry/0
|
| 1786 | 2026-01-27T01:13:59.567Z | INFO | test_vpcs (dropshot): accepted connection
kind = pantry
local_addr = [::1]:35761
remote_addr = [::1]:32980
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
| 1787 | 2026-01-27T01:13:59.569Z | INFO | test_vpcs (dropshot): accepted connection
kind = pantry
local_addr = [::1]:35761
remote_addr = [::1]:59830
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
| 1788 | 2026-01-27T01:13:59.569Z | INFO | test_vpcs (dropshot): accepted connection
kind = pantry
local_addr = [::1]:35761
remote_addr = [::1]:46008
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
| 1789 | 2026-01-27T01:13:59.569Z | INFO | test_vpcs (dropshot): accepted connection
kind = pantry
local_addr = [::1]:35761
remote_addr = [::1]:37906
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
| 1790 | 2026-01-27T01:13:59.569Z | INFO | test_vpcs (dropshot): accepted connection
kind = pantry
local_addr = [::1]:35761
remote_addr = [::1]:42839
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
| 1791 | 2026-01-27T01:13:59.569Z | INFO | test_vpcs (dropshot): accepted connection
kind = pantry
local_addr = [::1]:35761
remote_addr = [::1]:42388
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
| 1792 | 2026-01-27T01:13:59.569Z | INFO | test_vpcs (dropshot): accepted connection
kind = pantry
local_addr = [::1]:35761
remote_addr = [::1]:48802
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
| 1793 | 2026-01-27T01:13:59.578Z | TRAC | test_vpcs (dropshot): incoming request
kind = pantry
local_addr = [::1]:35761
method = GET
remote_addr = [::1]:32980
req_id = 6b249087-f481-46be-ab69-0f6c2e63ba9e
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
uri = /crucible/pantry/0
|
| 1794 | 2026-01-27T01:13:59.579Z | TRAC | test_vpcs (dropshot): incoming request
kind = pantry
local_addr = [::1]:35761
method = GET
remote_addr = [::1]:59830
req_id = 80bf9197-860e-4a5d-a7dd-e9369281af37
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
uri = /crucible/pantry/0
|
| 1795 | 2026-01-27T01:13:59.579Z | TRAC | test_vpcs (dropshot): incoming request
kind = pantry
local_addr = [::1]:35761
method = GET
remote_addr = [::1]:46008
req_id = 882a76c3-db3b-4b05-a98f-2efe63fa490d
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
uri = /crucible/pantry/0
|
| 1796 | 2026-01-27T01:13:59.579Z | TRAC | test_vpcs (dropshot): incoming request
kind = pantry
local_addr = [::1]:35761
method = GET
remote_addr = [::1]:37906
req_id = 96d78615-ad2d-417a-a3f0-43a0f29c180b
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
uri = /crucible/pantry/0
|
| 1797 | 2026-01-27T01:13:59.579Z | TRAC | test_vpcs (dropshot): incoming request
kind = pantry
local_addr = [::1]:35761
method = GET
remote_addr = [::1]:42839
req_id = 1841b55c-c952-4083-8f9e-0293d06f24b7
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
uri = /crucible/pantry/0
|
| 1798 | 2026-01-27T01:13:59.580Z | TRAC | test_vpcs (dropshot): incoming request
kind = pantry
local_addr = [::1]:35761
method = GET
remote_addr = [::1]:42388
req_id = 8f5b38f3-340b-4594-84e0-1b7339bdb5cc
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
uri = /crucible/pantry/0
|
| 1799 | 2026-01-27T01:13:59.582Z | TRAC | test_vpcs (dropshot): incoming request
kind = pantry
local_addr = [::1]:35761
method = GET
remote_addr = [::1]:48802
req_id = 957b4603-2e20-4316-90dc-9dce784ae0ae
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
uri = /crucible/pantry/0
|
| 1800 | 2026-01-27T01:13:59.582Z | INFO | test_vpcs (dropshot): request completed
kind = pantry
latency_us = 4225
local_addr = [::1]:35761
method = GET
remote_addr = [::1]:32980
req_id = 6b249087-f481-46be-ab69-0f6c2e63ba9e
response_code = 200
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
uri = /crucible/pantry/0
|
| 1801 | 2026-01-27T01:13:59.582Z | INFO | test_vpcs (dropshot): request completed
kind = pantry
latency_us = 3688
local_addr = [::1]:35761
method = GET
remote_addr = [::1]:59830
req_id = 80bf9197-860e-4a5d-a7dd-e9369281af37
response_code = 200
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
uri = /crucible/pantry/0
|
| 1802 | 2026-01-27T01:13:59.582Z | INFO | test_vpcs (dropshot): request completed
kind = pantry
latency_us = 3635
local_addr = [::1]:35761
method = GET
remote_addr = [::1]:46008
req_id = 882a76c3-db3b-4b05-a98f-2efe63fa490d
response_code = 200
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
uri = /crucible/pantry/0
|
| 1803 | 2026-01-27T01:13:59.582Z | INFO | test_vpcs (dropshot): request completed
kind = pantry
latency_us = 3522
local_addr = [::1]:35761
method = GET
remote_addr = [::1]:37906
req_id = 96d78615-ad2d-417a-a3f0-43a0f29c180b
response_code = 200
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
uri = /crucible/pantry/0
|
| 1804 | 2026-01-27T01:13:59.583Z | INFO | test_vpcs (dropshot): request completed
kind = pantry
latency_us = 3458
local_addr = [::1]:35761
method = GET
remote_addr = [::1]:42839
req_id = 1841b55c-c952-4083-8f9e-0293d06f24b7
response_code = 200
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
uri = /crucible/pantry/0
|
| 1805 | 2026-01-27T01:13:59.583Z | INFO | test_vpcs (dropshot): request completed
kind = pantry
latency_us = 2422
local_addr = [::1]:35761
method = GET
remote_addr = [::1]:42388
req_id = 8f5b38f3-340b-4594-84e0-1b7339bdb5cc
response_code = 200
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
uri = /crucible/pantry/0
|
| 1806 | 2026-01-27T01:13:59.583Z | INFO | test_vpcs (dropshot): request completed
kind = pantry
latency_us = 1064
local_addr = [::1]:35761
method = GET
remote_addr = [::1]:48802
req_id = 957b4603-2e20-4316-90dc-9dce784ae0ae
response_code = 200
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
uri = /crucible/pantry/0
|
| 1807 | 2026-01-27T01:13:59.583Z | TRAC | test_vpcs (InternalApi): authorize begin
action = Modify
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = DnsConfig
|
| 1808 | 2026-01-27T01:13:59.584Z | TRAC | test_vpcs (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 1809 | 2026-01-27T01:13:59.584Z | TRAC | test_vpcs (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 1810 | 2026-01-27T01:13:59.584Z | DEBG | test_vpcs (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 1811 | 2026-01-27T01:13:59.585Z | DEBG | test_vpcs (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 1812 | 2026-01-27T01:13:59.600Z | DEBG | test_vpcs (InternalApi): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 1813 | 2026-01-27T01:13:59.610Z | DEBG | test_vpcs (InternalApi): authorize result
action = Modify
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = DnsConfig
result = Ok(())
|
| 1814 | 2026-01-27T01:13:59.610Z | TRAC | test_vpcs (InternalApi): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = DnsConfig
|
| 1815 | 2026-01-27T01:13:59.610Z | TRAC | test_vpcs (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 1816 | 2026-01-27T01:13:59.610Z | TRAC | test_vpcs (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 1817 | 2026-01-27T01:13:59.610Z | DEBG | test_vpcs (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 1818 | 2026-01-27T01:13:59.611Z | DEBG | test_vpcs (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 1819 | 2026-01-27T01:13:59.626Z | DEBG | test_vpcs (InternalApi): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 1820 | 2026-01-27T01:13:59.637Z | DEBG | test_vpcs (InternalApi): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = DnsConfig
result = Ok(())
|
| 1821 | 2026-01-27T01:13:59.644Z | TRAC | test_vpcs (InternalApi): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = DnsConfig
|
| 1822 | 2026-01-27T01:13:59.644Z | TRAC | test_vpcs (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 1823 | 2026-01-27T01:13:59.644Z | TRAC | test_vpcs (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 1824 | 2026-01-27T01:13:59.644Z | DEBG | test_vpcs (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 1825 | 2026-01-27T01:13:59.645Z | DEBG | test_vpcs (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 1826 | 2026-01-27T01:13:59.654Z | DEBG | test_vpcs (InternalApi): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 1827 | 2026-01-27T01:13:59.662Z | DEBG | test_vpcs (InternalApi): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = DnsConfig
result = Ok(())
|
| 1828 | 2026-01-27T01:13:59.681Z | INFO | test_vpcs (InternalApi): Created recovery silo
|
| 1829 | 2026-01-27T01:13:59.684Z | INFO | test_vpcs (InternalApi): Created recovery user
|
| 1830 | 2026-01-27T01:13:59.693Z | INFO | test_vpcs (InternalApi): Created recovery user's password
|
| 1831 | 2026-01-27T01:13:59.693Z | TRAC | test_vpcs (InternalApi): authorize begin
action = ModifyPolicy
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Silo { parent: Fleet, key: e5399c73-ca5a-4504-b823-4770433f29da, lookup_type: ById(e5399c73-ca5a-4504-b823-4770433f29da) }
|
| 1832 | 2026-01-27T01:13:59.694Z | TRAC | test_vpcs (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
resource_id = e5399c73-ca5a-4504-b823-4770433f29da
resource_type = Silo
|
| 1833 | 2026-01-27T01:13:59.694Z | TRAC | test_vpcs (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 1834 | 2026-01-27T01:13:59.694Z | DEBG | test_vpcs (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 1835 | 2026-01-27T01:13:59.695Z | DEBG | test_vpcs (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 1836 | 2026-01-27T01:13:59.701Z | TRAC | test_vpcs (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 1837 | 2026-01-27T01:13:59.701Z | TRAC | test_vpcs (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 1838 | 2026-01-27T01:13:59.701Z | DEBG | test_vpcs (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 1839 | 2026-01-27T01:13:59.703Z | DEBG | test_vpcs (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 1840 | 2026-01-27T01:13:59.706Z | DEBG | test_vpcs (InternalApi): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 1841 | 2026-01-27T01:13:59.710Z | DEBG | test_vpcs (InternalApi): authorize result
action = ModifyPolicy
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Silo { parent: Fleet, key: e5399c73-ca5a-4504-b823-4770433f29da, lookup_type: ById(e5399c73-ca5a-4504-b823-4770433f29da) }
result = Ok(())
|
| 1842 | 2026-01-27T01:13:59.710Z | DEBG | test_vpcs (InternalApi): Generated role assignment queries
|
| 1843 | 2026-01-27T01:13:59.715Z | INFO | test_vpcs (InternalApi): Granted Silo privileges
|
| 1844 | 2026-01-27T01:13:59.715Z | TRAC | test_vpcs (InternalApi): authorize begin
action = Modify
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Fleet
|
| 1845 | 2026-01-27T01:13:59.715Z | TRAC | test_vpcs (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 1846 | 2026-01-27T01:13:59.715Z | TRAC | test_vpcs (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 1847 | 2026-01-27T01:13:59.715Z | DEBG | test_vpcs (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 1848 | 2026-01-27T01:13:59.716Z | DEBG | test_vpcs (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 1849 | 2026-01-27T01:13:59.720Z | DEBG | test_vpcs (InternalApi): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 1850 | 2026-01-27T01:13:59.725Z | DEBG | test_vpcs (InternalApi): authorize result
action = Modify
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Fleet
result = Ok(())
|
| 1851 | 2026-01-27T01:13:59.740Z | TRAC | test_vpcs (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 1852 | 2026-01-27T01:13:59.740Z | DEBG | test_vpcs (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 1853 | 2026-01-27T01:13:59.741Z | DEBG | test_vpcs (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 1854 | 2026-01-27T01:13:59.745Z | TRAC | test_vpcs (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 1855 | 2026-01-27T01:13:59.745Z | DEBG | test_vpcs (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 1856 | 2026-01-27T01:13:59.747Z | DEBG | test_vpcs (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 1857 | 2026-01-27T01:13:59.770Z | TRAC | test_vpcs (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 1858 | 2026-01-27T01:13:59.770Z | DEBG | test_vpcs (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 1859 | 2026-01-27T01:13:59.781Z | DEBG | test_vpcs (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 1860 | 2026-01-27T01:13:59.788Z | TRAC | test_vpcs (InternalApi): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
|
| 1861 | 2026-01-27T01:13:59.788Z | TRAC | test_vpcs (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
resource_id = 001de000-4401-4000-8000-000000000000
resource_type = Project
|
| 1862 | 2026-01-27T01:13:59.788Z | TRAC | test_vpcs (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 1863 | 2026-01-27T01:13:59.788Z | DEBG | test_vpcs (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 1864 | 2026-01-27T01:13:59.789Z | DEBG | test_vpcs (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 1865 | 2026-01-27T01:13:59.794Z | TRAC | test_vpcs (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
resource_id = 001de000-5110-4000-8000-000000000001
resource_type = Silo
|
| 1866 | 2026-01-27T01:13:59.794Z | TRAC | test_vpcs (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 1867 | 2026-01-27T01:13:59.794Z | DEBG | test_vpcs (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 1868 | 2026-01-27T01:13:59.795Z | DEBG | test_vpcs (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 1869 | 2026-01-27T01:13:59.803Z | TRAC | test_vpcs (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 1870 | 2026-01-27T01:13:59.804Z | TRAC | test_vpcs (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 1871 | 2026-01-27T01:13:59.804Z | DEBG | test_vpcs (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 1872 | 2026-01-27T01:13:59.805Z | DEBG | test_vpcs (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 1873 | 2026-01-27T01:13:59.812Z | DEBG | test_vpcs (InternalApi): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 1874 | 2026-01-27T01:13:59.824Z | DEBG | test_vpcs (InternalApi): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
result = Ok(())
|
| 1875 | 2026-01-27T01:13:59.825Z | TRAC | test_vpcs (InternalApi): successful lookup of siloed resource "Vpc" using built-in user
|
| 1876 | 2026-01-27T01:13:59.825Z | TRAC | test_vpcs (InternalApi): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
|
| 1877 | 2026-01-27T01:13:59.825Z | TRAC | test_vpcs (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
resource_id = 001de000-4401-4000-8000-000000000000
resource_type = Project
|
| 1878 | 2026-01-27T01:13:59.825Z | TRAC | test_vpcs (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 1879 | 2026-01-27T01:13:59.825Z | DEBG | test_vpcs (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 1880 | 2026-01-27T01:13:59.827Z | DEBG | test_vpcs (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 1881 | 2026-01-27T01:13:59.831Z | TRAC | test_vpcs (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
resource_id = 001de000-5110-4000-8000-000000000001
resource_type = Silo
|
| 1882 | 2026-01-27T01:13:59.831Z | TRAC | test_vpcs (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 1883 | 2026-01-27T01:13:59.831Z | DEBG | test_vpcs (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 1884 | 2026-01-27T01:13:59.832Z | DEBG | test_vpcs (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 1885 | 2026-01-27T01:13:59.837Z | TRAC | test_vpcs (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 1886 | 2026-01-27T01:13:59.837Z | TRAC | test_vpcs (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 1887 | 2026-01-27T01:13:59.837Z | DEBG | test_vpcs (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 1888 | 2026-01-27T01:13:59.838Z | DEBG | test_vpcs (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 1889 | 2026-01-27T01:13:59.845Z | DEBG | test_vpcs (InternalApi): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 1890 | 2026-01-27T01:13:59.857Z | DEBG | test_vpcs (InternalApi): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
result = Ok(())
|
| 1891 | 2026-01-27T01:13:59.857Z | TRAC | test_vpcs (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 1892 | 2026-01-27T01:13:59.857Z | DEBG | test_vpcs (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 1893 | 2026-01-27T01:13:59.858Z | DEBG | test_vpcs (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 1894 | 2026-01-27T01:13:59.864Z | TRAC | test_vpcs (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 1895 | 2026-01-27T01:13:59.864Z | DEBG | test_vpcs (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 1896 | 2026-01-27T01:13:59.865Z | DEBG | test_vpcs (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 1897 | 2026-01-27T01:13:59.870Z | TRAC | test_vpcs (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 1898 | 2026-01-27T01:13:59.870Z | DEBG | test_vpcs (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 1899 | 2026-01-27T01:13:59.871Z | DEBG | test_vpcs (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 1900 | 2026-01-27T01:13:59.877Z | TRAC | test_vpcs (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 1901 | 2026-01-27T01:13:59.877Z | DEBG | test_vpcs (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 1902 | 2026-01-27T01:13:59.878Z | DEBG | test_vpcs (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 1903 | 2026-01-27T01:13:59.882Z | TRAC | test_vpcs (InternalApi): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
|
| 1904 | 2026-01-27T01:13:59.882Z | TRAC | test_vpcs (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
resource_id = 001de000-4401-4000-8000-000000000000
resource_type = Project
|
| 1905 | 2026-01-27T01:13:59.882Z | TRAC | test_vpcs (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 1906 | 2026-01-27T01:13:59.882Z | DEBG | test_vpcs (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 1907 | 2026-01-27T01:13:59.883Z | DEBG | test_vpcs (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 1908 | 2026-01-27T01:13:59.887Z | TRAC | test_vpcs (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
resource_id = 001de000-5110-4000-8000-000000000001
resource_type = Silo
|
| 1909 | 2026-01-27T01:13:59.887Z | TRAC | test_vpcs (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 1910 | 2026-01-27T01:13:59.887Z | DEBG | test_vpcs (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 1911 | 2026-01-27T01:13:59.888Z | DEBG | test_vpcs (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 1912 | 2026-01-27T01:13:59.891Z | TRAC | test_vpcs (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 1913 | 2026-01-27T01:13:59.892Z | TRAC | test_vpcs (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 1914 | 2026-01-27T01:13:59.892Z | DEBG | test_vpcs (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 1915 | 2026-01-27T01:13:59.893Z | DEBG | test_vpcs (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 1916 | 2026-01-27T01:13:59.898Z | DEBG | test_vpcs (InternalApi): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 1917 | 2026-01-27T01:13:59.908Z | DEBG | test_vpcs (InternalApi): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
result = Ok(())
|
| 1918 | 2026-01-27T01:13:59.908Z | TRAC | test_vpcs (InternalApi): successful lookup of siloed resource "Vpc" using built-in user
|
| 1919 | 2026-01-27T01:13:59.909Z | TRAC | test_vpcs (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 1920 | 2026-01-27T01:13:59.909Z | DEBG | test_vpcs (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 1921 | 2026-01-27T01:13:59.911Z | DEBG | test_vpcs (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 1922 | 2026-01-27T01:13:59.916Z | TRAC | test_vpcs (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 1923 | 2026-01-27T01:13:59.916Z | DEBG | test_vpcs (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 1924 | 2026-01-27T01:13:59.917Z | DEBG | test_vpcs (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 1925 | 2026-01-27T01:13:59.921Z | TRAC | test_vpcs (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 1926 | 2026-01-27T01:13:59.921Z | DEBG | test_vpcs (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 1927 | 2026-01-27T01:13:59.922Z | DEBG | test_vpcs (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 1928 | 2026-01-27T01:13:59.927Z | TRAC | test_vpcs (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 1929 | 2026-01-27T01:13:59.927Z | DEBG | test_vpcs (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 1930 | 2026-01-27T01:13:59.928Z | DEBG | test_vpcs (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 1931 | 2026-01-27T01:13:59.937Z | TRAC | test_vpcs (InternalApi): authorize begin
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000001, lookup_type: ByName("external-dns") }
|
| 1932 | 2026-01-27T01:13:59.937Z | TRAC | test_vpcs (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
resource_id = 001de000-4401-4000-8000-000000000000
resource_type = Project
|
| 1933 | 2026-01-27T01:13:59.937Z | TRAC | test_vpcs (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 1934 | 2026-01-27T01:13:59.938Z | DEBG | test_vpcs (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 1935 | 2026-01-27T01:13:59.938Z | DEBG | test_vpcs (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 1936 | 2026-01-27T01:13:59.944Z | TRAC | test_vpcs (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
resource_id = 001de000-5110-4000-8000-000000000001
resource_type = Silo
|
| 1937 | 2026-01-27T01:13:59.944Z | TRAC | test_vpcs (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 1938 | 2026-01-27T01:13:59.944Z | DEBG | test_vpcs (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 1939 | 2026-01-27T01:13:59.944Z | DEBG | test_vpcs (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 1940 | 2026-01-27T01:13:59.949Z | TRAC | test_vpcs (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 1941 | 2026-01-27T01:13:59.949Z | TRAC | test_vpcs (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 1942 | 2026-01-27T01:13:59.949Z | DEBG | test_vpcs (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 1943 | 2026-01-27T01:13:59.950Z | DEBG | test_vpcs (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 1944 | 2026-01-27T01:13:59.954Z | DEBG | test_vpcs (InternalApi): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 1945 | 2026-01-27T01:13:59.971Z | DEBG | test_vpcs (InternalApi): authorize result
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000001, lookup_type: ByName("external-dns") }
result = Ok(())
|
| 1946 | 2026-01-27T01:13:59.971Z | TRAC | test_vpcs (InternalApi): successful lookup of siloed resource "VpcSubnet" using built-in user
|
| 1947 | 2026-01-27T01:13:59.971Z | TRAC | test_vpcs (InternalApi): authorize begin
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000001, lookup_type: ByName("external-dns") }
|
| 1948 | 2026-01-27T01:13:59.971Z | TRAC | test_vpcs (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
resource_id = 001de000-4401-4000-8000-000000000000
resource_type = Project
|
| 1949 | 2026-01-27T01:13:59.971Z | TRAC | test_vpcs (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 1950 | 2026-01-27T01:13:59.971Z | DEBG | test_vpcs (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 1951 | 2026-01-27T01:13:59.972Z | DEBG | test_vpcs (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 1952 | 2026-01-27T01:13:59.977Z | TRAC | test_vpcs (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
resource_id = 001de000-5110-4000-8000-000000000001
resource_type = Silo
|
| 1953 | 2026-01-27T01:13:59.977Z | TRAC | test_vpcs (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 1954 | 2026-01-27T01:13:59.977Z | DEBG | test_vpcs (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 1955 | 2026-01-27T01:13:59.979Z | DEBG | test_vpcs (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 1956 | 2026-01-27T01:13:59.984Z | TRAC | test_vpcs (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 1957 | 2026-01-27T01:13:59.984Z | TRAC | test_vpcs (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 1958 | 2026-01-27T01:13:59.984Z | DEBG | test_vpcs (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 1959 | 2026-01-27T01:13:59.986Z | DEBG | test_vpcs (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 1960 | 2026-01-27T01:13:59.992Z | DEBG | test_vpcs (InternalApi): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 1961 | 2026-01-27T01:14:00.006Z | DEBG | test_vpcs (InternalApi): authorize result
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000001, lookup_type: ByName("external-dns") }
result = Ok(())
|
| 1962 | 2026-01-27T01:14:00.006Z | TRAC | test_vpcs (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 1963 | 2026-01-27T01:14:00.006Z | DEBG | test_vpcs (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 1964 | 2026-01-27T01:14:00.008Z | DEBG | test_vpcs (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 1965 | 2026-01-27T01:14:00.018Z | TRAC | test_vpcs (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 1966 | 2026-01-27T01:14:00.018Z | DEBG | test_vpcs (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 1967 | 2026-01-27T01:14:00.019Z | DEBG | test_vpcs (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 1968 | 2026-01-27T01:14:00.023Z | TRAC | test_vpcs (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 1969 | 2026-01-27T01:14:00.023Z | DEBG | test_vpcs (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 1970 | 2026-01-27T01:14:00.024Z | DEBG | test_vpcs (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 1971 | 2026-01-27T01:14:00.028Z | TRAC | test_vpcs (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 1972 | 2026-01-27T01:14:00.028Z | DEBG | test_vpcs (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 1973 | 2026-01-27T01:14:00.029Z | DEBG | test_vpcs (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 1974 | 2026-01-27T01:14:00.033Z | TRAC | test_vpcs (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 1975 | 2026-01-27T01:14:00.034Z | DEBG | test_vpcs (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 1976 | 2026-01-27T01:14:00.034Z | DEBG | test_vpcs (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 1977 | 2026-01-27T01:14:00.038Z | TRAC | test_vpcs (InternalApi): authorize begin
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000002, lookup_type: ByName("nexus") }
|
| 1978 | 2026-01-27T01:14:00.038Z | TRAC | test_vpcs (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
resource_id = 001de000-4401-4000-8000-000000000000
resource_type = Project
|
| 1979 | 2026-01-27T01:14:00.038Z | TRAC | test_vpcs (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 1980 | 2026-01-27T01:14:00.038Z | DEBG | test_vpcs (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 1981 | 2026-01-27T01:14:00.039Z | DEBG | test_vpcs (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 1982 | 2026-01-27T01:14:00.042Z | TRAC | test_vpcs (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
resource_id = 001de000-5110-4000-8000-000000000001
resource_type = Silo
|
| 1983 | 2026-01-27T01:14:00.042Z | TRAC | test_vpcs (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 1984 | 2026-01-27T01:14:00.042Z | DEBG | test_vpcs (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 1985 | 2026-01-27T01:14:00.043Z | DEBG | test_vpcs (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 1986 | 2026-01-27T01:14:00.046Z | TRAC | test_vpcs (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 1987 | 2026-01-27T01:14:00.046Z | TRAC | test_vpcs (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 1988 | 2026-01-27T01:14:00.047Z | DEBG | test_vpcs (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 1989 | 2026-01-27T01:14:00.047Z | DEBG | test_vpcs (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 1990 | 2026-01-27T01:14:00.052Z | DEBG | test_vpcs (InternalApi): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 1991 | 2026-01-27T01:14:00.065Z | DEBG | test_vpcs (InternalApi): authorize result
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000002, lookup_type: ByName("nexus") }
result = Ok(())
|
| 1992 | 2026-01-27T01:14:00.065Z | TRAC | test_vpcs (InternalApi): successful lookup of siloed resource "VpcSubnet" using built-in user
|
| 1993 | 2026-01-27T01:14:00.065Z | TRAC | test_vpcs (InternalApi): authorize begin
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000002, lookup_type: ByName("nexus") }
|
| 1994 | 2026-01-27T01:14:00.065Z | TRAC | test_vpcs (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
resource_id = 001de000-4401-4000-8000-000000000000
resource_type = Project
|
| 1995 | 2026-01-27T01:14:00.065Z | TRAC | test_vpcs (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 1996 | 2026-01-27T01:14:00.065Z | DEBG | test_vpcs (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 1997 | 2026-01-27T01:14:00.066Z | DEBG | test_vpcs (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 1998 | 2026-01-27T01:14:00.070Z | TRAC | test_vpcs (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
resource_id = 001de000-5110-4000-8000-000000000001
resource_type = Silo
|
| 1999 | 2026-01-27T01:14:00.070Z | TRAC | test_vpcs (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 2000 | 2026-01-27T01:14:00.070Z | DEBG | test_vpcs (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 2001 | 2026-01-27T01:14:00.071Z | DEBG | test_vpcs (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 2002 | 2026-01-27T01:14:00.075Z | TRAC | test_vpcs (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 2003 | 2026-01-27T01:14:00.075Z | TRAC | test_vpcs (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 2004 | 2026-01-27T01:14:00.075Z | DEBG | test_vpcs (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 2005 | 2026-01-27T01:14:00.076Z | DEBG | test_vpcs (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 2006 | 2026-01-27T01:14:00.080Z | DEBG | test_vpcs (InternalApi): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 2007 | 2026-01-27T01:14:00.097Z | DEBG | test_vpcs (InternalApi): authorize result
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000002, lookup_type: ByName("nexus") }
result = Ok(())
|
| 2008 | 2026-01-27T01:14:00.097Z | TRAC | test_vpcs (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 2009 | 2026-01-27T01:14:00.097Z | DEBG | test_vpcs (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 2010 | 2026-01-27T01:14:00.098Z | DEBG | test_vpcs (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 2011 | 2026-01-27T01:14:00.107Z | DEBG | test_vpcs (nexus): resolved names for firewall rules
instance_interfaces = {}
subnet_interfaces = {Name("external-dns"): [NetworkInterface { id: 47a89b77-3b91-469f-95b1-f4d29dbf1a52, kind: Service { id: 326b5e01-f8e6-4763-80e1-2d51b531f7e2 }, name: Name("external-dns-326b5e01-f8e6-4763-80e1-2d51b531f7e2"), ip_config: V6(PrivateIpv6Config { ip: fd77:e9d2:9cd9:1::6, subnet: Ipv6Net { addr: fd77:e9d2:9cd9:1::, width: 64 }, transit_ips: [] }), mac: MacAddr(MacAddr6([168, 64, 37, 255, 128, 0])), vni: Vni(100), primary: true, slot: 0 }], Name("nexus"): [NetworkInterface { id: 82c3c615-0929-4977-b0aa-1e7826847b55, kind: Service { id: 913233fe-92a8-4635-9572-183f495429c4 }, name: Name("nexus-913233fe-92a8-4635-9572-183f495429c4"), ip_config: V4(PrivateIpv4Config { ip: 172.30.2.6, subnet: Ipv4Net { addr: 172.30.2.0, width: 24 }, transit_ips: [] }), mac: MacAddr(MacAddr6([168, 64, 37, 255, 128, 1])), vni: Vni(100), primary: true, slot: 0 }]}
subnet_networks = {Name("external-dns"): [V4(Ipv4Network { addr: 172.30.1.0, prefix: 24 }), V6(Ipv6Network { addr: fd77:e9d2:9cd9:1::, prefix: 64 })], Name("nexus"): [V4(Ipv4Network { addr: 172.30.2.0, prefix: 24 }), V6(Ipv6Network { addr: fd77:e9d2:9cd9:2::, prefix: 64 })]}
vpc_interfaces = {}
|
| 2012 | 2026-01-27T01:14:00.107Z | TRAC | test_vpcs (InternalApi): authorize begin
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Fleet
|
| 2013 | 2026-01-27T01:14:00.107Z | TRAC | test_vpcs (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 2014 | 2026-01-27T01:14:00.107Z | TRAC | test_vpcs (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 2015 | 2026-01-27T01:14:00.107Z | DEBG | test_vpcs (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 2016 | 2026-01-27T01:14:00.108Z | DEBG | test_vpcs (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 2017 | 2026-01-27T01:14:00.112Z | DEBG | test_vpcs (InternalApi): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 2018 | 2026-01-27T01:14:00.118Z | DEBG | test_vpcs (InternalApi): authorize result
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Fleet
result = Ok(())
|
| 2019 | 2026-01-27T01:14:00.119Z | TRAC | test_vpcs (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 2020 | 2026-01-27T01:14:00.119Z | DEBG | test_vpcs (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 2021 | 2026-01-27T01:14:00.119Z | DEBG | test_vpcs (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 2022 | 2026-01-27T01:14:00.123Z | TRAC | test_vpcs (nexus): fetched allowlist from DB
allowed = AllowList { id: 001de000-a110-4000-8000-000000000000, time_created: 2026-01-26T23:16:37.697587Z, time_modified: 2026-01-27T01:13:59.725232Z, allowed_ips: None }
|
| 2023 | 2026-01-27T01:14:00.123Z | DEBG | test_vpcs (nexus): Allowlist for user-facing services is set to allow any inbound traffic. Existing VPC firewall rules will not be modified.
|
| 2024 | 2026-01-27T01:14:00.123Z | DEBG | test_vpcs (nexus): resolved firewall rules for sled agents
sled_agent_rules = [ResolvedVpcFirewallRule { status: Enabled, direction: Inbound, targets: [NetworkInterface { id: 47a89b77-3b91-469f-95b1-f4d29dbf1a52, kind: Service { id: 326b5e01-f8e6-4763-80e1-2d51b531f7e2 }, name: Name("external-dns-326b5e01-f8e6-4763-80e1-2d51b531f7e2"), ip_config: V6(PrivateIpv6Config { ip: fd77:e9d2:9cd9:1::6, subnet: Ipv6Net { addr: fd77:e9d2:9cd9:1::, width: 64 }, transit_ips: [] }), mac: MacAddr(MacAddr6([168, 64, 37, 255, 128, 0])), vni: Vni(100), primary: true, slot: 0 }], filter_hosts: None, filter_ports: Some([L4PortRange { first: L4Port(53), last: L4Port(53) }]), filter_protocols: Some([Udp]), action: Allow, priority: VpcFirewallRulePriority(65534) }, ResolvedVpcFirewallRule { status: Enabled, direction: Inbound, targets: [NetworkInterface { id: 82c3c615-0929-4977-b0aa-1e7826847b55, kind: Service { id: 913233fe-92a8-4635-9572-183f495429c4 }, name: Name("nexus-913233fe-92a8-4635-9572-183f495429c4"), ip_config: V4(PrivateIpv4Config { ip: 172.30.2.6, subnet: Ipv4Net { addr: 172.30.2.0, width: 24 }, transit_ips: [] }), mac: MacAddr(MacAddr6([168, 64, 37, 255, 128, 1])), vni: Vni(100), primary: true, slot: 0 }, NetworkInterface { id: 47a89b77-3b91-469f-95b1-f4d29dbf1a52, kind: Service { id: 326b5e01-f8e6-4763-80e1-2d51b531f7e2 }, name: Name("external-dns-326b5e01-f8e6-4763-80e1-2d51b531f7e2"), ip_config: V6(PrivateIpv6Config { ip: fd77:e9d2:9cd9:1::6, subnet: Ipv6Net { addr: fd77:e9d2:9cd9:1::, width: 64 }, transit_ips: [] }), mac: MacAddr(MacAddr6([168, 64, 37, 255, 128, 0])), vni: Vni(100), primary: true, slot: 0 }], filter_hosts: None, filter_ports: None, filter_protocols: Some([Icmp(Some(VpcFirewallIcmpFilter { icmp_type: 3, code: Some(IcmpParamRange { first: 3, last: 4 }) })), Icmp(Some(VpcFirewallIcmpFilter { icmp_type: 5, code: None })), Icmp(Some(VpcFirewallIcmpFilter { icmp_type: 11, code: None }))]), action: Allow, priority: VpcFirewallRulePriority(65534) }, ResolvedVpcFirewallRule { status: Enabled, direction: Inbound, targets: [NetworkInterface { id: 82c3c615-0929-4977-b0aa-1e7826847b55, kind: Service { id: 913233fe-92a8-4635-9572-183f495429c4 }, name: Name("nexus-913233fe-92a8-4635-9572-183f495429c4"), ip_config: V4(PrivateIpv4Config { ip: 172.30.2.6, subnet: Ipv4Net { addr: 172.30.2.0, width: 24 }, transit_ips: [] }), mac: MacAddr(MacAddr6([168, 64, 37, 255, 128, 1])), vni: Vni(100), primary: true, slot: 0 }], filter_hosts: None, filter_ports: Some([L4PortRange { first: L4Port(80), last: L4Port(80) }, L4PortRange { first: L4Port(443), last: L4Port(443) }]), filter_protocols: Some([Tcp]), action: Allow, priority: VpcFirewallRulePriority(65534) }]
|
| 2025 | 2026-01-27T01:14:00.123Z | DEBG | test_vpcs (nexus): resolved 3 rules for sleds
|
| 2026 | 2026-01-27T01:14:00.147Z | DEBG | test_vpcs (nexus): resolved sleds for vpc oxide-services
vpc_to_sled = [Sled { identity: SledIdentity { id: b6d65341-167c-41df-9b5c-41cded99c229 (sled), time_created: 2026-01-27T01:13:52.435851Z, time_modified: 2026-01-27T01:13:52.435851Z }, time_deleted: None, rcgen: Generation(Generation(1)), rack_id: c19a698f-c6f9-4a17-ae30-20d711b8f7dc, is_scrimlet: true, serial_number: "SimGimlet00", part_number: "i86pc", revision: SqlU32(3), usable_hardware_threads: SqlU32(16), usable_physical_ram: ByteCount(ByteCount(34359738368)), reservoir_size: ByteCount(ByteCount(17179869184)), ip: ::1, port: SqlU16(59842), last_used_address: ::ffff, policy: InService, state: Active, sled_agent_gen: Generation(Generation(1)), repo_depot_port: SqlU16(50229), cpu_family: AmdMilan }]
|
| 2027 | 2026-01-27T01:14:00.147Z | DEBG | test_vpcs (nexus): sending firewall rules to sled agents
|
| 2028 | 2026-01-27T01:14:00.217Z | TRAC | test_vpcs (InstanceAllocator): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead (built_in_user), .. })
resource = Database
|
| 2029 | 2026-01-27T01:14:00.217Z | DEBG | test_vpcs (InstanceAllocator): roles
roles = RoleSet { roles: {} }
|
| 2030 | 2026-01-27T01:14:00.218Z | DEBG | test_vpcs (InstanceAllocator): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead (built_in_user), .. })
resource = Database
result = Ok(())
|
| 2031 | 2026-01-27T01:14:00.225Z | TRAC | test_vpcs (InstanceAllocator): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead (built_in_user), .. })
resource = Sled { parent: Fleet, key: b6d65341-167c-41df-9b5c-41cded99c229 (sled), lookup_type: ById(b6d65341-167c-41df-9b5c-41cded99c229) }
|
| 2032 | 2026-01-27T01:14:00.225Z | TRAC | test_vpcs (InstanceAllocator): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead (built_in_user), .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 2033 | 2026-01-27T01:14:00.225Z | TRAC | test_vpcs (InstanceAllocator): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead (built_in_user), .. })
resource = Database
|
| 2034 | 2026-01-27T01:14:00.225Z | DEBG | test_vpcs (InstanceAllocator): roles
roles = RoleSet { roles: {} }
|
| 2035 | 2026-01-27T01:14:00.227Z | DEBG | test_vpcs (InstanceAllocator): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead (built_in_user), .. })
resource = Database
result = Ok(())
|
| 2036 | 2026-01-27T01:14:00.230Z | DEBG | test_vpcs (InstanceAllocator): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "viewer")} }
|
| 2037 | 2026-01-27T01:14:00.236Z | DEBG | test_vpcs (InstanceAllocator): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead (built_in_user), .. })
resource = Sled { parent: Fleet, key: b6d65341-167c-41df-9b5c-41cded99c229 (sled), lookup_type: ById(b6d65341-167c-41df-9b5c-41cded99c229) }
result = Ok(())
|
| 2038 | 2026-01-27T01:14:00.236Z | DEBG | test_vpcs (nexus): client request
SledAgent = b6d65341-167c-41df-9b5c-41cded99c229
body = Some(Body)
method = PUT
uri = http://[::1]:59842/vpc/001de000-074c-4000-8000-000000000000/firewall/rules
|
| 2039 | 2026-01-27T01:14:00.238Z | INFO | test_vpcs (dropshot): accepted connection
local_addr = [::1]:59842
remote_addr = [::1]:60896
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
| 2040 | 2026-01-27T01:14:00.240Z | TRAC | test_vpcs (dropshot): incoming request
local_addr = [::1]:59842
method = PUT
remote_addr = [::1]:60896
req_id = f04f8a7c-111d-4aa3-9f54-437280c4a4b8
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
uri = /vpc/001de000-074c-4000-8000-000000000000/firewall/rules
|
| 2041 | 2026-01-27T01:14:00.240Z | DEBG | test_vpcs (dropshot): determined request API version
local_addr = [::1]:59842
method = PUT
remote_addr = [::1]:60896
req_id = f04f8a7c-111d-4aa3-9f54-437280c4a4b8
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
uri = /vpc/001de000-074c-4000-8000-000000000000/firewall/rules
version = 15.0.0
|
| 2042 | 2026-01-27T01:14:00.243Z | INFO | test_vpcs (dropshot): request completed
latency_us = 3304
local_addr = [::1]:59842
method = PUT
remote_addr = [::1]:60896
req_id = f04f8a7c-111d-4aa3-9f54-437280c4a4b8
response_code = 204
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
uri = /vpc/001de000-074c-4000-8000-000000000000/firewall/rules
|
| 2043 | 2026-01-27T01:14:00.243Z | DEBG | test_vpcs (nexus): client response
SledAgent = b6d65341-167c-41df-9b5c-41cded99c229
result = Ok(Response { url: "http://[::1]:59842/vpc/001de000-074c-4000-8000-000000000000/firewall/rules", status: 204, headers: {"x-request-id": "f04f8a7c-111d-4aa3-9f54-437280c4a4b8", "date": "Tue, 27 Jan 2026 01:14:00 GMT"} })
|
| 2044 | 2026-01-27T01:14:00.246Z | INFO | test_vpcs (nexus): updated firewall rules on 1 sleds
|
| 2045 | 2026-01-27T01:14:00.246Z | DEBG | test_vpcs (BackgroundTasks): activating
background_task = dns_config_internal
dns_group = internal
iteration = 2
reason = Signaled
|
| 2046 | 2026-01-27T01:14:00.246Z | DEBG | test_vpcs (BackgroundTasks): reading DNS version
background_task = dns_config_internal
dns_group = internal
|
| 2047 | 2026-01-27T01:14:00.246Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = dns_config_internal
dns_group = internal
resource = Database
|
| 2048 | 2026-01-27T01:14:00.246Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = dns_config_internal
dns_group = internal
roles = RoleSet { roles: {} }
|
| 2049 | 2026-01-27T01:14:00.247Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = dns_config_internal
dns_group = internal
resource = Database
result = Ok(())
|
| 2050 | 2026-01-27T01:14:00.248Z | DEBG | test_vpcs (BackgroundTasks): activating
background_task = dns_servers_internal
dns_group = internal
iteration = 2
reason = Signaled
|
| 2051 | 2026-01-27T01:14:00.248Z | TRAC | test_vpcs (DnsResolver): lookup_all_socket_v6 srv
dns_name = _nameservice._tcp.control-plane.oxide.internal
|
| 2052 | 2026-01-27T01:14:00.249Z | DEBG | test_vpcs (BackgroundTasks): activating
background_task = dns_config_external
dns_group = external
iteration = 2
reason = Signaled
|
| 2053 | 2026-01-27T01:14:00.249Z | DEBG | test_vpcs (BackgroundTasks): reading DNS version
background_task = dns_config_external
dns_group = external
|
| 2054 | 2026-01-27T01:14:00.249Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = dns_config_external
dns_group = external
resource = Database
|
| 2055 | 2026-01-27T01:14:00.249Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = dns_config_external
dns_group = external
roles = RoleSet { roles: {} }
|
| 2056 | 2026-01-27T01:14:00.250Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = dns_config_external
dns_group = external
resource = Database
result = Ok(())
|
| 2057 | 2026-01-27T01:14:00.251Z | DEBG | test_vpcs (BackgroundTasks): activating
background_task = dns_servers_external
dns_group = external
iteration = 2
reason = Signaled
|
| 2058 | 2026-01-27T01:14:00.251Z | TRAC | test_vpcs (DnsResolver): lookup_all_socket_v6 srv
dns_name = _external-dns._tcp.control-plane.oxide.internal
|
| 2059 | 2026-01-27T01:14:00.251Z | DEBG | test_vpcs (BackgroundTasks): activating
background_task = external_endpoints
iteration = 2
reason = Signaled
|
| 2060 | 2026-01-27T01:14:00.252Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = external_endpoints
resource = Fleet
|
| 2061 | 2026-01-27T01:14:00.252Z | TRAC | test_vpcs (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = external_endpoints
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 2062 | 2026-01-27T01:14:00.252Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = external_endpoints
resource = Database
|
| 2063 | 2026-01-27T01:14:00.252Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = external_endpoints
roles = RoleSet { roles: {} }
|
| 2064 | 2026-01-27T01:14:00.253Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = external_endpoints
resource = Database
result = Ok(())
|
| 2065 | 2026-01-27T01:14:00.254Z | DEBG | test_vpcs (BackgroundTasks): activating
background_task = inventory_collection
iteration = 3
reason = Signaled
|
| 2066 | 2026-01-27T01:14:00.254Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Modify
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = inventory_collection
resource = Inventory
|
| 2067 | 2026-01-27T01:14:00.254Z | TRAC | test_vpcs (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = inventory_collection
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 2068 | 2026-01-27T01:14:00.254Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = inventory_collection
resource = Database
|
| 2069 | 2026-01-27T01:14:00.254Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = inventory_collection
roles = RoleSet { roles: {} }
|
| 2070 | 2026-01-27T01:14:00.255Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = inventory_collection
resource = Database
result = Ok(())
|
| 2071 | 2026-01-27T01:14:00.256Z | DEBG | test_vpcs (BackgroundTasks): activating
background_task = blueprint_loader
iteration = 2
reason = Signaled
|
| 2072 | 2026-01-27T01:14:00.256Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = blueprint_loader
resource = BlueprintConfig
|
| 2073 | 2026-01-27T01:14:00.256Z | TRAC | test_vpcs (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = blueprint_loader
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 2074 | 2026-01-27T01:14:00.257Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = blueprint_loader
resource = Database
|
| 2075 | 2026-01-27T01:14:00.257Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = blueprint_loader
roles = RoleSet { roles: {} }
|
| 2076 | 2026-01-27T01:14:00.257Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = blueprint_loader
resource = Database
result = Ok(())
|
| 2077 | 2026-01-27T01:14:00.259Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = dns_config_internal
dns_group = internal
resource = DnsConfig
|
| 2078 | 2026-01-27T01:14:00.260Z | TRAC | test_vpcs (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = dns_config_internal
dns_group = internal
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 2079 | 2026-01-27T01:14:00.260Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = dns_config_internal
dns_group = internal
resource = Database
|
| 2080 | 2026-01-27T01:14:00.261Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = dns_config_internal
dns_group = internal
roles = RoleSet { roles: {} }
|
| 2081 | 2026-01-27T01:14:00.262Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = dns_config_internal
dns_group = internal
resource = Database
result = Ok(())
|
| 2082 | 2026-01-27T01:14:00.264Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = dns_config_external
dns_group = external
resource = DnsConfig
|
| 2083 | 2026-01-27T01:14:00.264Z | TRAC | test_vpcs (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = dns_config_external
dns_group = external
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 2084 | 2026-01-27T01:14:00.264Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = dns_config_external
dns_group = external
resource = Database
|
| 2085 | 2026-01-27T01:14:00.264Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = dns_config_external
dns_group = external
roles = RoleSet { roles: {} }
|
| 2086 | 2026-01-27T01:14:00.265Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = dns_config_external
dns_group = external
resource = Database
result = Ok(())
|
| 2087 | 2026-01-27T01:14:00.269Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = external_endpoints
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 2088 | 2026-01-27T01:14:00.275Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = external_endpoints
resource = Fleet
result = Ok(())
|
| 2089 | 2026-01-27T01:14:00.275Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = external_endpoints
resource = Database
|
| 2090 | 2026-01-27T01:14:00.275Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = external_endpoints
roles = RoleSet { roles: {} }
|
| 2091 | 2026-01-27T01:14:00.276Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = external_endpoints
resource = Database
result = Ok(())
|
| 2092 | 2026-01-27T01:14:00.277Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = blueprint_loader
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 2093 | 2026-01-27T01:14:00.283Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = blueprint_loader
resource = BlueprintConfig
result = Ok(())
|
| 2094 | 2026-01-27T01:14:00.284Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = blueprint_loader
resource = Database
|
| 2095 | 2026-01-27T01:14:00.284Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = blueprint_loader
roles = RoleSet { roles: {} }
|
| 2096 | 2026-01-27T01:14:00.284Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = blueprint_loader
resource = Database
result = Ok(())
|
| 2097 | 2026-01-27T01:14:00.286Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = inventory_collection
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 2098 | 2026-01-27T01:14:00.291Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Modify
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = inventory_collection
resource = Inventory
result = Ok(())
|
| 2099 | 2026-01-27T01:14:00.291Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = inventory_collection
resource = Database
|
| 2100 | 2026-01-27T01:14:00.291Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = inventory_collection
roles = RoleSet { roles: {} }
|
| 2101 | 2026-01-27T01:14:00.291Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = inventory_collection
resource = Database
result = Ok(())
|
| 2102 | 2026-01-27T01:14:00.292Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = dns_config_external
dns_group = external
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 2103 | 2026-01-27T01:14:00.300Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = dns_config_external
dns_group = external
resource = DnsConfig
result = Ok(())
|
| 2104 | 2026-01-27T01:14:00.301Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = dns_config_internal
dns_group = internal
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 2105 | 2026-01-27T01:14:00.314Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = dns_config_internal
dns_group = internal
resource = DnsConfig
result = Ok(())
|
| 2106 | 2026-01-27T01:14:00.320Z | DEBG | test_vpcs (BackgroundTasks): found DNS version
background_task = dns_config_external
dns_group = external
version = 2
|
| 2107 | 2026-01-27T01:14:00.321Z | DEBG | test_vpcs (BackgroundTasks): reading DNS config
background_task = dns_config_external
dns_group = external
|
| 2108 | 2026-01-27T01:14:00.321Z | DEBG | test_vpcs (BackgroundTasks): reading DNS zones
background_task = dns_config_external
dns_group = external
|
| 2109 | 2026-01-27T01:14:00.321Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = dns_config_external
dns_group = external
resource = DnsConfig
|
| 2110 | 2026-01-27T01:14:00.321Z | TRAC | test_vpcs (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = dns_config_external
dns_group = external
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 2111 | 2026-01-27T01:14:00.322Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = dns_config_external
dns_group = external
resource = Database
|
| 2112 | 2026-01-27T01:14:00.322Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = dns_config_external
dns_group = external
roles = RoleSet { roles: {} }
|
| 2113 | 2026-01-27T01:14:00.323Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = dns_config_external
dns_group = external
resource = Database
result = Ok(())
|
| 2114 | 2026-01-27T01:14:00.328Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = blueprint_loader
resource = Blueprint { parent: Fleet, key: c01a6e26-b5bc-40f6-ba41-c1d23b303d2d, lookup_type: ById(c01a6e26-b5bc-40f6-ba41-c1d23b303d2d) }
|
| 2115 | 2026-01-27T01:14:00.328Z | TRAC | test_vpcs (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = blueprint_loader
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 2116 | 2026-01-27T01:14:00.330Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = blueprint_loader
resource = Database
|
| 2117 | 2026-01-27T01:14:00.330Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = blueprint_loader
roles = RoleSet { roles: {} }
|
| 2118 | 2026-01-27T01:14:00.331Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = blueprint_loader
resource = Database
result = Ok(())
|
| 2119 | 2026-01-27T01:14:00.339Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = external_endpoints
resource = DnsConfig
|
| 2120 | 2026-01-27T01:14:00.339Z | TRAC | test_vpcs (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = external_endpoints
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 2121 | 2026-01-27T01:14:00.339Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = external_endpoints
resource = Database
|
| 2122 | 2026-01-27T01:14:00.340Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = external_endpoints
roles = RoleSet { roles: {} }
|
| 2123 | 2026-01-27T01:14:00.341Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = external_endpoints
resource = Database
result = Ok(())
|
| 2124 | 2026-01-27T01:14:00.342Z | DEBG | test_vpcs (BackgroundTasks): inventory_prune_one: nothing eligible for removal (too few)
background_task = inventory_collection
candidates = []
|
| 2125 | 2026-01-27T01:14:00.343Z | TRAC | test_vpcs (DnsResolver): lookup_all_socket_v6 srv
dns_name = _mgs._tcp.control-plane.oxide.internal
|
| 2126 | 2026-01-27T01:14:00.344Z | TRAC | test_vpcs (dns): buffer
buffer = Length: 75 (0x4b) bytes\n0000: ba df 01 00 00 01 00 00 00 00 00 01 0c 5f 6e 61 ............._na\n0010: 6d 65 73 65 72 76 69 63 65 04 5f 74 63 70 0d 63 meservice._tcp.c\n0020: 6f 6e 74 72 6f 6c 2d 70 6c 61 6e 65 05 6f 78 69 ontrol-plane.oxi\n0030: 64 65 08 69 6e 74 65 72 6e 61 6c 00 00 21 00 01 de.internal..!..\n0040: 00 00 29 04 d0 00 00 00 00 00 00 ..)........
kind = dns
peer_addr = [::1]:51089
req_id = b4e04ac7-ed38-4f27-aadf-bd0a2cc6eb85
|
| 2127 | 2026-01-27T01:14:00.344Z | DEBG | test_vpcs (dns): message_request
kind = dns
mr = MessageRequest {\n header: Header {\n id: 47839,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n queries: Queries {\n queries: [\n LowerQuery {\n name: LowerName(\n Name("_nameservice._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_nameservice._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n ],\n original: [\n 12,\n 95,\n 110,\n 97,\n 109,\n 101,\n 115,\n 101,\n 114,\n 118,\n 105,\n 99,\n 101,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n flags: EdnsFlags {\n dnssec_ok: false,\n z: 0,\n },\n max_payload: 1232,\n options: OPT {\n options: [],\n },\n },\n ),\n}
peer_addr = [::1]:51089
req_id = b4e04ac7-ed38-4f27-aadf-bd0a2cc6eb85
|
| 2128 | 2026-01-27T01:14:00.346Z | DEBG | test_vpcs (store): query key
key = _nameservice._tcp
|
| 2129 | 2026-01-27T01:14:00.346Z | DEBG | test_vpcs (store): query key
key = fb7e8b12-2b9b-4970-85ca-299c62844890.host
|
| 2130 | 2026-01-27T01:14:00.346Z | DEBG | test_vpcs (dns): dns response
additional_records = [Record { name_labels: Name("fb7e8b12-2b9b-4970-85ca-299c62844890.host.control-plane.oxide.internal"), dns_class: IN, ttl: 0, rdata: AAAA(AAAA(::1)) }]
kind = dns
peer_addr = [::1]:51089
query = LowerQuery { name: LowerName(Name("_nameservice._tcp.control-plane.oxide.internal.")), original: Query { name: Name("_nameservice._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN } }
records = [Record { name_labels: Name("_nameservice._tcp.control-plane.oxide.internal."), dns_class: IN, ttl: 0, rdata: SRV(SRV { priority: 0, weight: 0, port: 65457, target: Name("fb7e8b12-2b9b-4970-85ca-299c62844890.host.control-plane.oxide.internal") }) }]
req_id = b4e04ac7-ed38-4f27-aadf-bd0a2cc6eb85
|
| 2131 | 2026-01-27T01:14:00.346Z | TRAC | test_vpcs (dns): buffer
buffer = Length: 76 (0x4c) bytes\n0000: 14 3a 01 00 00 01 00 00 00 00 00 01 0d 5f 65 78 .:..........._ex\n0010: 74 65 72 6e 61 6c 2d 64 6e 73 04 5f 74 63 70 0d ternal-dns._tcp.\n0020: 63 6f 6e 74 72 6f 6c 2d 70 6c 61 6e 65 05 6f 78 control-plane.ox\n0030: 69 64 65 08 69 6e 74 65 72 6e 61 6c 00 00 21 00 ide.internal..!.\n0040: 01 00 00 29 04 d0 00 00 00 00 00 00 ...)........
kind = dns
peer_addr = [::1]:33484
req_id = 28edd0f7-eaaf-4a58-b70b-10607697fe07
|
| 2132 | 2026-01-27T01:14:00.346Z | DEBG | test_vpcs (dns): message_request
kind = dns
mr = MessageRequest {\n header: Header {\n id: 5178,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n queries: Queries {\n queries: [\n LowerQuery {\n name: LowerName(\n Name("_external-dns._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_external-dns._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n ],\n original: [\n 13,\n 95,\n 101,\n 120,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 45,\n 100,\n 110,\n 115,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n flags: EdnsFlags {\n dnssec_ok: false,\n z: 0,\n },\n max_payload: 1232,\n options: OPT {\n options: [],\n },\n },\n ),\n}
peer_addr = [::1]:33484
req_id = 28edd0f7-eaaf-4a58-b70b-10607697fe07
|
| 2133 | 2026-01-27T01:14:00.346Z | DEBG | test_vpcs (store): query key
key = _external-dns._tcp
|
| 2134 | 2026-01-27T01:14:00.346Z | DEBG | test_vpcs (store): query key
key = 326b5e01-f8e6-4763-80e1-2d51b531f7e2.host
|
| 2135 | 2026-01-27T01:14:00.346Z | DEBG | test_vpcs (dns): dns response
additional_records = [Record { name_labels: Name("326b5e01-f8e6-4763-80e1-2d51b531f7e2.host.control-plane.oxide.internal"), dns_class: IN, ttl: 0, rdata: AAAA(AAAA(::1)) }]
kind = dns
peer_addr = [::1]:33484
query = LowerQuery { name: LowerName(Name("_external-dns._tcp.control-plane.oxide.internal.")), original: Query { name: Name("_external-dns._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN } }
records = [Record { name_labels: Name("_external-dns._tcp.control-plane.oxide.internal."), dns_class: IN, ttl: 0, rdata: SRV(SRV { priority: 0, weight: 0, port: 53796, target: Name("326b5e01-f8e6-4763-80e1-2d51b531f7e2.host.control-plane.oxide.internal") }) }]
req_id = 28edd0f7-eaaf-4a58-b70b-10607697fe07
|
| 2136 | 2026-01-27T01:14:00.346Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = dns_config_external
dns_group = external
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 2137 | 2026-01-27T01:14:00.370Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = dns_config_external
dns_group = external
resource = DnsConfig
result = Ok(())
|
| 2138 | 2026-01-27T01:14:00.370Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = dns_config_external
dns_group = external
resource = Database
|
| 2139 | 2026-01-27T01:14:00.371Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = dns_config_external
dns_group = external
roles = RoleSet { roles: {} }
|
| 2140 | 2026-01-27T01:14:00.372Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = dns_config_external
dns_group = external
resource = Database
result = Ok(())
|
| 2141 | 2026-01-27T01:14:00.374Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = blueprint_loader
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 2142 | 2026-01-27T01:14:00.382Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = blueprint_loader
resource = Blueprint { parent: Fleet, key: c01a6e26-b5bc-40f6-ba41-c1d23b303d2d, lookup_type: ById(c01a6e26-b5bc-40f6-ba41-c1d23b303d2d) }
result = Ok(())
|
| 2143 | 2026-01-27T01:14:00.382Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = blueprint_loader
resource = Database
|
| 2144 | 2026-01-27T01:14:00.382Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = blueprint_loader
roles = RoleSet { roles: {} }
|
| 2145 | 2026-01-27T01:14:00.383Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = blueprint_loader
resource = Database
result = Ok(())
|
| 2146 | 2026-01-27T01:14:00.385Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = external_endpoints
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 2147 | 2026-01-27T01:14:00.393Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = external_endpoints
resource = DnsConfig
result = Ok(())
|
| 2148 | 2026-01-27T01:14:00.393Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = external_endpoints
resource = Database
|
| 2149 | 2026-01-27T01:14:00.393Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = external_endpoints
roles = RoleSet { roles: {} }
|
| 2150 | 2026-01-27T01:14:00.394Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = external_endpoints
resource = Database
result = Ok(())
|
| 2151 | 2026-01-27T01:14:00.396Z | DEBG | test_vpcs (BackgroundTasks): found DNS version
background_task = dns_config_internal
dns_group = internal
version = 1
|
| 2152 | 2026-01-27T01:14:00.396Z | DEBG | test_vpcs (BackgroundTasks): reading DNS config
background_task = dns_config_internal
dns_group = internal
|
| 2153 | 2026-01-27T01:14:00.396Z | DEBG | test_vpcs (BackgroundTasks): reading DNS zones
background_task = dns_config_internal
dns_group = internal
|
| 2154 | 2026-01-27T01:14:00.396Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = dns_config_internal
dns_group = internal
resource = DnsConfig
|
| 2155 | 2026-01-27T01:14:00.396Z | TRAC | test_vpcs (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = dns_config_internal
dns_group = internal
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 2156 | 2026-01-27T01:14:00.396Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = dns_config_internal
dns_group = internal
resource = Database
|
| 2157 | 2026-01-27T01:14:00.396Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = dns_config_internal
dns_group = internal
roles = RoleSet { roles: {} }
|
| 2158 | 2026-01-27T01:14:00.397Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = dns_config_internal
dns_group = internal
resource = Database
result = Ok(())
|
| 2159 | 2026-01-27T01:14:00.400Z | DEBG | test_vpcs (BackgroundTasks): found zones
background_task = dns_config_external
count = 1
dns_group = external
|
| 2160 | 2026-01-27T01:14:00.401Z | DEBG | test_vpcs (BackgroundTasks): listing DNS names for zone
background_task = dns_config_external
batch_size = 100
dns_group = external
dns_zone_id = caa7f690-ad7f-43a1-8d87-36366c8aac91
dns_zone_name = oxide-dev.test
found_so_far = 0
version = 2
|
| 2161 | 2026-01-27T01:14:00.401Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = dns_config_external
dns_group = external
resource = DnsConfig
|
| 2162 | 2026-01-27T01:14:00.401Z | TRAC | test_vpcs (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = dns_config_external
dns_group = external
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 2163 | 2026-01-27T01:14:00.402Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = dns_config_external
dns_group = external
resource = Database
|
| 2164 | 2026-01-27T01:14:00.402Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = dns_config_external
dns_group = external
roles = RoleSet { roles: {} }
|
| 2165 | 2026-01-27T01:14:00.402Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = dns_config_external
dns_group = external
resource = Database
result = Ok(())
|
| 2166 | 2026-01-27T01:14:00.406Z | DEBG | test_vpcs (DnsResolver): lookup_all_socket_v6 srv
dns_name = _nameservice._tcp.control-plane.oxide.internal
response = SrvLookup(Lookup { query: Query { name: Name("_nameservice._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN }, records: [Record { name_labels: Name("_nameservice._tcp.control-plane.oxide.internal."), dns_class: IN, ttl: 0, rdata: SRV(SRV { priority: 0, weight: 0, port: 65457, target: Name("fb7e8b12-2b9b-4970-85ca-299c62844890.host.control-plane.oxide.internal.") }) }, Record { name_labels: Name("fb7e8b12-2b9b-4970-85ca-299c62844890.host.control-plane.oxide.internal."), dns_class: IN, ttl: 0, rdata: AAAA(AAAA(::1)) }], valid_until: Instant { tv_sec: 10282, tv_nsec: 216276734 } })
|
| 2167 | 2026-01-27T01:14:00.406Z | TRAC | test_vpcs (DnsResolver): lookup_service_targets: looking up SRV target
|
| 2168 | 2026-01-27T01:14:00.407Z | DEBG | test_vpcs (DnsResolver): lookup_all_socket_v6 srv
dns_name = _external-dns._tcp.control-plane.oxide.internal
response = SrvLookup(Lookup { query: Query { name: Name("_external-dns._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN }, records: [Record { name_labels: Name("_external-dns._tcp.control-plane.oxide.internal."), dns_class: IN, ttl: 0, rdata: SRV(SRV { priority: 0, weight: 0, port: 53796, target: Name("326b5e01-f8e6-4763-80e1-2d51b531f7e2.host.control-plane.oxide.internal.") }) }, Record { name_labels: Name("326b5e01-f8e6-4763-80e1-2d51b531f7e2.host.control-plane.oxide.internal."), dns_class: IN, ttl: 0, rdata: AAAA(AAAA(::1)) }], valid_until: Instant { tv_sec: 10282, tv_nsec: 217195108 } })
|
| 2169 | 2026-01-27T01:14:00.407Z | TRAC | test_vpcs (DnsResolver): lookup_service_targets: looking up SRV target
|
| 2170 | 2026-01-27T01:14:00.407Z | TRAC | test_vpcs (dns): buffer
buffer = Length: 67 (0x43) bytes\n0000: 5d f6 01 00 00 01 00 00 00 00 00 01 04 5f 6d 67 ]............_mg\n0010: 73 04 5f 74 63 70 0d 63 6f 6e 74 72 6f 6c 2d 70 s._tcp.control-p\n0020: 6c 61 6e 65 05 6f 78 69 64 65 08 69 6e 74 65 72 lane.oxide.inter\n0030: 6e 61 6c 00 00 21 00 01 00 00 29 04 d0 00 00 00 nal..!....).....\n0040: 00 00 00 ...
kind = dns
peer_addr = [::1]:33899
req_id = 2d3eb5e9-1d25-4bba-bb57-50f7ef4edbd1
|
| 2171 | 2026-01-27T01:14:00.408Z | DEBG | test_vpcs (dns): message_request
kind = dns
mr = MessageRequest {\n header: Header {\n id: 24054,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n queries: Queries {\n queries: [\n LowerQuery {\n name: LowerName(\n Name("_mgs._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_mgs._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n ],\n original: [\n 4,\n 95,\n 109,\n 103,\n 115,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n flags: EdnsFlags {\n dnssec_ok: false,\n z: 0,\n },\n max_payload: 1232,\n options: OPT {\n options: [],\n },\n },\n ),\n}
peer_addr = [::1]:33899
req_id = 2d3eb5e9-1d25-4bba-bb57-50f7ef4edbd1
|
| 2172 | 2026-01-27T01:14:00.408Z | DEBG | test_vpcs (store): query key
key = _mgs._tcp
|
| 2173 | 2026-01-27T01:14:00.408Z | DEBG | test_vpcs (store): query key
key = dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host
|
| 2174 | 2026-01-27T01:14:00.408Z | DEBG | test_vpcs (dns): dns response
additional_records = [Record { name_labels: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal"), dns_class: IN, ttl: 0, rdata: AAAA(AAAA(::1)) }]
kind = dns
peer_addr = [::1]:33899
query = LowerQuery { name: LowerName(Name("_mgs._tcp.control-plane.oxide.internal.")), original: Query { name: Name("_mgs._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN } }
records = [Record { name_labels: Name("_mgs._tcp.control-plane.oxide.internal."), dns_class: IN, ttl: 0, rdata: SRV(SRV { priority: 0, weight: 0, port: 52572, target: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal") }) }]
req_id = 2d3eb5e9-1d25-4bba-bb57-50f7ef4edbd1
|
| 2175 | 2026-01-27T01:14:00.409Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = dns_config_internal
dns_group = internal
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 2176 | 2026-01-27T01:14:00.421Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = dns_config_internal
dns_group = internal
resource = DnsConfig
result = Ok(())
|
| 2177 | 2026-01-27T01:14:00.421Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = dns_config_internal
dns_group = internal
resource = Database
|
| 2178 | 2026-01-27T01:14:00.421Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = dns_config_internal
dns_group = internal
roles = RoleSet { roles: {} }
|
| 2179 | 2026-01-27T01:14:00.421Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = dns_config_internal
dns_group = internal
resource = Database
result = Ok(())
|
| 2180 | 2026-01-27T01:14:00.427Z | DEBG | test_vpcs (DnsResolver): lookup_all_socket_v6 srv
dns_name = _mgs._tcp.control-plane.oxide.internal
response = SrvLookup(Lookup { query: Query { name: Name("_mgs._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN }, records: [Record { name_labels: Name("_mgs._tcp.control-plane.oxide.internal."), dns_class: IN, ttl: 0, rdata: SRV(SRV { priority: 0, weight: 0, port: 52572, target: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal.") }) }, Record { name_labels: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."), dns_class: IN, ttl: 0, rdata: AAAA(AAAA(::1)) }], valid_until: Instant { tv_sec: 10282, tv_nsec: 237668165 } })
|
| 2181 | 2026-01-27T01:14:00.428Z | TRAC | test_vpcs (DnsResolver): lookup_service_targets: looking up SRV target
|
| 2182 | 2026-01-27T01:14:00.430Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = dns_config_external
dns_group = external
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 2183 | 2026-01-27T01:14:00.443Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = dns_config_external
dns_group = external
resource = DnsConfig
result = Ok(())
|
| 2184 | 2026-01-27T01:14:00.443Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = dns_config_external
dns_group = external
resource = Database
|
| 2185 | 2026-01-27T01:14:00.443Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = dns_config_external
dns_group = external
roles = RoleSet { roles: {} }
|
| 2186 | 2026-01-27T01:14:00.444Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = dns_config_external
dns_group = external
resource = Database
result = Ok(())
|
| 2187 | 2026-01-27T01:14:00.450Z | DEBG | test_vpcs (BackgroundTasks): found zones
background_task = dns_config_internal
count = 1
dns_group = internal
|
| 2188 | 2026-01-27T01:14:00.450Z | DEBG | test_vpcs (BackgroundTasks): listing DNS names for zone
background_task = dns_config_internal
batch_size = 100
dns_group = internal
dns_zone_id = 591858b1-b2c8-411c-bb48-12ff5a469cf6
dns_zone_name = control-plane.oxide.internal
found_so_far = 0
version = 1
|
| 2189 | 2026-01-27T01:14:00.450Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = dns_config_internal
dns_group = internal
resource = DnsConfig
|
| 2190 | 2026-01-27T01:14:00.459Z | TRAC | test_vpcs (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = dns_config_internal
dns_group = internal
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 2191 | 2026-01-27T01:14:00.459Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = dns_config_internal
dns_group = internal
resource = Database
|
| 2192 | 2026-01-27T01:14:00.459Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = dns_config_internal
dns_group = internal
roles = RoleSet { roles: {} }
|
| 2193 | 2026-01-27T01:14:00.460Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = dns_config_internal
dns_group = internal
resource = Database
result = Ok(())
|
| 2194 | 2026-01-27T01:14:00.480Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = external_endpoints
resource = Fleet
|
| 2195 | 2026-01-27T01:14:00.481Z | TRAC | test_vpcs (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = external_endpoints
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 2196 | 2026-01-27T01:14:00.481Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = external_endpoints
resource = Database
|
| 2197 | 2026-01-27T01:14:00.481Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = external_endpoints
roles = RoleSet { roles: {} }
|
| 2198 | 2026-01-27T01:14:00.481Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = external_endpoints
resource = Database
result = Ok(())
|
| 2199 | 2026-01-27T01:14:00.481Z | DEBG | test_vpcs (BackgroundTasks): found all DNS names for zone
background_task = dns_config_external
dns_group = external
dns_zone_id = caa7f690-ad7f-43a1-8d87-36366c8aac91
dns_zone_name = oxide-dev.test
found_so_far = 3
version = 2
|
| 2200 | 2026-01-27T01:14:00.481Z | DEBG | test_vpcs (BackgroundTasks): read DNS config
background_task = dns_config_external
dns_group = external
nzones = 1
version = 2
|
| 2201 | 2026-01-27T01:14:00.481Z | INFO | test_vpcs (BackgroundTasks): found latest generation (first find)
background_task = dns_config_external
dns_group = external
generation = 2
|
| 2202 | 2026-01-27T01:14:00.481Z | DEBG | test_vpcs (BackgroundTasks): activation complete
background_task = dns_config_external
dns_group = external
elapsed = 230.055457ms
iteration = 2
status = {"generation":2}
|
| 2203 | 2026-01-27T01:14:00.481Z | DEBG | test_vpcs (BackgroundTasks): activating
background_task = dns_propagation_external
dns_group = external
iteration = 2
reason = Dependency
|
| 2204 | 2026-01-27T01:14:00.481Z | WARN | test_vpcs (BackgroundTasks): DNS propagation: skipped
background_task = dns_propagation_external
dns_group = external
reason = no servers
|
| 2205 | 2026-01-27T01:14:00.481Z | DEBG | test_vpcs (BackgroundTasks): activation complete
background_task = dns_propagation_external
dns_group = external
elapsed = 58.555\u{b5}s
iteration = 2
status = {"error":"no servers"}
|
| 2206 | 2026-01-27T01:14:00.483Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = dns_config_internal
dns_group = internal
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 2207 | 2026-01-27T01:14:00.491Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = dns_config_internal
dns_group = internal
resource = DnsConfig
result = Ok(())
|
| 2208 | 2026-01-27T01:14:00.491Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = dns_config_internal
dns_group = internal
resource = Database
|
| 2209 | 2026-01-27T01:14:00.491Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = dns_config_internal
dns_group = internal
roles = RoleSet { roles: {} }
|
| 2210 | 2026-01-27T01:14:00.492Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = dns_config_internal
dns_group = internal
resource = Database
result = Ok(())
|
| 2211 | 2026-01-27T01:14:00.502Z | TRAC | test_vpcs (dns): buffer
buffer = Length: 99 (0x63) bytes\n0000: 14 e5 01 00 00 01 00 00 00 00 00 01 24 66 62 37 ............$fb7\n0010: 65 38 62 31 32 2d 32 62 39 62 2d 34 39 37 30 2d e8b12-2b9b-4970-\n0020: 38 35 63 61 2d 32 39 39 63 36 32 38 34 34 38 39 85ca-299c6284489\n0030: 30 04 68 6f 73 74 0d 63 6f 6e 74 72 6f 6c 2d 70 0.host.control-p\n0040: 6c 61 6e 65 05 6f 78 69 64 65 08 69 6e 74 65 72 lane.oxide.inter\n0050: 6e 61 6c 00 00 1c 00 01 00 00 29 04 d0 00 00 00 nal.......).....\n0060: 00 00 00 ...
kind = dns
peer_addr = [::1]:40626
req_id = 4012e00a-d7d0-4ffa-bc6f-2dcd9ebf2474
|
| 2212 | 2026-01-27T01:14:00.502Z | DEBG | test_vpcs (dns): message_request
kind = dns
mr = MessageRequest {\n header: Header {\n id: 5349,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n queries: Queries {\n queries: [\n LowerQuery {\n name: LowerName(\n Name("fb7e8b12-2b9b-4970-85ca-299c62844890.host.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("fb7e8b12-2b9b-4970-85ca-299c62844890.host.control-plane.oxide.internal."),\n query_type: AAAA,\n query_class: IN,\n },\n },\n ],\n original: [\n 36,\n 102,\n 98,\n 55,\n 101,\n 56,\n 98,\n 49,\n 50,\n 45,\n 50,\n 98,\n 57,\n 98,\n 45,\n 52,\n 57,\n 55,\n 48,\n 45,\n 56,\n 53,\n 99,\n 97,\n 45,\n 50,\n 57,\n 57,\n 99,\n 54,\n 50,\n 56,\n 52,\n 52,\n 56,\n 57,\n 48,\n 4,\n 104,\n 111,\n 115,\n 116,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 28,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n flags: EdnsFlags {\n dnssec_ok: false,\n z: 0,\n },\n max_payload: 1232,\n options: OPT {\n options: [],\n },\n },\n ),\n}
peer_addr = [::1]:40626
req_id = 4012e00a-d7d0-4ffa-bc6f-2dcd9ebf2474
|
| 2213 | 2026-01-27T01:14:00.503Z | DEBG | test_vpcs (store): query key
key = fb7e8b12-2b9b-4970-85ca-299c62844890.host
|
| 2214 | 2026-01-27T01:14:00.503Z | DEBG | test_vpcs (dns): dns response
additional_records = []
kind = dns
peer_addr = [::1]:40626
query = LowerQuery { name: LowerName(Name("fb7e8b12-2b9b-4970-85ca-299c62844890.host.control-plane.oxide.internal.")), original: Query { name: Name("fb7e8b12-2b9b-4970-85ca-299c62844890.host.control-plane.oxide.internal."), query_type: AAAA, query_class: IN } }
records = [Record { name_labels: Name("fb7e8b12-2b9b-4970-85ca-299c62844890.host.control-plane.oxide.internal."), dns_class: IN, ttl: 0, rdata: AAAA(AAAA(::1)) }]
req_id = 4012e00a-d7d0-4ffa-bc6f-2dcd9ebf2474
|
| 2215 | 2026-01-27T01:14:00.503Z | TRAC | test_vpcs (dns): buffer
buffer = Length: 99 (0x63) bytes\n0000: 27 f2 01 00 00 01 00 00 00 00 00 01 24 33 32 36 '...........$326\n0010: 62 35 65 30 31 2d 66 38 65 36 2d 34 37 36 33 2d b5e01-f8e6-4763-\n0020: 38 30 65 31 2d 32 64 35 31 62 35 33 31 66 37 65 80e1-2d51b531f7e\n0030: 32 04 68 6f 73 74 0d 63 6f 6e 74 72 6f 6c 2d 70 2.host.control-p\n0040: 6c 61 6e 65 05 6f 78 69 64 65 08 69 6e 74 65 72 lane.oxide.inter\n0050: 6e 61 6c 00 00 1c 00 01 00 00 29 04 d0 00 00 00 nal.......).....\n0060: 00 00 00 ...
kind = dns
peer_addr = [::1]:24110
req_id = 6aa226f9-d432-401c-a641-3b5c5f622b2a
|
| 2216 | 2026-01-27T01:14:00.504Z | DEBG | test_vpcs (dns): message_request
kind = dns
mr = MessageRequest {\n header: Header {\n id: 10226,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n queries: Queries {\n queries: [\n LowerQuery {\n name: LowerName(\n Name("326b5e01-f8e6-4763-80e1-2d51b531f7e2.host.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("326b5e01-f8e6-4763-80e1-2d51b531f7e2.host.control-plane.oxide.internal."),\n query_type: AAAA,\n query_class: IN,\n },\n },\n ],\n original: [\n 36,\n 51,\n 50,\n 54,\n 98,\n 53,\n 101,\n 48,\n 49,\n 45,\n 102,\n 56,\n 101,\n 54,\n 45,\n 52,\n 55,\n 54,\n 51,\n 45,\n 56,\n 48,\n 101,\n 49,\n 45,\n 50,\n 100,\n 53,\n 49,\n 98,\n 53,\n 51,\n 49,\n 102,\n 55,\n 101,\n 50,\n 4,\n 104,\n 111,\n 115,\n 116,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 28,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n flags: EdnsFlags {\n dnssec_ok: false,\n z: 0,\n },\n max_payload: 1232,\n options: OPT {\n options: [],\n },\n },\n ),\n}
peer_addr = [::1]:24110
req_id = 6aa226f9-d432-401c-a641-3b5c5f622b2a
|
| 2217 | 2026-01-27T01:14:00.504Z | DEBG | test_vpcs (store): query key
key = 326b5e01-f8e6-4763-80e1-2d51b531f7e2.host
|
| 2218 | 2026-01-27T01:14:00.504Z | DEBG | test_vpcs (dns): dns response
additional_records = []
kind = dns
peer_addr = [::1]:24110
query = LowerQuery { name: LowerName(Name("326b5e01-f8e6-4763-80e1-2d51b531f7e2.host.control-plane.oxide.internal.")), original: Query { name: Name("326b5e01-f8e6-4763-80e1-2d51b531f7e2.host.control-plane.oxide.internal."), query_type: AAAA, query_class: IN } }
records = [Record { name_labels: Name("326b5e01-f8e6-4763-80e1-2d51b531f7e2.host.control-plane.oxide.internal."), dns_class: IN, ttl: 0, rdata: AAAA(AAAA(::1)) }]
req_id = 6aa226f9-d432-401c-a641-3b5c5f622b2a
|
| 2219 | 2026-01-27T01:14:00.504Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = external_endpoints
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 2220 | 2026-01-27T01:14:00.508Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = external_endpoints
resource = Fleet
result = Ok(())
|
| 2221 | 2026-01-27T01:14:00.509Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = external_endpoints
resource = Database
|
| 2222 | 2026-01-27T01:14:00.509Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = external_endpoints
roles = RoleSet { roles: {} }
|
| 2223 | 2026-01-27T01:14:00.509Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = external_endpoints
resource = Database
result = Ok(())
|
| 2224 | 2026-01-27T01:14:00.512Z | DEBG | test_vpcs (BackgroundTasks): found all DNS names for zone
background_task = dns_config_internal
dns_group = internal
dns_zone_id = 591858b1-b2c8-411c-bb48-12ff5a469cf6
dns_zone_name = control-plane.oxide.internal
found_so_far = 27
version = 1
|
| 2225 | 2026-01-27T01:14:00.514Z | DEBG | test_vpcs (BackgroundTasks): read DNS config
background_task = dns_config_internal
dns_group = internal
nzones = 1
version = 1
|
| 2226 | 2026-01-27T01:14:00.514Z | INFO | test_vpcs (BackgroundTasks): found latest generation (first find)
background_task = dns_config_internal
dns_group = internal
generation = 1
|
| 2227 | 2026-01-27T01:14:00.514Z | DEBG | test_vpcs (BackgroundTasks): activation complete
background_task = dns_config_internal
dns_group = internal
elapsed = 266.196081ms
iteration = 2
status = {"generation":1}
|
| 2228 | 2026-01-27T01:14:00.514Z | DEBG | test_vpcs (BackgroundTasks): activating
background_task = dns_propagation_internal
dns_group = internal
iteration = 2
reason = Dependency
|
| 2229 | 2026-01-27T01:14:00.514Z | WARN | test_vpcs (BackgroundTasks): DNS propagation: skipped
background_task = dns_propagation_internal
dns_group = internal
reason = no servers
|
| 2230 | 2026-01-27T01:14:00.514Z | DEBG | test_vpcs (BackgroundTasks): activation complete
background_task = dns_propagation_internal
dns_group = internal
elapsed = 60.149\u{b5}s
iteration = 2
status = {"error":"no servers"}
|
| 2231 | 2026-01-27T01:14:00.514Z | INFO | test_vpcs (BackgroundTasks): found DNS servers (initial)
addresses = DnsServersList { addresses: [[::1]:65457] }
background_task = dns_servers_internal
dns_group = internal
|
| 2232 | 2026-01-27T01:14:00.515Z | DEBG | test_vpcs (BackgroundTasks): activation complete
background_task = dns_servers_internal
dns_group = internal
elapsed = 265.094087ms
iteration = 2
status = {"addresses":["[::1]:65457"]}
|
| 2233 | 2026-01-27T01:14:00.515Z | INFO | test_vpcs (BackgroundTasks): found DNS servers (initial)
addresses = DnsServersList { addresses: [[::1]:53796] }
background_task = dns_servers_external
dns_group = external
|
| 2234 | 2026-01-27T01:14:00.515Z | DEBG | test_vpcs (BackgroundTasks): activation complete
background_task = dns_servers_external
dns_group = external
elapsed = 263.03929ms
iteration = 2
status = {"addresses":["[::1]:53796"]}
|
| 2235 | 2026-01-27T01:14:00.515Z | TRAC | test_vpcs (dns): buffer
buffer = Length: 108 (0x6c) bytes\n0000: 86 e2 01 00 00 01 00 00 00 00 00 01 2d 64 65 6e ............-den\n0010: 64 72 69 74 65 2d 62 36 64 36 35 33 34 31 2d 31 drite-b6d65341-1\n0020: 36 37 63 2d 34 31 64 66 2d 39 62 35 63 2d 34 31 67c-41df-9b5c-41\n0030: 63 64 65 64 39 39 63 32 32 39 04 68 6f 73 74 0d cded99c229.host.\n0040: 63 6f 6e 74 72 6f 6c 2d 70 6c 61 6e 65 05 6f 78 control-plane.ox\n0050: 69 64 65 08 69 6e 74 65 72 6e 61 6c 00 00 1c 00 ide.internal....\n0060: 01 00 00 29 04 d0 00 00 00 00 00 00 ...)........
kind = dns
peer_addr = [::1]:21596
req_id = 5092958d-d546-4961-91bf-ada45d1a40d0
|
| 2236 | 2026-01-27T01:14:00.515Z | DEBG | test_vpcs (dns): message_request
kind = dns
mr = MessageRequest {\n header: Header {\n id: 34530,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n queries: Queries {\n queries: [\n LowerQuery {\n name: LowerName(\n Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."),\n query_type: AAAA,\n query_class: IN,\n },\n },\n ],\n original: [\n 45,\n 100,\n 101,\n 110,\n 100,\n 114,\n 105,\n 116,\n 101,\n 45,\n 98,\n 54,\n 100,\n 54,\n 53,\n 51,\n 52,\n 49,\n 45,\n 49,\n 54,\n 55,\n 99,\n 45,\n 52,\n 49,\n 100,\n 102,\n 45,\n 57,\n 98,\n 53,\n 99,\n 45,\n 52,\n 49,\n 99,\n 100,\n 101,\n 100,\n 57,\n 57,\n 99,\n 50,\n 50,\n 57,\n 4,\n 104,\n 111,\n 115,\n 116,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 28,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n flags: EdnsFlags {\n dnssec_ok: false,\n z: 0,\n },\n max_payload: 1232,\n options: OPT {\n options: [],\n },\n },\n ),\n}
peer_addr = [::1]:21596
req_id = 5092958d-d546-4961-91bf-ada45d1a40d0
|
| 2237 | 2026-01-27T01:14:00.515Z | DEBG | test_vpcs (store): query key
key = dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host
|
| 2238 | 2026-01-27T01:14:00.515Z | DEBG | test_vpcs (dns): dns response
additional_records = []
kind = dns
peer_addr = [::1]:21596
query = LowerQuery { name: LowerName(Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal.")), original: Query { name: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."), query_type: AAAA, query_class: IN } }
records = [Record { name_labels: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."), dns_class: IN, ttl: 0, rdata: AAAA(AAAA(::1)) }]
req_id = 5092958d-d546-4961-91bf-ada45d1a40d0
|
| 2239 | 2026-01-27T01:14:00.516Z | DEBG | test_vpcs (BackgroundTasks): activating
background_task = dns_propagation_internal
dns_group = internal
iteration = 3
reason = Dependency
|
| 2240 | 2026-01-27T01:14:00.597Z | DEBG | test_vpcs (BackgroundTasks): client request
background_task = dns_propagation_internal
body = Some(Body)
dns_group = internal
dns_server_url = http://[::1]:65457
generation = 1
method = PUT
servers = DnsServersList { addresses: [[::1]:65457] }
uri = http://[::1]:65457/config
|
| 2241 | 2026-01-27T01:14:00.597Z | DEBG | test_vpcs (BackgroundTasks): activating
background_task = dns_propagation_external
dns_group = external
iteration = 3
reason = Dependency
|
| 2242 | 2026-01-27T01:14:00.693Z | DEBG | test_vpcs (BackgroundTasks): client request
background_task = dns_propagation_external
body = Some(Body)
dns_group = external
dns_server_url = http://[::1]:53796
generation = 2
method = PUT
servers = DnsServersList { addresses: [[::1]:53796] }
uri = http://[::1]:53796/config
|
| 2243 | 2026-01-27T01:14:00.696Z | INFO | test_vpcs (BackgroundTasks): found Silo/DNS/TLS config (initial)
background_task = external_endpoints
config = ExternalEndpoints { by_dns_name: {"default-silo.sys.oxide-dev.test": ExternalEndpoint { silo_id: 001de000-5110-4000-8000-000000000000, db_silo: Silo { identity: SiloIdentity { id: 001de000-5110-4000-8000-000000000000, name: Name(Name("default-silo")), description: "default silo", time_created: 2026-01-27T01:13:49.283636Z, time_modified: 2026-01-27T01:13:49.283636Z, time_deleted: None }, discoverable: false, authentication_mode: Local, user_provision_type: ApiOnly, mapped_fleet_roles: Object {}, rcgen: Generation(Generation(1)), admin_group_name: None }, tls_certs: [] }, "test-suite-silo.sys.oxide-dev.test": ExternalEndpoint { silo_id: e5399c73-ca5a-4504-b823-4770433f29da, db_silo: Silo { identity: SiloIdentity { id: e5399c73-ca5a-4504-b823-4770433f29da, name: Name(Name("test-suite-silo")), description: "built-in recovery Silo", time_created: 2026-01-27T01:13:58.855038Z, time_modified: 2026-01-27T01:13:58.855038Z, time_deleted: None }, discoverable: false, authentication_mode: Local, user_provision_type: ApiOnly, mapped_fleet_roles: Object {"admin": Array [String("admin")]}, rcgen: Generation(Generation(1)), admin_group_name: None }, tls_certs: [] }}, warnings: [NoSiloCerts { silo_id: 001de000-5110-4000-8000-000000000000, dns_name: "default-silo.sys.oxide-dev.test" }, NoSiloCerts { silo_id: e5399c73-ca5a-4504-b823-4770433f29da, dns_name: "test-suite-silo.sys.oxide-dev.test" }], default_endpoint: Some(ExternalEndpoint { silo_id: e5399c73-ca5a-4504-b823-4770433f29da, db_silo: Silo { identity: SiloIdentity { id: e5399c73-ca5a-4504-b823-4770433f29da, name: Name(Name("test-suite-silo")), description: "built-in recovery Silo", time_created: 2026-01-27T01:13:58.855038Z, time_modified: 2026-01-27T01:13:58.855038Z, time_deleted: None }, discoverable: false, authentication_mode: Local, user_provision_type: ApiOnly, mapped_fleet_roles: Object {"admin": Array [String("admin")]}, rcgen: Generation(Generation(1)), admin_group_name: None }, tls_certs: [] }) }
|
| 2244 | 2026-01-27T01:14:00.696Z | DEBG | test_vpcs (BackgroundTasks): activation complete
background_task = external_endpoints
elapsed = 442.849526ms
iteration = 2
status = {"by_dns_name":{"default-silo.sys.oxide-dev.test":{"silo_id":"001de000-5110-4000-8000-000000000000","tls_certs":[]},"test-suite-silo.sys.oxide-dev.test":{"silo_id":"e5399c73-ca5a-4504-b823-4770433f29da","tls_certs":[]}},"default_endpoint":{"silo_id":"e5399c73-ca5a-4504-b823-4770433f29da","tls_certs":[]},"warnings":["silo 001de000-5110-4000-8000-000000000000 with DNS name \\"default-silo.sys.oxide-dev.test\\" has no usable certificates","silo e5399c73-ca5a-4504-b823-4770433f29da with DNS name \\"test-suite-silo.sys.oxide-dev.test\\" has no usable certificates"]}
|
| 2245 | 2026-01-27T01:14:00.696Z | INFO | test_vpcs (http): accepted connection
kind = dns
local_addr = [::1]:65457
remote_addr = [::1]:42532
|
| 2246 | 2026-01-27T01:14:00.696Z | INFO | test_vpcs (http): accepted connection
kind = dns
local_addr = [::1]:53796
remote_addr = [::1]:32952
|
| 2247 | 2026-01-27T01:14:00.762Z | TRAC | test_vpcs (DnsResolver): lookup_all_socket_v6 srv
dns_name = _clickhouse-admin-keeper._tcp.control-plane.oxide.internal
|
| 2248 | 2026-01-27T01:14:00.766Z | TRAC | test_vpcs (http): incoming request
kind = dns
local_addr = [::1]:65457
method = PUT
remote_addr = [::1]:42532
req_id = 4c4b0dab-37de-4acd-9450-8d2de3d6fd5a
uri = /config
|
| 2249 | 2026-01-27T01:14:00.766Z | DEBG | test_vpcs (http): determined request API version
kind = dns
local_addr = [::1]:65457
method = PUT
remote_addr = [::1]:42532
req_id = 4c4b0dab-37de-4acd-9450-8d2de3d6fd5a
uri = /config
version = 2.0.0
|
| 2250 | 2026-01-27T01:14:00.766Z | TRAC | test_vpcs (http): incoming request
kind = dns
local_addr = [::1]:53796
method = PUT
remote_addr = [::1]:32952
req_id = 0e34a334-7092-4759-85fa-5c146d2016cf
uri = /config
|
| 2251 | 2026-01-27T01:14:00.766Z | DEBG | test_vpcs (http): determined request API version
kind = dns
local_addr = [::1]:53796
method = PUT
remote_addr = [::1]:32952
req_id = 0e34a334-7092-4759-85fa-5c146d2016cf
uri = /config
version = 2.0.0
|
| 2252 | 2026-01-27T01:14:00.766Z | INFO | test_vpcs (store): attempting generation update
new_generation = 1
req_id = 4c4b0dab-37de-4acd-9450-8d2de3d6fd5a
|
| 2253 | 2026-01-27T01:14:00.766Z | INFO | test_vpcs (store): updated generation
new_generation = 1
req_id = 4c4b0dab-37de-4acd-9450-8d2de3d6fd5a
|
| 2254 | 2026-01-27T01:14:00.766Z | INFO | test_vpcs (store): attempting generation update
new_generation = 2
req_id = 0e34a334-7092-4759-85fa-5c146d2016cf
|
| 2255 | 2026-01-27T01:14:00.767Z | INFO | test_vpcs (store): pruning trees for generations newer than 0
|
| 2256 | 2026-01-27T01:14:00.767Z | DEBG | test_vpcs (store): creating tree
tree_name = generation_2_zone_oxide-dev.test
|
| 2257 | 2026-01-27T01:14:00.767Z | DEBG | test_vpcs (store): updating current config
|
| 2258 | 2026-01-27T01:14:00.767Z | DEBG | test_vpcs (store): flushing default tree
|
| 2259 | 2026-01-27T01:14:00.767Z | INFO | test_vpcs (store): pruning trees for generations older than 2
keep = 3
|
| 2260 | 2026-01-27T01:14:00.767Z | INFO | test_vpcs (store): updated generation
new_generation = 2
req_id = 0e34a334-7092-4759-85fa-5c146d2016cf
|
| 2261 | 2026-01-27T01:14:00.772Z | INFO | test_vpcs (http): request completed
kind = dns
latency_us = 6751
local_addr = [::1]:65457
method = PUT
remote_addr = [::1]:42532
req_id = 4c4b0dab-37de-4acd-9450-8d2de3d6fd5a
response_code = 204
uri = /config
|
| 2262 | 2026-01-27T01:14:00.772Z | INFO | test_vpcs (http): request completed
kind = dns
latency_us = 6361
local_addr = [::1]:53796
method = PUT
remote_addr = [::1]:32952
req_id = 0e34a334-7092-4759-85fa-5c146d2016cf
response_code = 204
uri = /config
|
| 2263 | 2026-01-27T01:14:00.782Z | TRAC | test_vpcs (dns): buffer
buffer = Length: 87 (0x57) bytes\n0000: 0c fd 01 00 00 01 00 00 00 00 00 01 18 5f 63 6c ............._cl\n0010: 69 63 6b 68 6f 75 73 65 2d 61 64 6d 69 6e 2d 6b ickhouse-admin-k\n0020: 65 65 70 65 72 04 5f 74 63 70 0d 63 6f 6e 74 72 eeper._tcp.contr\n0030: 6f 6c 2d 70 6c 61 6e 65 05 6f 78 69 64 65 08 69 ol-plane.oxide.i\n0040: 6e 74 65 72 6e 61 6c 00 00 21 00 01 00 00 29 04 nternal..!....).\n0050: d0 00 00 00 00 00 00 .......
kind = dns
peer_addr = [::1]:15840
req_id = d75b7527-e22a-4b61-a0a9-35ea243b8a23
|
| 2264 | 2026-01-27T01:14:00.782Z | DEBG | test_vpcs (dns): message_request
kind = dns
mr = MessageRequest {\n header: Header {\n id: 3325,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n queries: Queries {\n queries: [\n LowerQuery {\n name: LowerName(\n Name("_clickhouse-admin-keeper._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_clickhouse-admin-keeper._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n ],\n original: [\n 24,\n 95,\n 99,\n 108,\n 105,\n 99,\n 107,\n 104,\n 111,\n 117,\n 115,\n 101,\n 45,\n 97,\n 100,\n 109,\n 105,\n 110,\n 45,\n 107,\n 101,\n 101,\n 112,\n 101,\n 114,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n flags: EdnsFlags {\n dnssec_ok: false,\n z: 0,\n },\n max_payload: 1232,\n options: OPT {\n options: [],\n },\n },\n ),\n}
peer_addr = [::1]:15840
req_id = d75b7527-e22a-4b61-a0a9-35ea243b8a23
|
| 2265 | 2026-01-27T01:14:00.782Z | DEBG | test_vpcs (store): query key
key = _clickhouse-admin-keeper._tcp
|
| 2266 | 2026-01-27T01:14:00.782Z | ERRO | test_vpcs (dns): failed to handle incoming DNS message: MessageRequest {
header: Header {
id: 3325,
message_type: Query,
op_code: Query,
authoritative: false,
truncation: false,
recursion_desired: true,
recursion_available: false,
authentic_data: false,
checking_disabled: false,
response_code: NoError,
query_count: 1,
answer_count: 0,
name_server_count: 0,
additional_count: 1,
},
queries: Queries {
queries: [
LowerQuery {
name: LowerName(
Name("_clickhouse-admin-keeper._tcp.control-plane.oxide.internal."),
),
original: Query {
name: Name("_clickhouse-admin-keeper._tcp.control-plane.oxide.internal."),
query_type: SRV,
query_class: IN,
},
},
],
original: [
24,
95,
99,
108,
105,
99,
107,
104,
111,
117,
115,
101,
45,
97,
100,
109,
105,
110,
45,
107,
101,
101,
112,
101,
114,
4,
95,
116,
99,
112,
13,
99,
111,
110,
116,
114,
111,
108,
45,
112,
108,
97,
110,
101,
5,
111,
120,
105,
100,
101,
8,
105,
110,
116,
101,
114,
110,
97,
108,
0,
0,
33,
0,
1,
],
},
answers: [],
name_servers: [],
additionals: [],
sig0: [],
edns: Some(
Edns {
rcode_high: 0,
version: 0,
flags: EdnsFlags {
dnssec_ok: false,
z: 0,
},
max_payload: 1232,
options: OPT {
options: [],
},
},
),
} NXDOMAIN: _clickhouse-admin-keeper._tcp.control-plane.oxide.internal
kind = dns
peer_addr = [::1]:15840
req_id = d75b7527-e22a-4b61-a0a9-35ea243b8a23
|
| 2267 | 2026-01-27T01:14:00.782Z | DEBG | test_vpcs (BackgroundTasks): client response
background_task = dns_propagation_internal
dns_group = internal
dns_server_url = http://[::1]:65457
generation = 1
result = Ok(Response { url: "http://[::1]:65457/config", status: 204, headers: {"x-request-id": "4c4b0dab-37de-4acd-9450-8d2de3d6fd5a", "date": "Tue, 27 Jan 2026 01:14:00 GMT"} })
servers = DnsServersList { addresses: [[::1]:65457] }
|
| 2268 | 2026-01-27T01:14:00.782Z | INFO | test_vpcs (BackgroundTasks): DNS server now at generation 1
background_task = dns_propagation_internal
dns_group = internal
dns_server_url = http://[::1]:65457
generation = 1
servers = DnsServersList { addresses: [[::1]:65457] }
|
| 2269 | 2026-01-27T01:14:00.782Z | INFO | test_vpcs (BackgroundTasks): DNS propagation: done
background_task = dns_propagation_internal
dns_group = internal
generation = 1
servers = DnsServersList { addresses: [[::1]:65457] }
|
| 2270 | 2026-01-27T01:14:00.782Z | DEBG | test_vpcs (BackgroundTasks): activation complete
background_task = dns_propagation_internal
dns_group = internal
elapsed = 263.808801ms
iteration = 3
status = {"generation":1,"server_results":{"[::1]:65457":{"Ok":null}}}
|
| 2271 | 2026-01-27T01:14:00.782Z | DEBG | test_vpcs (BackgroundTasks): client response
background_task = dns_propagation_external
dns_group = external
dns_server_url = http://[::1]:53796
generation = 2
result = Ok(Response { url: "http://[::1]:53796/config", status: 204, headers: {"x-request-id": "0e34a334-7092-4759-85fa-5c146d2016cf", "date": "Tue, 27 Jan 2026 01:14:00 GMT"} })
servers = DnsServersList { addresses: [[::1]:53796] }
|
| 2272 | 2026-01-27T01:14:00.782Z | INFO | test_vpcs (BackgroundTasks): DNS server now at generation 2
background_task = dns_propagation_external
dns_group = external
dns_server_url = http://[::1]:53796
generation = 2
servers = DnsServersList { addresses: [[::1]:53796] }
|
| 2273 | 2026-01-27T01:14:00.783Z | INFO | test_vpcs (BackgroundTasks): DNS propagation: done
background_task = dns_propagation_external
dns_group = external
generation = 2
servers = DnsServersList { addresses: [[::1]:53796] }
|
| 2274 | 2026-01-27T01:14:00.783Z | DEBG | test_vpcs (BackgroundTasks): activation complete
background_task = dns_propagation_external
dns_group = external
elapsed = 183.9614ms
iteration = 3
status = {"generation":2,"server_results":{"[::1]:53796":{"Ok":null}}}
|
| 2275 | 2026-01-27T01:14:00.784Z | TRAC | test_vpcs (DnsResolver): lookup_all_socket_v6 srv
dns_name = _cockroach._tcp.control-plane.oxide.internal
|
| 2276 | 2026-01-27T01:14:00.792Z | TRAC | test_vpcs (dns): buffer
buffer = Length: 73 (0x49) bytes\n0000: 94 2c 01 00 00 01 00 00 00 00 00 01 0a 5f 63 6f .,..........._co\n0010: 63 6b 72 6f 61 63 68 04 5f 74 63 70 0d 63 6f 6e ckroach._tcp.con\n0020: 74 72 6f 6c 2d 70 6c 61 6e 65 05 6f 78 69 64 65 trol-plane.oxide\n0030: 08 69 6e 74 65 72 6e 61 6c 00 00 21 00 01 00 00 .internal..!....\n0040: 29 04 d0 00 00 00 00 00 00 )........
kind = dns
peer_addr = [::1]:1077
req_id = 7dcaa442-5c18-4532-8fa1-43de7b52d50c
|
| 2277 | 2026-01-27T01:14:00.792Z | DEBG | test_vpcs (dns): message_request
kind = dns
mr = MessageRequest {\n header: Header {\n id: 37932,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n queries: Queries {\n queries: [\n LowerQuery {\n name: LowerName(\n Name("_cockroach._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_cockroach._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n ],\n original: [\n 10,\n 95,\n 99,\n 111,\n 99,\n 107,\n 114,\n 111,\n 97,\n 99,\n 104,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n flags: EdnsFlags {\n dnssec_ok: false,\n z: 0,\n },\n max_payload: 1232,\n options: OPT {\n options: [],\n },\n },\n ),\n}
peer_addr = [::1]:1077
req_id = 7dcaa442-5c18-4532-8fa1-43de7b52d50c
|
| 2278 | 2026-01-27T01:14:00.792Z | DEBG | test_vpcs (store): query key
key = _cockroach._tcp
|
| 2279 | 2026-01-27T01:14:00.793Z | DEBG | test_vpcs (store): query key
key = 13c52f51-e716-421b-8ceb-7f8d0fb2e5a3.host
|
| 2280 | 2026-01-27T01:14:00.793Z | DEBG | test_vpcs (dns): dns response
additional_records = [Record { name_labels: Name("13c52f51-e716-421b-8ceb-7f8d0fb2e5a3.host.control-plane.oxide.internal"), dns_class: IN, ttl: 0, rdata: AAAA(AAAA(::1)) }]
kind = dns
peer_addr = [::1]:1077
query = LowerQuery { name: LowerName(Name("_cockroach._tcp.control-plane.oxide.internal.")), original: Query { name: Name("_cockroach._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN } }
records = [Record { name_labels: Name("_cockroach._tcp.control-plane.oxide.internal."), dns_class: IN, ttl: 0, rdata: SRV(SRV { priority: 0, weight: 0, port: 42398, target: Name("13c52f51-e716-421b-8ceb-7f8d0fb2e5a3.host.control-plane.oxide.internal") }) }]
req_id = 7dcaa442-5c18-4532-8fa1-43de7b52d50c
|
| 2281 | 2026-01-27T01:14:00.802Z | DEBG | test_vpcs (DnsResolver): lookup_all_socket_v6 srv
dns_name = _cockroach._tcp.control-plane.oxide.internal
response = SrvLookup(Lookup { query: Query { name: Name("_cockroach._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN }, records: [Record { name_labels: Name("_cockroach._tcp.control-plane.oxide.internal."), dns_class: IN, ttl: 0, rdata: SRV(SRV { priority: 0, weight: 0, port: 42398, target: Name("13c52f51-e716-421b-8ceb-7f8d0fb2e5a3.host.control-plane.oxide.internal.") }) }, Record { name_labels: Name("13c52f51-e716-421b-8ceb-7f8d0fb2e5a3.host.control-plane.oxide.internal."), dns_class: IN, ttl: 0, rdata: AAAA(AAAA(::1)) }], valid_until: Instant { tv_sec: 10282, tv_nsec: 612070213 } })
|
| 2282 | 2026-01-27T01:14:00.802Z | TRAC | test_vpcs (DnsResolver): lookup_service_targets: looking up SRV target
|
| 2283 | 2026-01-27T01:14:00.811Z | TRAC | test_vpcs (dns): buffer
buffer = Length: 99 (0x63) bytes\n0000: 4c 2a 01 00 00 01 00 00 00 00 00 01 24 31 33 63 L*..........$13c\n0010: 35 32 66 35 31 2d 65 37 31 36 2d 34 32 31 62 2d 52f51-e716-421b-\n0020: 38 63 65 62 2d 37 66 38 64 30 66 62 32 65 35 61 8ceb-7f8d0fb2e5a\n0030: 33 04 68 6f 73 74 0d 63 6f 6e 74 72 6f 6c 2d 70 3.host.control-p\n0040: 6c 61 6e 65 05 6f 78 69 64 65 08 69 6e 74 65 72 lane.oxide.inter\n0050: 6e 61 6c 00 00 1c 00 01 00 00 29 04 d0 00 00 00 nal.......).....\n0060: 00 00 00 ...
kind = dns
peer_addr = [::1]:48708
req_id = 8cf6b4c6-8f3f-4518-9680-158f16773779
|
| 2284 | 2026-01-27T01:14:00.812Z | DEBG | test_vpcs (dns): message_request
kind = dns
mr = MessageRequest {\n header: Header {\n id: 19498,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n queries: Queries {\n queries: [\n LowerQuery {\n name: LowerName(\n Name("13c52f51-e716-421b-8ceb-7f8d0fb2e5a3.host.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("13c52f51-e716-421b-8ceb-7f8d0fb2e5a3.host.control-plane.oxide.internal."),\n query_type: AAAA,\n query_class: IN,\n },\n },\n ],\n original: [\n 36,\n 49,\n 51,\n 99,\n 53,\n 50,\n 102,\n 53,\n 49,\n 45,\n 101,\n 55,\n 49,\n 54,\n 45,\n 52,\n 50,\n 49,\n 98,\n 45,\n 56,\n 99,\n 101,\n 98,\n 45,\n 55,\n 102,\n 56,\n 100,\n 48,\n 102,\n 98,\n 50,\n 101,\n 53,\n 97,\n 51,\n 4,\n 104,\n 111,\n 115,\n 116,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 28,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n flags: EdnsFlags {\n dnssec_ok: false,\n z: 0,\n },\n max_payload: 1232,\n options: OPT {\n options: [],\n },\n },\n ),\n}
peer_addr = [::1]:48708
req_id = 8cf6b4c6-8f3f-4518-9680-158f16773779
|
| 2285 | 2026-01-27T01:14:00.812Z | DEBG | test_vpcs (store): query key
key = 13c52f51-e716-421b-8ceb-7f8d0fb2e5a3.host
|
| 2286 | 2026-01-27T01:14:00.812Z | DEBG | test_vpcs (dns): dns response
additional_records = []
kind = dns
peer_addr = [::1]:48708
query = LowerQuery { name: LowerName(Name("13c52f51-e716-421b-8ceb-7f8d0fb2e5a3.host.control-plane.oxide.internal.")), original: Query { name: Name("13c52f51-e716-421b-8ceb-7f8d0fb2e5a3.host.control-plane.oxide.internal."), query_type: AAAA, query_class: IN } }
records = [Record { name_labels: Name("13c52f51-e716-421b-8ceb-7f8d0fb2e5a3.host.control-plane.oxide.internal."), dns_class: IN, ttl: 0, rdata: AAAA(AAAA(::1)) }]
req_id = 8cf6b4c6-8f3f-4518-9680-158f16773779
|
| 2287 | 2026-01-27T01:14:00.926Z | DEBG | test_vpcs (CockroachClusterAdminClient): Updated CockroachDB cluster backends
added = 1
addresses = [[::1]:32222]
removed = 0
total = 1
|
| 2288 | 2026-01-27T01:14:00.926Z | DEBG | test_vpcs (BackgroundTasks): begin collection
background_task = inventory_collection
|
| 2289 | 2026-01-27T01:14:00.926Z | DEBG | test_vpcs (BackgroundTasks): begin collection from MGS
background_task = inventory_collection
mgs_url = http://[::1]:52572
|
| 2290 | 2026-01-27T01:14:00.926Z | DEBG | test_vpcs (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:52572
method = GET
uri = http://[::1]:52572/ignition
|
| 2291 | 2026-01-27T01:14:00.950Z | DEBG | test_vpcs (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:52572
result = Ok(Response { url: "http://[::1]:52572/ignition", status: 200, headers: {"content-type": "application/json", "x-request-id": "32b2f703-9a10-47db-9b0b-e229e77074f1", "content-length": "835", "date": "Tue, 27 Jan 2026 01:14:00 GMT"} })
|
| 2292 | 2026-01-27T01:14:00.950Z | DEBG | test_vpcs (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:52572
method = GET
uri = http://[::1]:52572/sp/switch/0
|
| 2293 | 2026-01-27T01:14:00.967Z | DEBG | test_vpcs (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:52572
result = Ok(Response { url: "http://[::1]:52572/sp/switch/0", status: 200, headers: {"content-type": "application/json", "x-request-id": "bcdb8963-665c-45be-aab4-1fcda5f369b4", "content-length": "734", "date": "Tue, 27 Jan 2026 01:14:00 GMT"} })
|
| 2294 | 2026-01-27T01:14:00.969Z | DEBG | test_vpcs (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:52572
method = GET
uri = http://[::1]:52572/sp/switch/0/component/sp/caboose?firmware_slot=0
|
| 2295 | 2026-01-27T01:14:00.969Z | DEBG | test_vpcs (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:52572
result = Ok(Response { url: "http://[::1]:52572/sp/switch/0/component/sp/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "ea423d97-cf06-4b01-8f29-d64ad3f2f931", "content-length": "111", "date": "Tue, 27 Jan 2026 01:14:00 GMT"} })
|
| 2296 | 2026-01-27T01:14:00.969Z | DEBG | test_vpcs (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:52572
method = GET
uri = http://[::1]:52572/sp/switch/0/component/sp/caboose?firmware_slot=1
|
| 2297 | 2026-01-27T01:14:00.972Z | DEBG | test_vpcs (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:52572
result = Ok(Response { url: "http://[::1]:52572/sp/switch/0/component/sp/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "6bed5d59-3060-4d44-af68-80595ba423fc", "content-length": "111", "date": "Tue, 27 Jan 2026 01:14:00 GMT"} })
|
| 2298 | 2026-01-27T01:14:00.979Z | DEBG | test_vpcs (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:52572
method = GET
uri = http://[::1]:52572/sp/switch/0/component/rot/caboose?firmware_slot=0
|
| 2299 | 2026-01-27T01:14:00.979Z | INFO | test_vpcs (BackgroundTasks): found new target blueprint (first find)
background_task = blueprint_loader
target_id = c01a6e26-b5bc-40f6-ba41-c1d23b303d2d
time_created = 2026-01-27 01:13:57.137859 UTC
|
| 2300 | 2026-01-27T01:14:00.979Z | DEBG | test_vpcs (BackgroundTasks): activation complete
background_task = blueprint_loader
elapsed = 722.207702ms
iteration = 2
status = {"enabled":false,"status":"first target blueprint","target_id":"c01a6e26-b5bc-40f6-ba41-c1d23b303d2d","time_created":"2026-01-27T01:13:57.137859Z","time_found":"2026-01-27T01:14:00.978821849Z"}
|
| 2301 | 2026-01-27T01:14:00.986Z | DEBG | test_vpcs (BackgroundTasks): activating
background_task = crdb_node_id_collector
iteration = 2
reason = Dependency
|
| 2302 | 2026-01-27T01:14:00.987Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = crdb_node_id_collector
resource = Fleet
|
| 2303 | 2026-01-27T01:14:00.987Z | TRAC | test_vpcs (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = crdb_node_id_collector
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 2304 | 2026-01-27T01:14:00.987Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = crdb_node_id_collector
resource = Database
|
| 2305 | 2026-01-27T01:14:00.987Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = crdb_node_id_collector
roles = RoleSet { roles: {} }
|
| 2306 | 2026-01-27T01:14:00.987Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = crdb_node_id_collector
resource = Database
result = Ok(())
|
| 2307 | 2026-01-27T01:14:00.998Z | DEBG | test_vpcs (BackgroundTasks): activating
background_task = blueprint_executor
iteration = 2
reason = Dependency
|
| 2308 | 2026-01-27T01:14:00.998Z | DEBG | test_vpcs (BackgroundTasks): blueprint execution: quiesce check
background_task = blueprint_executor
quiescing = false
|
| 2309 | 2026-01-27T01:14:00.998Z | INFO | test_vpcs (NexusQuiesceHandle): initial state
state = Running
|
| 2310 | 2026-01-27T01:14:00.999Z | INFO | test_vpcs (SagaQuiesceHandle): initial quiesce state
initial_state = Allowed
|
| 2311 | 2026-01-27T01:14:00.999Z | WARN | test_vpcs (BackgroundTasks): Blueprint execution: skipped
background_task = blueprint_executor
reason = blueprint disabled
target_id = c01a6e26-b5bc-40f6-ba41-c1d23b303d2d
|
| 2312 | 2026-01-27T01:14:00.999Z | DEBG | test_vpcs (BackgroundTasks): activation complete
background_task = blueprint_executor
elapsed = 146.427\u{b5}s
iteration = 2
status = {"enabled":false,"target_id":"c01a6e26-b5bc-40f6-ba41-c1d23b303d2d"}
|
| 2313 | 2026-01-27T01:14:00.999Z | DEBG | test_vpcs (BackgroundTasks): activating
background_task = blueprint_planner
iteration = 3
reason = Dependency
|
| 2314 | 2026-01-27T01:14:00.999Z | DEBG | test_vpcs (BackgroundTasks): blueprint planning disabled, doing nothing
background_task = blueprint_planner
|
| 2315 | 2026-01-27T01:14:00.999Z | DEBG | test_vpcs (BackgroundTasks): activation complete
background_task = blueprint_planner
elapsed = 22.344\u{b5}s
iteration = 3
status = "Disabled"
|
| 2316 | 2026-01-27T01:14:00.999Z | TRAC | test_vpcs (ServiceBalancer): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-00000000bac3 (built_in_user), .. })
resource = Database
|
| 2317 | 2026-01-27T01:14:00.999Z | DEBG | test_vpcs (ServiceBalancer): roles
roles = RoleSet { roles: {} }
|
| 2318 | 2026-01-27T01:14:00.999Z | DEBG | test_vpcs (ServiceBalancer): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-00000000bac3 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 2319 | 2026-01-27T01:14:00.999Z | DEBG | test_vpcs (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:52572
result = Ok(Response { url: "http://[::1]:52572/sp/switch/0/component/rot/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "50a128a2-2fbf-4d3d-ac9e-5f6d946d009b", "content-length": "163", "date": "Tue, 27 Jan 2026 01:14:00 GMT"} })
|
| 2320 | 2026-01-27T01:14:00.999Z | DEBG | test_vpcs (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:52572
method = GET
uri = http://[::1]:52572/sp/switch/0/component/rot/caboose?firmware_slot=1
|
| 2321 | 2026-01-27T01:14:00.999Z | DEBG | test_vpcs (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:52572
result = Ok(Response { url: "http://[::1]:52572/sp/switch/0/component/rot/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "162d6665-7ae3-4331-8a8b-f5dee9ea1a36", "content-length": "163", "date": "Tue, 27 Jan 2026 01:14:00 GMT"} })
|
| 2322 | 2026-01-27T01:14:00.999Z | DEBG | test_vpcs (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:52572
method = GET
uri = http://[::1]:52572/sp/switch/0/component/stage0/caboose?firmware_slot=0
|
| 2323 | 2026-01-27T01:14:01.005Z | DEBG | test_vpcs (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:52572
result = Ok(Response { url: "http://[::1]:52572/sp/switch/0/component/stage0/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "940b7dff-0a30-491c-b1a9-d43fa817df90", "content-length": "166", "date": "Tue, 27 Jan 2026 01:14:01 GMT"} })
|
| 2324 | 2026-01-27T01:14:01.005Z | DEBG | test_vpcs (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:52572
method = GET
uri = http://[::1]:52572/sp/switch/0/component/stage0/caboose?firmware_slot=1
|
| 2325 | 2026-01-27T01:14:01.005Z | TRAC | test_vpcs (ServiceBalancer): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-00000000bac3 (built_in_user), .. })
resource = Rack { parent: Fleet, key: c19a698f-c6f9-4a17-ae30-20d711b8f7dc, lookup_type: ById(c19a698f-c6f9-4a17-ae30-20d711b8f7dc) }
|
| 2326 | 2026-01-27T01:14:01.005Z | TRAC | test_vpcs (ServiceBalancer): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-00000000bac3 (built_in_user), .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 2327 | 2026-01-27T01:14:01.005Z | TRAC | test_vpcs (ServiceBalancer): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-00000000bac3 (built_in_user), .. })
resource = Database
|
| 2328 | 2026-01-27T01:14:01.005Z | DEBG | test_vpcs (ServiceBalancer): roles
roles = RoleSet { roles: {} }
|
| 2329 | 2026-01-27T01:14:01.005Z | DEBG | test_vpcs (ServiceBalancer): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-00000000bac3 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 2330 | 2026-01-27T01:14:01.008Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = crdb_node_id_collector
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 2331 | 2026-01-27T01:14:01.015Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = crdb_node_id_collector
resource = Fleet
result = Ok(())
|
| 2332 | 2026-01-27T01:14:01.016Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = crdb_node_id_collector
resource = Database
|
| 2333 | 2026-01-27T01:14:01.016Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = crdb_node_id_collector
roles = RoleSet { roles: {} }
|
| 2334 | 2026-01-27T01:14:01.016Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = crdb_node_id_collector
resource = Database
result = Ok(())
|
| 2335 | 2026-01-27T01:14:01.020Z | DEBG | test_vpcs (ServiceBalancer): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 2336 | 2026-01-27T01:14:01.033Z | DEBG | test_vpcs (ServiceBalancer): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-00000000bac3 (built_in_user), .. })
resource = Rack { parent: Fleet, key: c19a698f-c6f9-4a17-ae30-20d711b8f7dc, lookup_type: ById(c19a698f-c6f9-4a17-ae30-20d711b8f7dc) }
result = Ok(())
|
| 2337 | 2026-01-27T01:14:01.033Z | INFO | test_vpcs (nexus): Rack initialized
|
| 2338 | 2026-01-27T01:14:01.033Z | TRAC | test_vpcs (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 2339 | 2026-01-27T01:14:01.034Z | DEBG | test_vpcs (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 2340 | 2026-01-27T01:14:01.035Z | DEBG | test_vpcs (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 2341 | 2026-01-27T01:14:01.190Z | DEBG | test_vpcs (BackgroundTasks): client request
background_task = crdb_node_id_collector
body = None
method = GET
uri = http://[::1]:32222/node/id
|
| 2342 | 2026-01-27T01:14:01.191Z | DEBG | test_vpcs (BackgroundTasks): client response
background_task = crdb_node_id_collector
result = Err(reqwest::Error { kind: Request, url: "http://[::1]:32222/node/id", source: hyper_util::client::legacy::Error(Connect, ConnectError("tcp connect error", [::1]:32222, Os { code: 146, kind: ConnectionRefused, message: "Connection refused" })) })
|
| 2343 | 2026-01-27T01:14:01.194Z | DEBG | test_vpcs (BackgroundTasks): activation complete
background_task = crdb_node_id_collector
elapsed = 210.916501ms
iteration = 2
status = {"errors":[{"err":"failed to fetch node ID for zone 13c52f51-e716-421b-8ceb-7f8d0fb2e5a3 at http://[::1]:32222: Communication Error: error sending request for url (http://[::1]:32222/node/id): error sending request for url (http://[::1]:32222/node/id): client error (Connect): tcp connect error: Connection refused (os error 146)","zone_id":"13c52f51-e716-421b-8ceb-7f8d0fb2e5a3"}],"nsuccess":0}
|
| 2344 | 2026-01-27T01:14:01.198Z | DEBG | test_vpcs (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:52572
result = Ok(Response { url: "http://[::1]:52572/sp/switch/0/component/stage0/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "857bbd2b-55d9-4271-85fd-25c15e68cb1e", "content-length": "166", "date": "Tue, 27 Jan 2026 01:14:01 GMT"} })
|
| 2345 | 2026-01-27T01:14:01.198Z | DEBG | test_vpcs (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:52572
method = GET
uri = http://[::1]:52572/sp/switch/0/component/rot/cmpa
|
| 2346 | 2026-01-27T01:14:01.198Z | TRAC | test_vpcs (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 2347 | 2026-01-27T01:14:01.198Z | DEBG | test_vpcs (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 2348 | 2026-01-27T01:14:01.199Z | DEBG | test_vpcs (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 2349 | 2026-01-27T01:14:01.210Z | TRAC | test_vpcs (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 2350 | 2026-01-27T01:14:01.210Z | DEBG | test_vpcs (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 2351 | 2026-01-27T01:14:01.211Z | DEBG | test_vpcs (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 2352 | 2026-01-27T01:14:01.212Z | DEBG | test_vpcs (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:52572
result = Ok(Response { url: "http://[::1]:52572/sp/switch/0/component/rot/cmpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "899890da-f4ba-4ca1-8278-93fed5e2a286", "content-length": "702", "date": "Tue, 27 Jan 2026 01:14:01 GMT"} })
|
| 2353 | 2026-01-27T01:14:01.213Z | DEBG | test_vpcs (BackgroundTasks): client request
background_task = inventory_collection
body = Some(Body)
gateway_url = http://[::1]:52572
method = GET
uri = http://[::1]:52572/sp/switch/0/component/rot/cfpa
|
| 2354 | 2026-01-27T01:14:01.216Z | DEBG | test_vpcs (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:52572
result = Ok(Response { url: "http://[::1]:52572/sp/switch/0/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "b797c870-2e60-46ef-b60c-a310b372b16b", "content-length": "727", "date": "Tue, 27 Jan 2026 01:14:01 GMT"} })
|
| 2355 | 2026-01-27T01:14:01.216Z | DEBG | test_vpcs (BackgroundTasks): client request
background_task = inventory_collection
body = Some(Body)
gateway_url = http://[::1]:52572
method = GET
uri = http://[::1]:52572/sp/switch/0/component/rot/cfpa
|
| 2356 | 2026-01-27T01:14:01.218Z | TRAC | test_vpcs (InternalApi): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
|
| 2357 | 2026-01-27T01:14:01.218Z | TRAC | test_vpcs (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
resource_id = 001de000-4401-4000-8000-000000000000
resource_type = Project
|
| 2358 | 2026-01-27T01:14:01.218Z | TRAC | test_vpcs (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 2359 | 2026-01-27T01:14:01.218Z | DEBG | test_vpcs (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 2360 | 2026-01-27T01:14:01.219Z | DEBG | test_vpcs (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 2361 | 2026-01-27T01:14:01.220Z | DEBG | test_vpcs (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:52572
result = Ok(Response { url: "http://[::1]:52572/sp/switch/0/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "b3a95b53-496b-4453-8c48-acbbfbdd3833", "content-length": "729", "date": "Tue, 27 Jan 2026 01:14:01 GMT"} })
|
| 2362 | 2026-01-27T01:14:01.220Z | DEBG | test_vpcs (BackgroundTasks): client request
background_task = inventory_collection
body = Some(Body)
gateway_url = http://[::1]:52572
method = GET
uri = http://[::1]:52572/sp/switch/0/component/rot/cfpa
|
| 2363 | 2026-01-27T01:14:01.223Z | DEBG | test_vpcs (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:52572
result = Ok(Response { url: "http://[::1]:52572/sp/switch/0/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "77d3a020-3838-4347-a083-f926f168e72b", "content-length": "728", "date": "Tue, 27 Jan 2026 01:14:01 GMT"} })
|
| 2364 | 2026-01-27T01:14:01.223Z | DEBG | test_vpcs (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:52572
method = GET
uri = http://[::1]:52572/sp/switch/1
|
| 2365 | 2026-01-27T01:14:01.224Z | TRAC | test_vpcs (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
resource_id = 001de000-5110-4000-8000-000000000001
resource_type = Silo
|
| 2366 | 2026-01-27T01:14:01.224Z | TRAC | test_vpcs (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 2367 | 2026-01-27T01:14:01.224Z | DEBG | test_vpcs (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 2368 | 2026-01-27T01:14:01.225Z | DEBG | test_vpcs (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 2369 | 2026-01-27T01:14:01.229Z | DEBG | test_vpcs (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:52572
result = Ok(Response { url: "http://[::1]:52572/sp/switch/1", status: 200, headers: {"content-type": "application/json", "x-request-id": "5f1ecd95-c80c-4921-be98-4b7a0a2a3f91", "content-length": "734", "date": "Tue, 27 Jan 2026 01:14:01 GMT"} })
|
| 2370 | 2026-01-27T01:14:01.231Z | DEBG | test_vpcs (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:52572
method = GET
uri = http://[::1]:52572/sp/switch/1/component/sp/caboose?firmware_slot=0
|
| 2371 | 2026-01-27T01:14:01.232Z | TRAC | test_vpcs (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 2372 | 2026-01-27T01:14:01.232Z | TRAC | test_vpcs (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 2373 | 2026-01-27T01:14:01.232Z | DEBG | test_vpcs (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 2374 | 2026-01-27T01:14:01.232Z | DEBG | test_vpcs (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 2375 | 2026-01-27T01:14:01.237Z | DEBG | test_vpcs (InternalApi): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 2376 | 2026-01-27T01:14:01.251Z | DEBG | test_vpcs (InternalApi): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
result = Ok(())
|
| 2377 | 2026-01-27T01:14:01.251Z | TRAC | test_vpcs (InternalApi): successful lookup of siloed resource "Vpc" using built-in user
|
| 2378 | 2026-01-27T01:14:01.251Z | TRAC | test_vpcs (InternalApi): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
|
| 2379 | 2026-01-27T01:14:01.251Z | TRAC | test_vpcs (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
resource_id = 001de000-4401-4000-8000-000000000000
resource_type = Project
|
| 2380 | 2026-01-27T01:14:01.251Z | TRAC | test_vpcs (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 2381 | 2026-01-27T01:14:01.252Z | DEBG | test_vpcs (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 2382 | 2026-01-27T01:14:01.254Z | DEBG | test_vpcs (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 2383 | 2026-01-27T01:14:01.258Z | TRAC | test_vpcs (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
resource_id = 001de000-5110-4000-8000-000000000001
resource_type = Silo
|
| 2384 | 2026-01-27T01:14:01.259Z | TRAC | test_vpcs (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 2385 | 2026-01-27T01:14:01.259Z | DEBG | test_vpcs (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 2386 | 2026-01-27T01:14:01.262Z | DEBG | test_vpcs (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 2387 | 2026-01-27T01:14:01.263Z | DEBG | test_vpcs (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:52572
result = Ok(Response { url: "http://[::1]:52572/sp/switch/1/component/sp/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "cd639024-6196-42eb-a734-485e16741473", "content-length": "111", "date": "Tue, 27 Jan 2026 01:14:01 GMT"} })
|
| 2388 | 2026-01-27T01:14:01.263Z | DEBG | test_vpcs (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:52572
method = GET
uri = http://[::1]:52572/sp/switch/1/component/sp/caboose?firmware_slot=1
|
| 2389 | 2026-01-27T01:14:01.268Z | TRAC | test_vpcs (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 2390 | 2026-01-27T01:14:01.268Z | TRAC | test_vpcs (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 2391 | 2026-01-27T01:14:01.268Z | DEBG | test_vpcs (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 2392 | 2026-01-27T01:14:01.269Z | DEBG | test_vpcs (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 2393 | 2026-01-27T01:14:01.273Z | DEBG | test_vpcs (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:52572
result = Ok(Response { url: "http://[::1]:52572/sp/switch/1/component/sp/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "e7bf1b2a-07c2-4d58-bf80-0c5c474e03ae", "content-length": "111", "date": "Tue, 27 Jan 2026 01:14:01 GMT"} })
|
| 2394 | 2026-01-27T01:14:01.273Z | DEBG | test_vpcs (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:52572
method = GET
uri = http://[::1]:52572/sp/switch/1/component/rot/caboose?firmware_slot=0
|
| 2395 | 2026-01-27T01:14:01.274Z | DEBG | test_vpcs (InternalApi): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 2396 | 2026-01-27T01:14:01.299Z | DEBG | test_vpcs (InternalApi): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
result = Ok(())
|
| 2397 | 2026-01-27T01:14:01.299Z | TRAC | test_vpcs (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 2398 | 2026-01-27T01:14:01.299Z | DEBG | test_vpcs (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 2399 | 2026-01-27T01:14:01.300Z | DEBG | test_vpcs (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 2400 | 2026-01-27T01:14:01.307Z | TRAC | test_vpcs (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 2401 | 2026-01-27T01:14:01.307Z | DEBG | test_vpcs (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 2402 | 2026-01-27T01:14:01.310Z | DEBG | test_vpcs (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 2403 | 2026-01-27T01:14:01.312Z | DEBG | test_vpcs (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:52572
result = Ok(Response { url: "http://[::1]:52572/sp/switch/1/component/rot/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "9bbcda39-4c5f-4ce5-97ac-9cc3dad40211", "content-length": "163", "date": "Tue, 27 Jan 2026 01:14:01 GMT"} })
|
| 2404 | 2026-01-27T01:14:01.312Z | DEBG | test_vpcs (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:52572
method = GET
uri = http://[::1]:52572/sp/switch/1/component/rot/caboose?firmware_slot=1
|
| 2405 | 2026-01-27T01:14:01.317Z | TRAC | test_vpcs (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 2406 | 2026-01-27T01:14:01.317Z | DEBG | test_vpcs (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 2407 | 2026-01-27T01:14:01.318Z | DEBG | test_vpcs (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 2408 | 2026-01-27T01:14:01.323Z | DEBG | test_vpcs (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:52572
result = Ok(Response { url: "http://[::1]:52572/sp/switch/1/component/rot/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "1697ad72-e5a4-4da5-8ac1-764eecd727af", "content-length": "163", "date": "Tue, 27 Jan 2026 01:14:01 GMT"} })
|
| 2409 | 2026-01-27T01:14:01.323Z | DEBG | test_vpcs (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:52572
method = GET
uri = http://[::1]:52572/sp/switch/1/component/stage0/caboose?firmware_slot=0
|
| 2410 | 2026-01-27T01:14:01.327Z | TRAC | test_vpcs (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 2411 | 2026-01-27T01:14:01.327Z | DEBG | test_vpcs (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 2412 | 2026-01-27T01:14:01.340Z | DEBG | test_vpcs (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 2413 | 2026-01-27T01:14:01.342Z | DEBG | test_vpcs (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:52572
result = Ok(Response { url: "http://[::1]:52572/sp/switch/1/component/stage0/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "d99b5184-cd20-4f02-b8e7-1d3b0032ac3c", "content-length": "166", "date": "Tue, 27 Jan 2026 01:14:01 GMT"} })
|
| 2414 | 2026-01-27T01:14:01.342Z | DEBG | test_vpcs (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:52572
method = GET
uri = http://[::1]:52572/sp/switch/1/component/stage0/caboose?firmware_slot=1
|
| 2415 | 2026-01-27T01:14:01.346Z | TRAC | test_vpcs (InternalApi): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
|
| 2416 | 2026-01-27T01:14:01.346Z | TRAC | test_vpcs (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
resource_id = 001de000-4401-4000-8000-000000000000
resource_type = Project
|
| 2417 | 2026-01-27T01:14:01.346Z | TRAC | test_vpcs (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 2418 | 2026-01-27T01:14:01.346Z | DEBG | test_vpcs (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 2419 | 2026-01-27T01:14:01.347Z | DEBG | test_vpcs (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 2420 | 2026-01-27T01:14:01.350Z | DEBG | test_vpcs (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:52572
result = Ok(Response { url: "http://[::1]:52572/sp/switch/1/component/stage0/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "7c2ce644-e9c2-4e67-bded-bc86dd361c19", "content-length": "166", "date": "Tue, 27 Jan 2026 01:14:01 GMT"} })
|
| 2421 | 2026-01-27T01:14:01.351Z | DEBG | test_vpcs (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:52572
method = GET
uri = http://[::1]:52572/sp/switch/1/component/rot/cmpa
|
| 2422 | 2026-01-27T01:14:01.354Z | TRAC | test_vpcs (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
resource_id = 001de000-5110-4000-8000-000000000001
resource_type = Silo
|
| 2423 | 2026-01-27T01:14:01.354Z | TRAC | test_vpcs (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 2424 | 2026-01-27T01:14:01.354Z | DEBG | test_vpcs (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 2425 | 2026-01-27T01:14:01.354Z | DEBG | test_vpcs (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 2426 | 2026-01-27T01:14:01.356Z | DEBG | test_vpcs (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:52572
result = Ok(Response { url: "http://[::1]:52572/sp/switch/1/component/rot/cmpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "2782b546-29cb-4ba1-b386-ed9a02227b22", "content-length": "702", "date": "Tue, 27 Jan 2026 01:14:01 GMT"} })
|
| 2427 | 2026-01-27T01:14:01.356Z | DEBG | test_vpcs (BackgroundTasks): client request
background_task = inventory_collection
body = Some(Body)
gateway_url = http://[::1]:52572
method = GET
uri = http://[::1]:52572/sp/switch/1/component/rot/cfpa
|
| 2428 | 2026-01-27T01:14:01.361Z | TRAC | test_vpcs (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 2429 | 2026-01-27T01:14:01.361Z | TRAC | test_vpcs (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 2430 | 2026-01-27T01:14:01.361Z | DEBG | test_vpcs (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 2431 | 2026-01-27T01:14:01.362Z | DEBG | test_vpcs (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 2432 | 2026-01-27T01:14:01.365Z | DEBG | test_vpcs (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:52572
result = Ok(Response { url: "http://[::1]:52572/sp/switch/1/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "6e07b50f-b502-4aa4-bbaa-3d526c77c03e", "content-length": "727", "date": "Tue, 27 Jan 2026 01:14:01 GMT"} })
|
| 2433 | 2026-01-27T01:14:01.365Z | DEBG | test_vpcs (BackgroundTasks): client request
background_task = inventory_collection
body = Some(Body)
gateway_url = http://[::1]:52572
method = GET
uri = http://[::1]:52572/sp/switch/1/component/rot/cfpa
|
| 2434 | 2026-01-27T01:14:01.368Z | DEBG | test_vpcs (InternalApi): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 2435 | 2026-01-27T01:14:01.386Z | DEBG | test_vpcs (InternalApi): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
result = Ok(())
|
| 2436 | 2026-01-27T01:14:01.386Z | TRAC | test_vpcs (InternalApi): successful lookup of siloed resource "Vpc" using built-in user
|
| 2437 | 2026-01-27T01:14:01.386Z | TRAC | test_vpcs (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 2438 | 2026-01-27T01:14:01.386Z | DEBG | test_vpcs (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 2439 | 2026-01-27T01:14:01.387Z | DEBG | test_vpcs (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 2440 | 2026-01-27T01:14:01.391Z | DEBG | test_vpcs (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:52572
result = Ok(Response { url: "http://[::1]:52572/sp/switch/1/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "3eef23cf-a329-48d2-bf62-a170416aaaf7", "content-length": "729", "date": "Tue, 27 Jan 2026 01:14:01 GMT"} })
|
| 2441 | 2026-01-27T01:14:01.391Z | DEBG | test_vpcs (BackgroundTasks): client request
background_task = inventory_collection
body = Some(Body)
gateway_url = http://[::1]:52572
method = GET
uri = http://[::1]:52572/sp/switch/1/component/rot/cfpa
|
| 2442 | 2026-01-27T01:14:01.392Z | TRAC | test_vpcs (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 2443 | 2026-01-27T01:14:01.392Z | DEBG | test_vpcs (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 2444 | 2026-01-27T01:14:01.393Z | DEBG | test_vpcs (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 2445 | 2026-01-27T01:14:01.398Z | DEBG | test_vpcs (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:52572
result = Ok(Response { url: "http://[::1]:52572/sp/switch/1/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "376d5600-5fdf-4945-90db-a47757d74ad7", "content-length": "728", "date": "Tue, 27 Jan 2026 01:14:01 GMT"} })
|
| 2446 | 2026-01-27T01:14:01.398Z | DEBG | test_vpcs (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:52572
method = GET
uri = http://[::1]:52572/sp/sled/0
|
| 2447 | 2026-01-27T01:14:01.398Z | TRAC | test_vpcs (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 2448 | 2026-01-27T01:14:01.398Z | DEBG | test_vpcs (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 2449 | 2026-01-27T01:14:01.399Z | DEBG | test_vpcs (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 2450 | 2026-01-27T01:14:01.407Z | TRAC | test_vpcs (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 2451 | 2026-01-27T01:14:01.407Z | DEBG | test_vpcs (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 2452 | 2026-01-27T01:14:01.409Z | DEBG | test_vpcs (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 2453 | 2026-01-27T01:14:01.412Z | DEBG | test_vpcs (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:52572
result = Ok(Response { url: "http://[::1]:52572/sp/sled/0", status: 200, headers: {"content-type": "application/json", "x-request-id": "47383de0-6c0f-4673-a1fd-f98b57d86536", "content-length": "723", "date": "Tue, 27 Jan 2026 01:14:01 GMT"} })
|
| 2454 | 2026-01-27T01:14:01.412Z | DEBG | test_vpcs (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:52572
method = GET
uri = http://[::1]:52572/sp/sled/0/component/host-boot-flash/active-slot
|
| 2455 | 2026-01-27T01:14:01.414Z | DEBG | test_vpcs (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:52572
result = Ok(Response { url: "http://[::1]:52572/sp/sled/0/component/host-boot-flash/active-slot", status: 200, headers: {"content-type": "application/json", "x-request-id": "81cf3226-e6b8-4866-af97-847a8b77586a", "content-length": "10", "date": "Tue, 27 Jan 2026 01:14:01 GMT"} })
|
| 2456 | 2026-01-27T01:14:01.414Z | DEBG | test_vpcs (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:52572
method = GET
uri = http://[::1]:52572/sp/sled/0/component/host-boot-flash/hash/0
|
| 2457 | 2026-01-27T01:14:01.415Z | TRAC | test_vpcs (InternalApi): authorize begin
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000002, lookup_type: ByName("nexus") }
|
| 2458 | 2026-01-27T01:14:01.415Z | TRAC | test_vpcs (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
resource_id = 001de000-4401-4000-8000-000000000000
resource_type = Project
|
| 2459 | 2026-01-27T01:14:01.415Z | TRAC | test_vpcs (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 2460 | 2026-01-27T01:14:01.415Z | DEBG | test_vpcs (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 2461 | 2026-01-27T01:14:01.421Z | DEBG | test_vpcs (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 2462 | 2026-01-27T01:14:01.433Z | DEBG | test_vpcs (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:52572
result = Ok(Response { url: "http://[::1]:52572/sp/sled/0/component/host-boot-flash/hash/0", status: 200, headers: {"content-type": "application/json", "x-request-id": "1221163b-44d4-4d15-86ba-acfcb196837d", "content-length": "144", "date": "Tue, 27 Jan 2026 01:14:01 GMT"} })
|
| 2463 | 2026-01-27T01:14:01.433Z | DEBG | test_vpcs (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:52572
method = GET
uri = http://[::1]:52572/sp/sled/0/component/host-boot-flash/hash/1
|
| 2464 | 2026-01-27T01:14:01.434Z | TRAC | test_vpcs (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
resource_id = 001de000-5110-4000-8000-000000000001
resource_type = Silo
|
| 2465 | 2026-01-27T01:14:01.434Z | TRAC | test_vpcs (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 2466 | 2026-01-27T01:14:01.434Z | DEBG | test_vpcs (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 2467 | 2026-01-27T01:14:01.436Z | DEBG | test_vpcs (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 2468 | 2026-01-27T01:14:01.441Z | DEBG | test_vpcs (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:52572
result = Ok(Response { url: "http://[::1]:52572/sp/sled/0/component/host-boot-flash/hash/1", status: 200, headers: {"content-type": "application/json", "x-request-id": "cb4e027f-52e4-4212-a997-63fc98fd54c9", "content-length": "147", "date": "Tue, 27 Jan 2026 01:14:01 GMT"} })
|
| 2469 | 2026-01-27T01:14:01.442Z | DEBG | test_vpcs (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:52572
method = GET
uri = http://[::1]:52572/sp/sled/0/component/sp/caboose?firmware_slot=0
|
| 2470 | 2026-01-27T01:14:01.443Z | TRAC | test_vpcs (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 2471 | 2026-01-27T01:14:01.443Z | TRAC | test_vpcs (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 2472 | 2026-01-27T01:14:01.443Z | DEBG | test_vpcs (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 2473 | 2026-01-27T01:14:01.445Z | DEBG | test_vpcs (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 2474 | 2026-01-27T01:14:01.452Z | DEBG | test_vpcs (InternalApi): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 2475 | 2026-01-27T01:14:01.471Z | DEBG | test_vpcs (InternalApi): authorize result
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000002, lookup_type: ByName("nexus") }
result = Ok(())
|
| 2476 | 2026-01-27T01:14:01.471Z | TRAC | test_vpcs (InternalApi): successful lookup of siloed resource "VpcSubnet" using built-in user
|
| 2477 | 2026-01-27T01:14:01.471Z | TRAC | test_vpcs (InternalApi): authorize begin
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000002, lookup_type: ByName("nexus") }
|
| 2478 | 2026-01-27T01:14:01.472Z | TRAC | test_vpcs (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
resource_id = 001de000-4401-4000-8000-000000000000
resource_type = Project
|
| 2479 | 2026-01-27T01:14:01.472Z | TRAC | test_vpcs (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 2480 | 2026-01-27T01:14:01.472Z | DEBG | test_vpcs (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 2481 | 2026-01-27T01:14:01.472Z | DEBG | test_vpcs (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 2482 | 2026-01-27T01:14:01.473Z | DEBG | test_vpcs (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:52572
result = Ok(Response { url: "http://[::1]:52572/sp/sled/0/component/sp/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "4f1bfeb5-b97f-4566-847c-20d9e37458b9", "content-length": "109", "date": "Tue, 27 Jan 2026 01:14:01 GMT"} })
|
| 2483 | 2026-01-27T01:14:01.473Z | DEBG | test_vpcs (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:52572
method = GET
uri = http://[::1]:52572/sp/sled/0/component/sp/caboose?firmware_slot=1
|
| 2484 | 2026-01-27T01:14:01.477Z | DEBG | test_vpcs (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:52572
result = Ok(Response { url: "http://[::1]:52572/sp/sled/0/component/sp/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "62ea5ce0-ffca-4fd6-9e7d-e0d268e0813d", "content-length": "109", "date": "Tue, 27 Jan 2026 01:14:01 GMT"} })
|
| 2485 | 2026-01-27T01:14:01.477Z | DEBG | test_vpcs (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:52572
method = GET
uri = http://[::1]:52572/sp/sled/0/component/rot/caboose?firmware_slot=0
|
| 2486 | 2026-01-27T01:14:01.477Z | TRAC | test_vpcs (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
resource_id = 001de000-5110-4000-8000-000000000001
resource_type = Silo
|
| 2487 | 2026-01-27T01:14:01.477Z | TRAC | test_vpcs (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 2488 | 2026-01-27T01:14:01.477Z | DEBG | test_vpcs (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 2489 | 2026-01-27T01:14:01.479Z | DEBG | test_vpcs (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 2490 | 2026-01-27T01:14:01.491Z | TRAC | test_vpcs (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 2491 | 2026-01-27T01:14:01.491Z | TRAC | test_vpcs (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 2492 | 2026-01-27T01:14:01.491Z | DEBG | test_vpcs (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 2493 | 2026-01-27T01:14:01.492Z | DEBG | test_vpcs (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 2494 | 2026-01-27T01:14:01.505Z | DEBG | test_vpcs (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:52572
result = Ok(Response { url: "http://[::1]:52572/sp/sled/0/component/rot/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "05581b9e-09ab-4391-9e44-c471d7d57948", "content-length": "163", "date": "Tue, 27 Jan 2026 01:14:01 GMT"} })
|
| 2495 | 2026-01-27T01:14:01.505Z | DEBG | test_vpcs (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:52572
method = GET
uri = http://[::1]:52572/sp/sled/0/component/rot/caboose?firmware_slot=1
|
| 2496 | 2026-01-27T01:14:01.507Z | DEBG | test_vpcs (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:52572
result = Ok(Response { url: "http://[::1]:52572/sp/sled/0/component/rot/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "07ad828a-8f82-4c34-a97d-c86d02cd4666", "content-length": "163", "date": "Tue, 27 Jan 2026 01:14:01 GMT"} })
|
| 2497 | 2026-01-27T01:14:01.508Z | DEBG | test_vpcs (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:52572
method = GET
uri = http://[::1]:52572/sp/sled/0/component/stage0/caboose?firmware_slot=0
|
| 2498 | 2026-01-27T01:14:01.513Z | DEBG | test_vpcs (InternalApi): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 2499 | 2026-01-27T01:14:01.524Z | DEBG | test_vpcs (InternalApi): authorize result
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000002, lookup_type: ByName("nexus") }
result = Ok(())
|
| 2500 | 2026-01-27T01:14:01.524Z | TRAC | test_vpcs (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 2501 | 2026-01-27T01:14:01.524Z | DEBG | test_vpcs (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 2502 | 2026-01-27T01:14:01.524Z | DEBG | test_vpcs (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 2503 | 2026-01-27T01:14:01.526Z | DEBG | test_vpcs (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:52572
result = Ok(Response { url: "http://[::1]:52572/sp/sled/0/component/stage0/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "ad4ef54f-f11a-4b72-8a85-b1d5c5a800de", "content-length": "166", "date": "Tue, 27 Jan 2026 01:14:01 GMT"} })
|
| 2504 | 2026-01-27T01:14:01.526Z | DEBG | test_vpcs (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:52572
method = GET
uri = http://[::1]:52572/sp/sled/0/component/stage0/caboose?firmware_slot=1
|
| 2505 | 2026-01-27T01:14:01.551Z | TRAC | test_vpcs (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 2506 | 2026-01-27T01:14:01.551Z | DEBG | test_vpcs (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 2507 | 2026-01-27T01:14:01.553Z | DEBG | test_vpcs (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 2508 | 2026-01-27T01:14:01.569Z | TRAC | test_vpcs (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 2509 | 2026-01-27T01:14:01.569Z | DEBG | test_vpcs (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 2510 | 2026-01-27T01:14:01.570Z | DEBG | test_vpcs (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 2511 | 2026-01-27T01:14:01.595Z | TRAC | test_vpcs (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 2512 | 2026-01-27T01:14:01.595Z | DEBG | test_vpcs (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 2513 | 2026-01-27T01:14:01.596Z | DEBG | test_vpcs (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 2514 | 2026-01-27T01:14:01.609Z | TRAC | test_vpcs (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 2515 | 2026-01-27T01:14:01.609Z | DEBG | test_vpcs (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 2516 | 2026-01-27T01:14:01.610Z | DEBG | test_vpcs (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 2517 | 2026-01-27T01:14:01.617Z | TRAC | test_vpcs (InternalApi): authorize begin
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000001, lookup_type: ByName("external-dns") }
|
| 2518 | 2026-01-27T01:14:01.617Z | TRAC | test_vpcs (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
resource_id = 001de000-4401-4000-8000-000000000000
resource_type = Project
|
| 2519 | 2026-01-27T01:14:01.617Z | TRAC | test_vpcs (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 2520 | 2026-01-27T01:14:01.617Z | DEBG | test_vpcs (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 2521 | 2026-01-27T01:14:01.618Z | DEBG | test_vpcs (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 2522 | 2026-01-27T01:14:01.625Z | DEBG | test_vpcs (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:52572
result = Ok(Response { url: "http://[::1]:52572/sp/sled/0/component/stage0/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "d48b3353-2bad-43f0-8f5e-6e763b382763", "content-length": "166", "date": "Tue, 27 Jan 2026 01:14:01 GMT"} })
|
| 2523 | 2026-01-27T01:14:01.625Z | DEBG | test_vpcs (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:52572
method = GET
uri = http://[::1]:52572/sp/sled/0/component/rot/cmpa
|
| 2524 | 2026-01-27T01:14:01.626Z | TRAC | test_vpcs (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
resource_id = 001de000-5110-4000-8000-000000000001
resource_type = Silo
|
| 2525 | 2026-01-27T01:14:01.626Z | TRAC | test_vpcs (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 2526 | 2026-01-27T01:14:01.626Z | DEBG | test_vpcs (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 2527 | 2026-01-27T01:14:01.628Z | DEBG | test_vpcs (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 2528 | 2026-01-27T01:14:01.646Z | DEBG | test_vpcs (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:52572
result = Ok(Response { url: "http://[::1]:52572/sp/sled/0/component/rot/cmpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "0a9b6486-cd97-4db6-8c60-414e2226d5c3", "content-length": "702", "date": "Tue, 27 Jan 2026 01:14:01 GMT"} })
|
| 2529 | 2026-01-27T01:14:01.646Z | DEBG | test_vpcs (BackgroundTasks): client request
background_task = inventory_collection
body = Some(Body)
gateway_url = http://[::1]:52572
method = GET
uri = http://[::1]:52572/sp/sled/0/component/rot/cfpa
|
| 2530 | 2026-01-27T01:14:01.647Z | TRAC | test_vpcs (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 2531 | 2026-01-27T01:14:01.647Z | TRAC | test_vpcs (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 2532 | 2026-01-27T01:14:01.647Z | DEBG | test_vpcs (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 2533 | 2026-01-27T01:14:01.648Z | DEBG | test_vpcs (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 2534 | 2026-01-27T01:14:01.657Z | DEBG | test_vpcs (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:52572
result = Ok(Response { url: "http://[::1]:52572/sp/sled/0/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "3735ca3e-e3a5-4611-a5f5-c84a65d2fb73", "content-length": "727", "date": "Tue, 27 Jan 2026 01:14:01 GMT"} })
|
| 2535 | 2026-01-27T01:14:01.657Z | DEBG | test_vpcs (BackgroundTasks): client request
background_task = inventory_collection
body = Some(Body)
gateway_url = http://[::1]:52572
method = GET
uri = http://[::1]:52572/sp/sled/0/component/rot/cfpa
|
| 2536 | 2026-01-27T01:14:01.658Z | DEBG | test_vpcs (InternalApi): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 2537 | 2026-01-27T01:14:01.691Z | DEBG | test_vpcs (InternalApi): authorize result
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000001, lookup_type: ByName("external-dns") }
result = Ok(())
|
| 2538 | 2026-01-27T01:14:01.691Z | TRAC | test_vpcs (InternalApi): successful lookup of siloed resource "VpcSubnet" using built-in user
|
| 2539 | 2026-01-27T01:14:01.691Z | TRAC | test_vpcs (InternalApi): authorize begin
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000001, lookup_type: ByName("external-dns") }
|
| 2540 | 2026-01-27T01:14:01.691Z | TRAC | test_vpcs (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
resource_id = 001de000-4401-4000-8000-000000000000
resource_type = Project
|
| 2541 | 2026-01-27T01:14:01.691Z | TRAC | test_vpcs (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 2542 | 2026-01-27T01:14:01.691Z | DEBG | test_vpcs (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 2543 | 2026-01-27T01:14:01.692Z | DEBG | test_vpcs (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 2544 | 2026-01-27T01:14:01.699Z | DEBG | test_vpcs (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:52572
result = Ok(Response { url: "http://[::1]:52572/sp/sled/0/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "db888561-7ab0-4ea9-b991-105f2fd60e23", "content-length": "729", "date": "Tue, 27 Jan 2026 01:14:01 GMT"} })
|
| 2545 | 2026-01-27T01:14:01.699Z | DEBG | test_vpcs (BackgroundTasks): client request
background_task = inventory_collection
body = Some(Body)
gateway_url = http://[::1]:52572
method = GET
uri = http://[::1]:52572/sp/sled/0/component/rot/cfpa
|
| 2546 | 2026-01-27T01:14:01.701Z | TRAC | test_vpcs (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
resource_id = 001de000-5110-4000-8000-000000000001
resource_type = Silo
|
| 2547 | 2026-01-27T01:14:01.701Z | TRAC | test_vpcs (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 2548 | 2026-01-27T01:14:01.701Z | DEBG | test_vpcs (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 2549 | 2026-01-27T01:14:01.702Z | DEBG | test_vpcs (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 2550 | 2026-01-27T01:14:01.709Z | DEBG | test_vpcs (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:52572
result = Ok(Response { url: "http://[::1]:52572/sp/sled/0/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "ea375a39-f8c9-4356-8a0b-93719331d73e", "content-length": "728", "date": "Tue, 27 Jan 2026 01:14:01 GMT"} })
|
| 2551 | 2026-01-27T01:14:01.709Z | DEBG | test_vpcs (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:52572
method = GET
uri = http://[::1]:52572/sp/sled/1
|
| 2552 | 2026-01-27T01:14:01.710Z | TRAC | test_vpcs (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 2553 | 2026-01-27T01:14:01.710Z | TRAC | test_vpcs (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 2554 | 2026-01-27T01:14:01.710Z | DEBG | test_vpcs (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 2555 | 2026-01-27T01:14:01.712Z | DEBG | test_vpcs (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 2556 | 2026-01-27T01:14:01.718Z | DEBG | test_vpcs (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:52572
result = Ok(Response { url: "http://[::1]:52572/sp/sled/1", status: 200, headers: {"content-type": "application/json", "x-request-id": "017cf433-128d-4c9f-a044-5ee1153e4999", "content-length": "723", "date": "Tue, 27 Jan 2026 01:14:01 GMT"} })
|
| 2557 | 2026-01-27T01:14:01.719Z | DEBG | test_vpcs (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:52572
method = GET
uri = http://[::1]:52572/sp/sled/1/component/host-boot-flash/active-slot
|
| 2558 | 2026-01-27T01:14:01.719Z | DEBG | test_vpcs (InternalApi): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 2559 | 2026-01-27T01:14:01.743Z | DEBG | test_vpcs (InternalApi): authorize result
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000001, lookup_type: ByName("external-dns") }
result = Ok(())
|
| 2560 | 2026-01-27T01:14:01.743Z | TRAC | test_vpcs (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 2561 | 2026-01-27T01:14:01.743Z | DEBG | test_vpcs (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 2562 | 2026-01-27T01:14:01.744Z | DEBG | test_vpcs (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 2563 | 2026-01-27T01:14:01.748Z | DEBG | test_vpcs (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:52572
result = Ok(Response { url: "http://[::1]:52572/sp/sled/1/component/host-boot-flash/active-slot", status: 200, headers: {"content-type": "application/json", "x-request-id": "29d7722a-21da-477d-9d9b-b45d575dde75", "content-length": "10", "date": "Tue, 27 Jan 2026 01:14:01 GMT"} })
|
| 2564 | 2026-01-27T01:14:01.749Z | DEBG | test_vpcs (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:52572
method = GET
uri = http://[::1]:52572/sp/sled/1/component/host-boot-flash/hash/0
|
| 2565 | 2026-01-27T01:14:01.757Z | DEBG | test_vpcs (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:52572
result = Ok(Response { url: "http://[::1]:52572/sp/sled/1/component/host-boot-flash/hash/0", status: 200, headers: {"content-type": "application/json", "x-request-id": "8b6b3310-d00a-438b-add8-7e6019572b07", "content-length": "144", "date": "Tue, 27 Jan 2026 01:14:01 GMT"} })
|
| 2566 | 2026-01-27T01:14:01.758Z | DEBG | test_vpcs (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:52572
method = GET
uri = http://[::1]:52572/sp/sled/1/component/host-boot-flash/hash/1
|
| 2567 | 2026-01-27T01:14:01.760Z | DEBG | test_vpcs (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:52572
result = Ok(Response { url: "http://[::1]:52572/sp/sled/1/component/host-boot-flash/hash/1", status: 200, headers: {"content-type": "application/json", "x-request-id": "fe93e46a-8319-4bf7-862f-a986a1a3cc57", "content-length": "147", "date": "Tue, 27 Jan 2026 01:14:01 GMT"} })
|
| 2568 | 2026-01-27T01:14:01.760Z | DEBG | test_vpcs (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:52572
method = GET
uri = http://[::1]:52572/sp/sled/1/component/sp/caboose?firmware_slot=0
|
| 2569 | 2026-01-27T01:14:01.760Z | DEBG | test_vpcs (InternalApi): resolved names for firewall rules
instance_interfaces = {}
subnet_interfaces = {Name("nexus"): [NetworkInterface { id: 82c3c615-0929-4977-b0aa-1e7826847b55, kind: Service { id: 913233fe-92a8-4635-9572-183f495429c4 }, name: Name("nexus-913233fe-92a8-4635-9572-183f495429c4"), ip_config: V4(PrivateIpv4Config { ip: 172.30.2.6, subnet: Ipv4Net { addr: 172.30.2.0, width: 24 }, transit_ips: [] }), mac: MacAddr(MacAddr6([168, 64, 37, 255, 128, 1])), vni: Vni(100), primary: true, slot: 0 }], Name("external-dns"): [NetworkInterface { id: 47a89b77-3b91-469f-95b1-f4d29dbf1a52, kind: Service { id: 326b5e01-f8e6-4763-80e1-2d51b531f7e2 }, name: Name("external-dns-326b5e01-f8e6-4763-80e1-2d51b531f7e2"), ip_config: V6(PrivateIpv6Config { ip: fd77:e9d2:9cd9:1::6, subnet: Ipv6Net { addr: fd77:e9d2:9cd9:1::, width: 64 }, transit_ips: [] }), mac: MacAddr(MacAddr6([168, 64, 37, 255, 128, 0])), vni: Vni(100), primary: true, slot: 0 }]}
subnet_networks = {Name("nexus"): [V4(Ipv4Network { addr: 172.30.2.0, prefix: 24 }), V6(Ipv6Network { addr: fd77:e9d2:9cd9:2::, prefix: 64 })], Name("external-dns"): [V4(Ipv4Network { addr: 172.30.1.0, prefix: 24 }), V6(Ipv6Network { addr: fd77:e9d2:9cd9:1::, prefix: 64 })]}
vpc_interfaces = {}
|
| 2570 | 2026-01-27T01:14:01.761Z | TRAC | test_vpcs (InternalApi): authorize begin
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Fleet
|
| 2571 | 2026-01-27T01:14:01.761Z | TRAC | test_vpcs (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 2572 | 2026-01-27T01:14:01.761Z | TRAC | test_vpcs (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 2573 | 2026-01-27T01:14:01.761Z | DEBG | test_vpcs (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 2574 | 2026-01-27T01:14:01.762Z | DEBG | test_vpcs (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 2575 | 2026-01-27T01:14:01.770Z | DEBG | test_vpcs (InternalApi): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 2576 | 2026-01-27T01:14:01.777Z | DEBG | test_vpcs (InternalApi): authorize result
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Fleet
result = Ok(())
|
| 2577 | 2026-01-27T01:14:01.777Z | TRAC | test_vpcs (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 2578 | 2026-01-27T01:14:01.777Z | DEBG | test_vpcs (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 2579 | 2026-01-27T01:14:01.778Z | DEBG | test_vpcs (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 2580 | 2026-01-27T01:14:01.781Z | DEBG | test_vpcs (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:52572
result = Ok(Response { url: "http://[::1]:52572/sp/sled/1/component/sp/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "40f5db10-8659-4ce5-8bab-46968225d984", "content-length": "109", "date": "Tue, 27 Jan 2026 01:14:01 GMT"} })
|
| 2581 | 2026-01-27T01:14:01.781Z | DEBG | test_vpcs (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:52572
method = GET
uri = http://[::1]:52572/sp/sled/1/component/sp/caboose?firmware_slot=1
|
| 2582 | 2026-01-27T01:14:01.783Z | TRAC | test_vpcs (InternalApi): fetched allowlist from DB
allowed = AllowList { id: 001de000-a110-4000-8000-000000000000, time_created: 2026-01-26T23:16:37.697587Z, time_modified: 2026-01-27T01:13:59.725232Z, allowed_ips: None }
|
| 2583 | 2026-01-27T01:14:01.783Z | DEBG | test_vpcs (InternalApi): Allowlist for user-facing services is set to allow any inbound traffic. Existing VPC firewall rules will not be modified.
|
| 2584 | 2026-01-27T01:14:01.783Z | DEBG | test_vpcs (InternalApi): resolved firewall rules for sled agents
sled_agent_rules = [ResolvedVpcFirewallRule { status: Enabled, direction: Inbound, targets: [NetworkInterface { id: 47a89b77-3b91-469f-95b1-f4d29dbf1a52, kind: Service { id: 326b5e01-f8e6-4763-80e1-2d51b531f7e2 }, name: Name("external-dns-326b5e01-f8e6-4763-80e1-2d51b531f7e2"), ip_config: V6(PrivateIpv6Config { ip: fd77:e9d2:9cd9:1::6, subnet: Ipv6Net { addr: fd77:e9d2:9cd9:1::, width: 64 }, transit_ips: [] }), mac: MacAddr(MacAddr6([168, 64, 37, 255, 128, 0])), vni: Vni(100), primary: true, slot: 0 }], filter_hosts: None, filter_ports: Some([L4PortRange { first: L4Port(53), last: L4Port(53) }]), filter_protocols: Some([Udp]), action: Allow, priority: VpcFirewallRulePriority(65534) }, ResolvedVpcFirewallRule { status: Enabled, direction: Inbound, targets: [NetworkInterface { id: 82c3c615-0929-4977-b0aa-1e7826847b55, kind: Service { id: 913233fe-92a8-4635-9572-183f495429c4 }, name: Name("nexus-913233fe-92a8-4635-9572-183f495429c4"), ip_config: V4(PrivateIpv4Config { ip: 172.30.2.6, subnet: Ipv4Net { addr: 172.30.2.0, width: 24 }, transit_ips: [] }), mac: MacAddr(MacAddr6([168, 64, 37, 255, 128, 1])), vni: Vni(100), primary: true, slot: 0 }, NetworkInterface { id: 47a89b77-3b91-469f-95b1-f4d29dbf1a52, kind: Service { id: 326b5e01-f8e6-4763-80e1-2d51b531f7e2 }, name: Name("external-dns-326b5e01-f8e6-4763-80e1-2d51b531f7e2"), ip_config: V6(PrivateIpv6Config { ip: fd77:e9d2:9cd9:1::6, subnet: Ipv6Net { addr: fd77:e9d2:9cd9:1::, width: 64 }, transit_ips: [] }), mac: MacAddr(MacAddr6([168, 64, 37, 255, 128, 0])), vni: Vni(100), primary: true, slot: 0 }], filter_hosts: None, filter_ports: None, filter_protocols: Some([Icmp(Some(VpcFirewallIcmpFilter { icmp_type: 3, code: Some(IcmpParamRange { first: 3, last: 4 }) })), Icmp(Some(VpcFirewallIcmpFilter { icmp_type: 5, code: None })), Icmp(Some(VpcFirewallIcmpFilter { icmp_type: 11, code: None }))]), action: Allow, priority: VpcFirewallRulePriority(65534) }, ResolvedVpcFirewallRule { status: Enabled, direction: Inbound, targets: [NetworkInterface { id: 82c3c615-0929-4977-b0aa-1e7826847b55, kind: Service { id: 913233fe-92a8-4635-9572-183f495429c4 }, name: Name("nexus-913233fe-92a8-4635-9572-183f495429c4"), ip_config: V4(PrivateIpv4Config { ip: 172.30.2.6, subnet: Ipv4Net { addr: 172.30.2.0, width: 24 }, transit_ips: [] }), mac: MacAddr(MacAddr6([168, 64, 37, 255, 128, 1])), vni: Vni(100), primary: true, slot: 0 }], filter_hosts: None, filter_ports: Some([L4PortRange { first: L4Port(80), last: L4Port(80) }, L4PortRange { first: L4Port(443), last: L4Port(443) }]), filter_protocols: Some([Tcp]), action: Allow, priority: VpcFirewallRulePriority(65534) }]
|
| 2585 | 2026-01-27T01:14:01.784Z | DEBG | test_vpcs (InternalApi): resolved 3 rules for sleds
|
| 2586 | 2026-01-27T01:14:01.788Z | DEBG | test_vpcs (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:52572
result = Ok(Response { url: "http://[::1]:52572/sp/sled/1/component/sp/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "2a3b1109-7d7f-469b-8f8b-53835c72673d", "content-length": "109", "date": "Tue, 27 Jan 2026 01:14:01 GMT"} })
|
| 2587 | 2026-01-27T01:14:01.788Z | DEBG | test_vpcs (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:52572
method = GET
uri = http://[::1]:52572/sp/sled/1/component/rot/caboose?firmware_slot=0
|
| 2588 | 2026-01-27T01:14:01.794Z | DEBG | test_vpcs (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:52572
result = Ok(Response { url: "http://[::1]:52572/sp/sled/1/component/rot/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "9dd62439-a42e-4533-afe3-2bd4253e94f3", "content-length": "163", "date": "Tue, 27 Jan 2026 01:14:01 GMT"} })
|
| 2589 | 2026-01-27T01:14:01.795Z | DEBG | test_vpcs (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:52572
method = GET
uri = http://[::1]:52572/sp/sled/1/component/rot/caboose?firmware_slot=1
|
| 2590 | 2026-01-27T01:14:01.800Z | DEBG | test_vpcs (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:52572
result = Ok(Response { url: "http://[::1]:52572/sp/sled/1/component/rot/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "5ff565f6-be1b-46a9-8c9c-a9560efd6dff", "content-length": "163", "date": "Tue, 27 Jan 2026 01:14:01 GMT"} })
|
| 2591 | 2026-01-27T01:14:01.801Z | DEBG | test_vpcs (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:52572
method = GET
uri = http://[::1]:52572/sp/sled/1/component/stage0/caboose?firmware_slot=0
|
| 2592 | 2026-01-27T01:14:01.803Z | DEBG | test_vpcs (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:52572
result = Ok(Response { url: "http://[::1]:52572/sp/sled/1/component/stage0/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "137d3815-c54c-4d05-88e7-394b66ee974a", "content-length": "166", "date": "Tue, 27 Jan 2026 01:14:01 GMT"} })
|
| 2593 | 2026-01-27T01:14:01.804Z | DEBG | test_vpcs (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:52572
method = GET
uri = http://[::1]:52572/sp/sled/1/component/stage0/caboose?firmware_slot=1
|
| 2594 | 2026-01-27T01:14:01.812Z | DEBG | test_vpcs (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:52572
result = Ok(Response { url: "http://[::1]:52572/sp/sled/1/component/stage0/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "3aa9a25f-c740-47c5-8ec9-d320978576cd", "content-length": "166", "date": "Tue, 27 Jan 2026 01:14:01 GMT"} })
|
| 2595 | 2026-01-27T01:14:01.812Z | DEBG | test_vpcs (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:52572
method = GET
uri = http://[::1]:52572/sp/sled/1/component/rot/cmpa
|
| 2596 | 2026-01-27T01:14:01.819Z | DEBG | test_vpcs (InternalApi): resolved sleds for vpc oxide-services
vpc_to_sled = [Sled { identity: SledIdentity { id: b6d65341-167c-41df-9b5c-41cded99c229 (sled), time_created: 2026-01-27T01:13:52.435851Z, time_modified: 2026-01-27T01:13:52.435851Z }, time_deleted: None, rcgen: Generation(Generation(1)), rack_id: c19a698f-c6f9-4a17-ae30-20d711b8f7dc, is_scrimlet: true, serial_number: "SimGimlet00", part_number: "i86pc", revision: SqlU32(3), usable_hardware_threads: SqlU32(16), usable_physical_ram: ByteCount(ByteCount(34359738368)), reservoir_size: ByteCount(ByteCount(17179869184)), ip: ::1, port: SqlU16(59842), last_used_address: ::ffff, policy: InService, state: Active, sled_agent_gen: Generation(Generation(1)), repo_depot_port: SqlU16(50229), cpu_family: AmdMilan }]
|
| 2597 | 2026-01-27T01:14:01.819Z | DEBG | test_vpcs (InternalApi): sending firewall rules to sled agents
|
| 2598 | 2026-01-27T01:14:01.910Z | TRAC | test_vpcs (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 2599 | 2026-01-27T01:14:01.910Z | DEBG | test_vpcs (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 2600 | 2026-01-27T01:14:01.911Z | DEBG | test_vpcs (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 2601 | 2026-01-27T01:14:01.913Z | DEBG | test_vpcs (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:52572
result = Ok(Response { url: "http://[::1]:52572/sp/sled/1/component/rot/cmpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "830f2368-1d3d-4517-b024-a19daecfe930", "content-length": "702", "date": "Tue, 27 Jan 2026 01:14:01 GMT"} })
|
| 2602 | 2026-01-27T01:14:01.913Z | DEBG | test_vpcs (BackgroundTasks): client request
background_task = inventory_collection
body = Some(Body)
gateway_url = http://[::1]:52572
method = GET
uri = http://[::1]:52572/sp/sled/1/component/rot/cfpa
|
| 2603 | 2026-01-27T01:14:01.917Z | DEBG | test_vpcs (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:52572
result = Ok(Response { url: "http://[::1]:52572/sp/sled/1/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "408d7f8a-4494-4d8f-b36f-822691a69eac", "content-length": "727", "date": "Tue, 27 Jan 2026 01:14:01 GMT"} })
|
| 2604 | 2026-01-27T01:14:01.917Z | DEBG | test_vpcs (BackgroundTasks): client request
background_task = inventory_collection
body = Some(Body)
gateway_url = http://[::1]:52572
method = GET
uri = http://[::1]:52572/sp/sled/1/component/rot/cfpa
|
| 2605 | 2026-01-27T01:14:01.918Z | TRAC | test_vpcs (InternalApi): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Sled { parent: Fleet, key: b6d65341-167c-41df-9b5c-41cded99c229 (sled), lookup_type: ById(b6d65341-167c-41df-9b5c-41cded99c229) }
|
| 2606 | 2026-01-27T01:14:01.919Z | TRAC | test_vpcs (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 2607 | 2026-01-27T01:14:01.919Z | TRAC | test_vpcs (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 2608 | 2026-01-27T01:14:01.919Z | DEBG | test_vpcs (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 2609 | 2026-01-27T01:14:01.920Z | DEBG | test_vpcs (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 2610 | 2026-01-27T01:14:01.925Z | DEBG | test_vpcs (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:52572
result = Ok(Response { url: "http://[::1]:52572/sp/sled/1/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "f2f32d1e-a190-49be-ac81-9b77a5bed8f8", "content-length": "729", "date": "Tue, 27 Jan 2026 01:14:01 GMT"} })
|
| 2611 | 2026-01-27T01:14:01.925Z | DEBG | test_vpcs (BackgroundTasks): client request
background_task = inventory_collection
body = Some(Body)
gateway_url = http://[::1]:52572
method = GET
uri = http://[::1]:52572/sp/sled/1/component/rot/cfpa
|
| 2612 | 2026-01-27T01:14:01.927Z | DEBG | test_vpcs (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:52572
result = Ok(Response { url: "http://[::1]:52572/sp/sled/1/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "9aba4597-de65-46bc-a274-1e9b8bcc5763", "content-length": "728", "date": "Tue, 27 Jan 2026 01:14:01 GMT"} })
|
| 2613 | 2026-01-27T01:14:01.928Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = inventory_collection
resource = Fleet
|
| 2614 | 2026-01-27T01:14:01.928Z | TRAC | test_vpcs (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = inventory_collection
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 2615 | 2026-01-27T01:14:01.928Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = inventory_collection
resource = Database
|
| 2616 | 2026-01-27T01:14:01.928Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = inventory_collection
roles = RoleSet { roles: {} }
|
| 2617 | 2026-01-27T01:14:01.930Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = inventory_collection
resource = Database
result = Ok(())
|
| 2618 | 2026-01-27T01:14:01.932Z | DEBG | test_vpcs (InternalApi): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 2619 | 2026-01-27T01:14:01.947Z | DEBG | test_vpcs (InternalApi): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Sled { parent: Fleet, key: b6d65341-167c-41df-9b5c-41cded99c229 (sled), lookup_type: ById(b6d65341-167c-41df-9b5c-41cded99c229) }
result = Ok(())
|
| 2620 | 2026-01-27T01:14:01.947Z | DEBG | test_vpcs (InternalApi): client request
SledAgent = b6d65341-167c-41df-9b5c-41cded99c229
body = Some(Body)
method = PUT
uri = http://[::1]:59842/vpc/001de000-074c-4000-8000-000000000000/firewall/rules
|
| 2621 | 2026-01-27T01:14:01.951Z | INFO | test_vpcs (dropshot): accepted connection
local_addr = [::1]:59842
remote_addr = [::1]:47309
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
| 2622 | 2026-01-27T01:14:01.951Z | TRAC | test_vpcs (dropshot): incoming request
local_addr = [::1]:59842
method = PUT
remote_addr = [::1]:47309
req_id = fbb010fe-9bec-4234-9f0f-1274984c9b6f
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
uri = /vpc/001de000-074c-4000-8000-000000000000/firewall/rules
|
| 2623 | 2026-01-27T01:14:01.951Z | DEBG | test_vpcs (dropshot): determined request API version
local_addr = [::1]:59842
method = PUT
remote_addr = [::1]:47309
req_id = fbb010fe-9bec-4234-9f0f-1274984c9b6f
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
uri = /vpc/001de000-074c-4000-8000-000000000000/firewall/rules
version = 15.0.0
|
| 2624 | 2026-01-27T01:14:01.953Z | INFO | test_vpcs (dropshot): request completed
latency_us = 1606
local_addr = [::1]:59842
method = PUT
remote_addr = [::1]:47309
req_id = fbb010fe-9bec-4234-9f0f-1274984c9b6f
response_code = 204
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
uri = /vpc/001de000-074c-4000-8000-000000000000/firewall/rules
|
| 2625 | 2026-01-27T01:14:01.953Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = inventory_collection
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 2626 | 2026-01-27T01:14:01.960Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = inventory_collection
resource = Fleet
result = Ok(())
|
| 2627 | 2026-01-27T01:14:01.960Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = inventory_collection
resource = Fleet
|
| 2628 | 2026-01-27T01:14:01.960Z | TRAC | test_vpcs (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = inventory_collection
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 2629 | 2026-01-27T01:14:01.960Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = inventory_collection
resource = Database
|
| 2630 | 2026-01-27T01:14:01.961Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = inventory_collection
roles = RoleSet { roles: {} }
|
| 2631 | 2026-01-27T01:14:01.961Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = inventory_collection
resource = Database
result = Ok(())
|
| 2632 | 2026-01-27T01:14:01.964Z | DEBG | test_vpcs (InternalApi): client response
SledAgent = b6d65341-167c-41df-9b5c-41cded99c229
result = Ok(Response { url: "http://[::1]:59842/vpc/001de000-074c-4000-8000-000000000000/firewall/rules", status: 204, headers: {"x-request-id": "fbb010fe-9bec-4234-9f0f-1274984c9b6f", "date": "Tue, 27 Jan 2026 01:14:01 GMT"} })
|
| 2633 | 2026-01-27T01:14:01.966Z | INFO | test_vpcs (InternalApi): updated firewall rules on 1 sleds
|
| 2634 | 2026-01-27T01:14:01.966Z | INFO | test_vpcs (nexus): plumbed initial IP allowlist
|
| 2635 | 2026-01-27T01:14:02.124Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = GET
path = /
versions = all
|
| 2636 | 2026-01-27T01:14:02.124Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = GET
path = /access
versions = all
|
| 2637 | 2026-01-27T01:14:02.124Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = GET
path = /assets/{path}
versions = all
|
| 2638 | 2026-01-27T01:14:02.124Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = POST
path = /device/auth
versions = all
|
| 2639 | 2026-01-27T01:14:02.124Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = POST
path = /device/confirm
versions = all
|
| 2640 | 2026-01-27T01:14:02.124Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = GET
path = /device/success
versions = all
|
| 2641 | 2026-01-27T01:14:02.124Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = POST
path = /device/token
versions = all
|
| 2642 | 2026-01-27T01:14:02.124Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = GET
path = /device/verify
versions = all
|
| 2643 | 2026-01-27T01:14:02.124Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = GET
path = /experimental/v1/probes
versions = all ending with 2026010300.0.0
|
| 2644 | 2026-01-27T01:14:02.124Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = GET
path = /experimental/v1/probes
versions = all starting from 2026010300.0.0
|
| 2645 | 2026-01-27T01:14:02.125Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = POST
path = /experimental/v1/probes
versions = all ending with 2026010500.0.0
|
| 2646 | 2026-01-27T01:14:02.125Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = POST
path = /experimental/v1/probes
versions = all starting from 2026010500.0.0
|
| 2647 | 2026-01-27T01:14:02.125Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = DELETE
path = /experimental/v1/probes/{probe}
versions = all
|
| 2648 | 2026-01-27T01:14:02.125Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = GET
path = /experimental/v1/probes/{probe}
versions = all ending with 2026010300.0.0
|
| 2649 | 2026-01-27T01:14:02.125Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = GET
path = /experimental/v1/probes/{probe}
versions = all starting from 2026010300.0.0
|
| 2650 | 2026-01-27T01:14:02.125Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = GET
path = /experimental/v1/system/support-bundles
versions = all
|
| 2651 | 2026-01-27T01:14:02.125Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = POST
path = /experimental/v1/system/support-bundles
versions = all
|
| 2652 | 2026-01-27T01:14:02.125Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = DELETE
path = /experimental/v1/system/support-bundles/{bundle_id}
versions = all
|
| 2653 | 2026-01-27T01:14:02.125Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = GET
path = /experimental/v1/system/support-bundles/{bundle_id}
versions = all
|
| 2654 | 2026-01-27T01:14:02.125Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = PUT
path = /experimental/v1/system/support-bundles/{bundle_id}
versions = all
|
| 2655 | 2026-01-27T01:14:02.125Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = GET
path = /experimental/v1/system/support-bundles/{bundle_id}/download
versions = all
|
| 2656 | 2026-01-27T01:14:02.125Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = HEAD
path = /experimental/v1/system/support-bundles/{bundle_id}/download
versions = all
|
| 2657 | 2026-01-27T01:14:02.125Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = GET
path = /experimental/v1/system/support-bundles/{bundle_id}/download/{file}
versions = all
|
| 2658 | 2026-01-27T01:14:02.125Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = HEAD
path = /experimental/v1/system/support-bundles/{bundle_id}/download/{file}
versions = all
|
| 2659 | 2026-01-27T01:14:02.125Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = GET
path = /experimental/v1/system/support-bundles/{bundle_id}/index
versions = all
|
| 2660 | 2026-01-27T01:14:02.126Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = GET
path = /images
versions = all
|
| 2661 | 2026-01-27T01:14:02.126Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = GET
path = /login
versions = all
|
| 2662 | 2026-01-27T01:14:02.126Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = GET
path = /login/{silo_name}/local
versions = all
|
| 2663 | 2026-01-27T01:14:02.126Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = GET
path = /login/{silo_name}/saml/{provider_name}
versions = all
|
| 2664 | 2026-01-27T01:14:02.126Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = POST
path = /login/{silo_name}/saml/{provider_name}
versions = all
|
| 2665 | 2026-01-27T01:14:02.126Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = GET
path = /login/{silo_name}/saml/{provider_name}/redirect
versions = all
|
| 2666 | 2026-01-27T01:14:02.126Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = GET
path = /lookup/{path}
versions = all
|
| 2667 | 2026-01-27T01:14:02.126Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = GET
path = /projects/{path}
versions = all
|
| 2668 | 2026-01-27T01:14:02.126Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = GET
path = /projects-new
versions = all
|
| 2669 | 2026-01-27T01:14:02.126Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = GET
path = /scim/v2/Groups
versions = all
|
| 2670 | 2026-01-27T01:14:02.126Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = POST
path = /scim/v2/Groups
versions = all
|
| 2671 | 2026-01-27T01:14:02.126Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = DELETE
path = /scim/v2/Groups/{group_id}
versions = all
|
| 2672 | 2026-01-27T01:14:02.126Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = GET
path = /scim/v2/Groups/{group_id}
versions = all
|
| 2673 | 2026-01-27T01:14:02.126Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = PATCH
path = /scim/v2/Groups/{group_id}
versions = all
|
| 2674 | 2026-01-27T01:14:02.126Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = PUT
path = /scim/v2/Groups/{group_id}
versions = all
|
| 2675 | 2026-01-27T01:14:02.126Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = GET
path = /scim/v2/Users
versions = all
|
| 2676 | 2026-01-27T01:14:02.126Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = POST
path = /scim/v2/Users
versions = all
|
| 2677 | 2026-01-27T01:14:02.126Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = DELETE
path = /scim/v2/Users/{user_id}
versions = all
|
| 2678 | 2026-01-27T01:14:02.126Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = GET
path = /scim/v2/Users/{user_id}
versions = all
|
| 2679 | 2026-01-27T01:14:02.126Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = PATCH
path = /scim/v2/Users/{user_id}
versions = all
|
| 2680 | 2026-01-27T01:14:02.126Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = PUT
path = /scim/v2/Users/{user_id}
versions = all
|
| 2681 | 2026-01-27T01:14:02.126Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = GET
path = /settings/{path}
versions = all
|
| 2682 | 2026-01-27T01:14:02.126Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = GET
path = /system/{path}
versions = all
|
| 2683 | 2026-01-27T01:14:02.127Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = GET
path = /utilization
versions = all
|
| 2684 | 2026-01-27T01:14:02.127Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = GET
path = /v1/affinity-groups
versions = all
|
| 2685 | 2026-01-27T01:14:02.127Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = POST
path = /v1/affinity-groups
versions = all
|
| 2686 | 2026-01-27T01:14:02.127Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = DELETE
path = /v1/affinity-groups/{affinity_group}
versions = all
|
| 2687 | 2026-01-27T01:14:02.127Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = GET
path = /v1/affinity-groups/{affinity_group}
versions = all
|
| 2688 | 2026-01-27T01:14:02.127Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = PUT
path = /v1/affinity-groups/{affinity_group}
versions = all
|
| 2689 | 2026-01-27T01:14:02.127Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = GET
path = /v1/affinity-groups/{affinity_group}/members
versions = all
|
| 2690 | 2026-01-27T01:14:02.127Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = DELETE
path = /v1/affinity-groups/{affinity_group}/members/instance/{instance}
versions = all
|
| 2691 | 2026-01-27T01:14:02.127Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = GET
path = /v1/affinity-groups/{affinity_group}/members/instance/{instance}
versions = all
|
| 2692 | 2026-01-27T01:14:02.127Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = POST
path = /v1/affinity-groups/{affinity_group}/members/instance/{instance}
versions = all
|
| 2693 | 2026-01-27T01:14:02.127Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = GET
path = /v1/alert-classes
versions = all
|
| 2694 | 2026-01-27T01:14:02.127Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = GET
path = /v1/alert-receivers
versions = all
|
| 2695 | 2026-01-27T01:14:02.127Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = DELETE
path = /v1/alert-receivers/{receiver}
versions = all
|
| 2696 | 2026-01-27T01:14:02.127Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = GET
path = /v1/alert-receivers/{receiver}
versions = all
|
| 2697 | 2026-01-27T01:14:02.127Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = GET
path = /v1/alert-receivers/{receiver}/deliveries
versions = all
|
| 2698 | 2026-01-27T01:14:02.127Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = POST
path = /v1/alert-receivers/{receiver}/probe
versions = all
|
| 2699 | 2026-01-27T01:14:02.127Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = POST
path = /v1/alert-receivers/{receiver}/subscriptions
versions = all
|
| 2700 | 2026-01-27T01:14:02.127Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = DELETE
path = /v1/alert-receivers/{receiver}/subscriptions/{subscription}
versions = all
|
| 2701 | 2026-01-27T01:14:02.127Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = POST
path = /v1/alerts/{alert_id}/resend
versions = all
|
| 2702 | 2026-01-27T01:14:02.127Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = GET
path = /v1/anti-affinity-groups
versions = all
|
| 2703 | 2026-01-27T01:14:02.127Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = POST
path = /v1/anti-affinity-groups
versions = all
|
| 2704 | 2026-01-27T01:14:02.127Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = DELETE
path = /v1/anti-affinity-groups/{anti_affinity_group}
versions = all
|
| 2705 | 2026-01-27T01:14:02.128Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = GET
path = /v1/anti-affinity-groups/{anti_affinity_group}
versions = all
|
| 2706 | 2026-01-27T01:14:02.128Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = PUT
path = /v1/anti-affinity-groups/{anti_affinity_group}
versions = all
|
| 2707 | 2026-01-27T01:14:02.128Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = GET
path = /v1/anti-affinity-groups/{anti_affinity_group}/members
versions = all
|
| 2708 | 2026-01-27T01:14:02.128Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = DELETE
path = /v1/anti-affinity-groups/{anti_affinity_group}/members/instance/{instance}
versions = all
|
| 2709 | 2026-01-27T01:14:02.128Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = GET
path = /v1/anti-affinity-groups/{anti_affinity_group}/members/instance/{instance}
versions = all
|
| 2710 | 2026-01-27T01:14:02.128Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = POST
path = /v1/anti-affinity-groups/{anti_affinity_group}/members/instance/{instance}
versions = all
|
| 2711 | 2026-01-27T01:14:02.128Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = GET
path = /v1/auth-settings
versions = all
|
| 2712 | 2026-01-27T01:14:02.128Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = PUT
path = /v1/auth-settings
versions = all
|
| 2713 | 2026-01-27T01:14:02.128Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = GET
path = /v1/certificates
versions = all
|
| 2714 | 2026-01-27T01:14:02.128Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = POST
path = /v1/certificates
versions = all
|
| 2715 | 2026-01-27T01:14:02.128Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = DELETE
path = /v1/certificates/{certificate}
versions = all
|
| 2716 | 2026-01-27T01:14:02.128Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = GET
path = /v1/certificates/{certificate}
versions = all
|
| 2717 | 2026-01-27T01:14:02.128Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = GET
path = /v1/disks
versions = all ending with 2025120300.0.0
|
| 2718 | 2026-01-27T01:14:02.128Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = GET
path = /v1/disks
versions = all starting from 2025120300.0.0
|
| 2719 | 2026-01-27T01:14:02.128Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = POST
path = /v1/disks
versions = all ending with 2025120300.0.0
|
| 2720 | 2026-01-27T01:14:02.128Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = POST
path = /v1/disks
versions = all starting from 2025120300.0.0
|
| 2721 | 2026-01-27T01:14:02.128Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = DELETE
path = /v1/disks/{disk}
versions = all
|
| 2722 | 2026-01-27T01:14:02.128Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = GET
path = /v1/disks/{disk}
versions = all ending with 2025120300.0.0
|
| 2723 | 2026-01-27T01:14:02.128Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = GET
path = /v1/disks/{disk}
versions = all starting from 2025120300.0.0
|
| 2724 | 2026-01-27T01:14:02.128Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = POST
path = /v1/disks/{disk}/bulk-write
versions = all
|
| 2725 | 2026-01-27T01:14:02.128Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = POST
path = /v1/disks/{disk}/bulk-write-start
versions = all
|
| 2726 | 2026-01-27T01:14:02.128Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = POST
path = /v1/disks/{disk}/bulk-write-stop
versions = all
|
| 2727 | 2026-01-27T01:14:02.128Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = POST
path = /v1/disks/{disk}/finalize
versions = all
|
| 2728 | 2026-01-27T01:14:02.128Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = GET
path = /v1/external-subnets
versions = all starting from 2026011601.0.0
|
| 2729 | 2026-01-27T01:14:02.129Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = POST
path = /v1/external-subnets
versions = all starting from 2026012201.0.0
|
| 2730 | 2026-01-27T01:14:02.129Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = POST
path = /v1/external-subnets
versions = from 2026011601.0.0 to 2026012201.0.0
|
| 2731 | 2026-01-27T01:14:02.129Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = DELETE
path = /v1/external-subnets/{external_subnet}
versions = all starting from 2026011601.0.0
|
| 2732 | 2026-01-27T01:14:02.129Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = GET
path = /v1/external-subnets/{external_subnet}
versions = all starting from 2026011601.0.0
|
| 2733 | 2026-01-27T01:14:02.129Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = PUT
path = /v1/external-subnets/{external_subnet}
versions = all starting from 2026011601.0.0
|
| 2734 | 2026-01-27T01:14:02.129Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = POST
path = /v1/external-subnets/{external_subnet}/attach
versions = all starting from 2026011601.0.0
|
| 2735 | 2026-01-27T01:14:02.129Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = POST
path = /v1/external-subnets/{external_subnet}/detach
versions = all starting from 2026011601.0.0
|
| 2736 | 2026-01-27T01:14:02.129Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = GET
path = /v1/floating-ips
versions = all
|
| 2737 | 2026-01-27T01:14:02.129Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = POST
path = /v1/floating-ips
versions = all starting from 2026012200.0.0
|
| 2738 | 2026-01-27T01:14:02.129Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = POST
path = /v1/floating-ips
versions = from 2026011600.0.0 to 2026012200.0.0
|
| 2739 | 2026-01-27T01:14:02.129Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = POST
path = /v1/floating-ips
versions = from 2026010500.0.0 to 2026011600.0.0
|
| 2740 | 2026-01-27T01:14:02.129Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = POST
path = /v1/floating-ips
versions = from 2025122300.0.0 to 2026010500.0.0
|
| 2741 | 2026-01-27T01:14:02.129Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = POST
path = /v1/floating-ips
versions = all ending with 2025122300.0.0
|
| 2742 | 2026-01-27T01:14:02.129Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = DELETE
path = /v1/floating-ips/{floating_ip}
versions = all
|
| 2743 | 2026-01-27T01:14:02.129Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = GET
path = /v1/floating-ips/{floating_ip}
versions = all
|
| 2744 | 2026-01-27T01:14:02.129Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = PUT
path = /v1/floating-ips/{floating_ip}
versions = all
|
| 2745 | 2026-01-27T01:14:02.129Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = POST
path = /v1/floating-ips/{floating_ip}/attach
versions = all
|
| 2746 | 2026-01-27T01:14:02.129Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = POST
path = /v1/floating-ips/{floating_ip}/detach
versions = all
|
| 2747 | 2026-01-27T01:14:02.129Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = GET
path = /v1/groups
versions = all
|
| 2748 | 2026-01-27T01:14:02.129Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = GET
path = /v1/groups/{group_id}
versions = all
|
| 2749 | 2026-01-27T01:14:02.129Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = GET
path = /v1/images
versions = all
|
| 2750 | 2026-01-27T01:14:02.129Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = POST
path = /v1/images
versions = all
|
| 2751 | 2026-01-27T01:14:02.129Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = DELETE
path = /v1/images/{image}
versions = all
|
| 2752 | 2026-01-27T01:14:02.129Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = GET
path = /v1/images/{image}
versions = all
|
| 2753 | 2026-01-27T01:14:02.130Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = POST
path = /v1/images/{image}/demote
versions = all
|
| 2754 | 2026-01-27T01:14:02.130Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = POST
path = /v1/images/{image}/promote
versions = all
|
| 2755 | 2026-01-27T01:14:02.130Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = GET
path = /v1/instances
versions = all
|
| 2756 | 2026-01-27T01:14:02.130Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = POST
path = /v1/instances
versions = all ending with 2025120300.0.0
|
| 2757 | 2026-01-27T01:14:02.130Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = POST
path = /v1/instances
versions = from 2025120300.0.0 to 2025122300.0.0
|
| 2758 | 2026-01-27T01:14:02.130Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = POST
path = /v1/instances
versions = from 2025122300.0.0 to 2026010300.0.0
|
| 2759 | 2026-01-27T01:14:02.130Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = POST
path = /v1/instances
versions = from 2026010300.0.0 to 2026010500.0.0
|
| 2760 | 2026-01-27T01:14:02.130Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = POST
path = /v1/instances
versions = from 2026010500.0.0 to 2026010800.0.0
|
| 2761 | 2026-01-27T01:14:02.130Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = POST
path = /v1/instances
versions = all starting from 2026010800.0.0
|
| 2762 | 2026-01-27T01:14:02.130Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = DELETE
path = /v1/instances/{instance}
versions = all
|
| 2763 | 2026-01-27T01:14:02.130Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = GET
path = /v1/instances/{instance}
versions = all
|
| 2764 | 2026-01-27T01:14:02.130Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = PUT
path = /v1/instances/{instance}
versions = all ending with 2026010800.0.0
|
| 2765 | 2026-01-27T01:14:02.130Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = PUT
path = /v1/instances/{instance}
versions = all starting from 2026010800.0.0
|
| 2766 | 2026-01-27T01:14:02.130Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = GET
path = /v1/instances/{instance}/affinity-groups
versions = all
|
| 2767 | 2026-01-27T01:14:02.130Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = GET
path = /v1/instances/{instance}/anti-affinity-groups
versions = all
|
| 2768 | 2026-01-27T01:14:02.130Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = GET
path = /v1/instances/{instance}/disks
versions = all ending with 2025120300.0.0
|
| 2769 | 2026-01-27T01:14:02.130Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = GET
path = /v1/instances/{instance}/disks
versions = all starting from 2025120300.0.0
|
| 2770 | 2026-01-27T01:14:02.130Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = POST
path = /v1/instances/{instance}/disks/attach
versions = all ending with 2025120300.0.0
|
| 2771 | 2026-01-27T01:14:02.130Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = POST
path = /v1/instances/{instance}/disks/attach
versions = all starting from 2025120300.0.0
|
| 2772 | 2026-01-27T01:14:02.130Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = POST
path = /v1/instances/{instance}/disks/detach
versions = all ending with 2025120300.0.0
|
| 2773 | 2026-01-27T01:14:02.130Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = POST
path = /v1/instances/{instance}/disks/detach
versions = all starting from 2025120300.0.0
|
| 2774 | 2026-01-27T01:14:02.130Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = GET
path = /v1/instances/{instance}/external-ips
versions = all
|
| 2775 | 2026-01-27T01:14:02.130Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = DELETE
path = /v1/instances/{instance}/external-ips/ephemeral
versions = all
|
| 2776 | 2026-01-27T01:14:02.130Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = POST
path = /v1/instances/{instance}/external-ips/ephemeral
versions = all ending with 2025122300.0.0
|
| 2777 | 2026-01-27T01:14:02.130Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = POST
path = /v1/instances/{instance}/external-ips/ephemeral
versions = from 2025122300.0.0 to 2026010500.0.0
|
| 2778 | 2026-01-27T01:14:02.131Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = POST
path = /v1/instances/{instance}/external-ips/ephemeral
versions = all starting from 2026010500.0.0
|
| 2779 | 2026-01-27T01:14:02.131Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = GET
path = /v1/instances/{instance}/multicast-groups
versions = all ending with 2026010800.0.0
|
| 2780 | 2026-01-27T01:14:02.131Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = GET
path = /v1/instances/{instance}/multicast-groups
versions = all starting from 2026010800.0.0
|
| 2781 | 2026-01-27T01:14:02.131Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = DELETE
path = /v1/instances/{instance}/multicast-groups/{multicast_group}
versions = all ending with 2026010800.0.0
|
| 2782 | 2026-01-27T01:14:02.131Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = DELETE
path = /v1/instances/{instance}/multicast-groups/{multicast_group}
versions = all starting from 2026010800.0.0
|
| 2783 | 2026-01-27T01:14:02.131Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = PUT
path = /v1/instances/{instance}/multicast-groups/{multicast_group}
versions = all ending with 2026010800.0.0
|
| 2784 | 2026-01-27T01:14:02.131Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = PUT
path = /v1/instances/{instance}/multicast-groups/{multicast_group}
versions = all starting from 2026010800.0.0
|
| 2785 | 2026-01-27T01:14:02.131Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = POST
path = /v1/instances/{instance}/reboot
versions = all
|
| 2786 | 2026-01-27T01:14:02.131Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = GET
path = /v1/instances/{instance}/serial-console
versions = all
|
| 2787 | 2026-01-27T01:14:02.131Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = GET
path = /v1/instances/{instance}/serial-console/stream
versions = all
|
| 2788 | 2026-01-27T01:14:02.131Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = GET
path = /v1/instances/{instance}/ssh-public-keys
versions = all
|
| 2789 | 2026-01-27T01:14:02.131Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = POST
path = /v1/instances/{instance}/start
versions = all
|
| 2790 | 2026-01-27T01:14:02.131Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = POST
path = /v1/instances/{instance}/stop
versions = all
|
| 2791 | 2026-01-27T01:14:02.131Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = GET
path = /v1/internet-gateway-ip-addresses
versions = all
|
| 2792 | 2026-01-27T01:14:02.131Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = POST
path = /v1/internet-gateway-ip-addresses
versions = all
|
| 2793 | 2026-01-27T01:14:02.131Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = DELETE
path = /v1/internet-gateway-ip-addresses/{address}
versions = all
|
| 2794 | 2026-01-27T01:14:02.131Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = GET
path = /v1/internet-gateway-ip-pools
versions = all
|
| 2795 | 2026-01-27T01:14:02.131Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = POST
path = /v1/internet-gateway-ip-pools
versions = all
|
| 2796 | 2026-01-27T01:14:02.131Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = DELETE
path = /v1/internet-gateway-ip-pools/{pool}
versions = all
|
| 2797 | 2026-01-27T01:14:02.131Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = GET
path = /v1/internet-gateways
versions = all
|
| 2798 | 2026-01-27T01:14:02.131Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = POST
path = /v1/internet-gateways
versions = all
|
| 2799 | 2026-01-27T01:14:02.131Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = DELETE
path = /v1/internet-gateways/{gateway}
versions = all
|
| 2800 | 2026-01-27T01:14:02.132Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = GET
path = /v1/internet-gateways/{gateway}
versions = all
|
| 2801 | 2026-01-27T01:14:02.132Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = GET
path = /v1/ip-pools
versions = all ending with 2026010100.0.0
|
| 2802 | 2026-01-27T01:14:02.132Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = GET
path = /v1/ip-pools
versions = all starting from 2026010100.0.0
|
| 2803 | 2026-01-27T01:14:02.132Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = GET
path = /v1/ip-pools/{pool}
versions = all ending with 2026010100.0.0
|
| 2804 | 2026-01-27T01:14:02.132Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = GET
path = /v1/ip-pools/{pool}
versions = all starting from 2026010100.0.0
|
| 2805 | 2026-01-27T01:14:02.132Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = POST
path = /v1/login/{silo_name}/local
versions = all
|
| 2806 | 2026-01-27T01:14:02.132Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = POST
path = /v1/logout
versions = all
|
| 2807 | 2026-01-27T01:14:02.132Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = GET
path = /v1/me
versions = all
|
| 2808 | 2026-01-27T01:14:02.132Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = GET
path = /v1/me/access-tokens
versions = all
|
| 2809 | 2026-01-27T01:14:02.132Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = DELETE
path = /v1/me/access-tokens/{token_id}
versions = all
|
| 2810 | 2026-01-27T01:14:02.132Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = GET
path = /v1/me/groups
versions = all
|
| 2811 | 2026-01-27T01:14:02.132Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = GET
path = /v1/me/ssh-keys
versions = all
|
| 2812 | 2026-01-27T01:14:02.132Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = POST
path = /v1/me/ssh-keys
versions = all
|
| 2813 | 2026-01-27T01:14:02.132Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = DELETE
path = /v1/me/ssh-keys/{ssh_key}
versions = all
|
| 2814 | 2026-01-27T01:14:02.132Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = GET
path = /v1/me/ssh-keys/{ssh_key}
versions = all
|
| 2815 | 2026-01-27T01:14:02.132Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = GET
path = /v1/metrics/{metric_name}
versions = all
|
| 2816 | 2026-01-27T01:14:02.132Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = GET
path = /v1/multicast-groups
versions = all ending with 2026010800.0.0
|
| 2817 | 2026-01-27T01:14:02.132Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = GET
path = /v1/multicast-groups
versions = all starting from 2026010800.0.0
|
| 2818 | 2026-01-27T01:14:02.132Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = POST
path = /v1/multicast-groups
versions = all ending with 2026010800.0.0
|
| 2819 | 2026-01-27T01:14:02.132Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = DELETE
path = /v1/multicast-groups/{multicast_group}
versions = all ending with 2026010800.0.0
|
| 2820 | 2026-01-27T01:14:02.132Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = GET
path = /v1/multicast-groups/{multicast_group}
versions = all ending with 2026010800.0.0
|
| 2821 | 2026-01-27T01:14:02.132Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = GET
path = /v1/multicast-groups/{multicast_group}
versions = all starting from 2026010800.0.0
|
| 2822 | 2026-01-27T01:14:02.132Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = PUT
path = /v1/multicast-groups/{multicast_group}
versions = all ending with 2026010800.0.0
|
| 2823 | 2026-01-27T01:14:02.132Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = GET
path = /v1/multicast-groups/{multicast_group}/members
versions = all ending with 2026010800.0.0
|
| 2824 | 2026-01-27T01:14:02.133Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = GET
path = /v1/multicast-groups/{multicast_group}/members
versions = all starting from 2026010800.0.0
|
| 2825 | 2026-01-27T01:14:02.133Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = POST
path = /v1/multicast-groups/{multicast_group}/members
versions = all ending with 2026010800.0.0
|
| 2826 | 2026-01-27T01:14:02.133Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = DELETE
path = /v1/multicast-groups/{multicast_group}/members/{instance}
versions = all ending with 2026010800.0.0
|
| 2827 | 2026-01-27T01:14:02.133Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = GET
path = /v1/network-interfaces
versions = all ending with 2026010300.0.0
|
| 2828 | 2026-01-27T01:14:02.133Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = GET
path = /v1/network-interfaces
versions = all starting from 2026010300.0.0
|
| 2829 | 2026-01-27T01:14:02.133Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = POST
path = /v1/network-interfaces
versions = all ending with 2026010300.0.0
|
| 2830 | 2026-01-27T01:14:02.133Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = POST
path = /v1/network-interfaces
versions = all starting from 2026010300.0.0
|
| 2831 | 2026-01-27T01:14:02.133Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = DELETE
path = /v1/network-interfaces/{interface}
versions = all
|
| 2832 | 2026-01-27T01:14:02.133Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = GET
path = /v1/network-interfaces/{interface}
versions = all ending with 2026010300.0.0
|
| 2833 | 2026-01-27T01:14:02.133Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = GET
path = /v1/network-interfaces/{interface}
versions = all starting from 2026010300.0.0
|
| 2834 | 2026-01-27T01:14:02.133Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = PUT
path = /v1/network-interfaces/{interface}
versions = all ending with 2026010300.0.0
|
| 2835 | 2026-01-27T01:14:02.133Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = PUT
path = /v1/network-interfaces/{interface}
versions = all starting from 2026010300.0.0
|
| 2836 | 2026-01-27T01:14:02.133Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = GET
path = /v1/ping
versions = all
|
| 2837 | 2026-01-27T01:14:02.133Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = GET
path = /v1/policy
versions = all
|
| 2838 | 2026-01-27T01:14:02.133Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = PUT
path = /v1/policy
versions = all
|
| 2839 | 2026-01-27T01:14:02.133Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = GET
path = /v1/projects
versions = all
|
| 2840 | 2026-01-27T01:14:02.133Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = POST
path = /v1/projects
versions = all
|
| 2841 | 2026-01-27T01:14:02.133Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = DELETE
path = /v1/projects/{project}
versions = all
|
| 2842 | 2026-01-27T01:14:02.133Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = GET
path = /v1/projects/{project}
versions = all
|
| 2843 | 2026-01-27T01:14:02.133Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = PUT
path = /v1/projects/{project}
versions = all
|
| 2844 | 2026-01-27T01:14:02.133Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = GET
path = /v1/projects/{project}/policy
versions = all
|
| 2845 | 2026-01-27T01:14:02.133Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = PUT
path = /v1/projects/{project}/policy
versions = all
|
| 2846 | 2026-01-27T01:14:02.133Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = GET
path = /v1/snapshots
versions = all
|
| 2847 | 2026-01-27T01:14:02.134Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = POST
path = /v1/snapshots
versions = all
|
| 2848 | 2026-01-27T01:14:02.134Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = DELETE
path = /v1/snapshots/{snapshot}
versions = all
|
| 2849 | 2026-01-27T01:14:02.134Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = GET
path = /v1/snapshots/{snapshot}
versions = all
|
| 2850 | 2026-01-27T01:14:02.134Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = GET
path = /v1/system/audit-log
versions = all
|
| 2851 | 2026-01-27T01:14:02.134Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = GET
path = /v1/system/hardware/disks
versions = all
|
| 2852 | 2026-01-27T01:14:02.134Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = GET
path = /v1/system/hardware/disks/{disk_id}
versions = all
|
| 2853 | 2026-01-27T01:14:02.134Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = GET
path = /v1/system/hardware/rack-switch-port/{rack_id}/{switch_location}/{port}/lldp/neighbors
versions = all
|
| 2854 | 2026-01-27T01:14:02.134Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = GET
path = /v1/system/hardware/racks
versions = all
|
| 2855 | 2026-01-27T01:14:02.134Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = GET
path = /v1/system/hardware/racks/{rack_id}
versions = all
|
| 2856 | 2026-01-27T01:14:02.134Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = GET
path = /v1/system/hardware/racks/{rack_id}/membership
versions = all starting from 2026012100.0.0
|
| 2857 | 2026-01-27T01:14:02.134Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = POST
path = /v1/system/hardware/racks/{rack_id}/membership/add
versions = all starting from 2026012100.0.0
|
| 2858 | 2026-01-27T01:14:02.134Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = GET
path = /v1/system/hardware/sleds
versions = all
|
| 2859 | 2026-01-27T01:14:02.134Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = POST
path = /v1/system/hardware/sleds
versions = all
|
| 2860 | 2026-01-27T01:14:02.134Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = GET
path = /v1/system/hardware/sleds/{sled_id}
versions = all
|
| 2861 | 2026-01-27T01:14:02.134Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = GET
path = /v1/system/hardware/sleds/{sled_id}/disks
versions = all
|
| 2862 | 2026-01-27T01:14:02.134Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = GET
path = /v1/system/hardware/sleds/{sled_id}/instances
versions = all
|
| 2863 | 2026-01-27T01:14:02.134Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = PUT
path = /v1/system/hardware/sleds/{sled_id}/provision-policy
versions = all
|
| 2864 | 2026-01-27T01:14:02.134Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = GET
path = /v1/system/hardware/sleds-uninitialized
versions = all
|
| 2865 | 2026-01-27T01:14:02.134Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = GET
path = /v1/system/hardware/switch-port
versions = all
|
| 2866 | 2026-01-27T01:14:02.134Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = GET
path = /v1/system/hardware/switch-port/{port}/lldp/config
versions = all
|
| 2867 | 2026-01-27T01:14:02.134Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = POST
path = /v1/system/hardware/switch-port/{port}/lldp/config
versions = all
|
| 2868 | 2026-01-27T01:14:02.135Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = DELETE
path = /v1/system/hardware/switch-port/{port}/settings
versions = all
|
| 2869 | 2026-01-27T01:14:02.135Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = POST
path = /v1/system/hardware/switch-port/{port}/settings
versions = all
|
| 2870 | 2026-01-27T01:14:02.135Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = GET
path = /v1/system/hardware/switch-port/{port}/status
versions = all
|
| 2871 | 2026-01-27T01:14:02.135Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = GET
path = /v1/system/hardware/switches
versions = all
|
| 2872 | 2026-01-27T01:14:02.135Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = GET
path = /v1/system/hardware/switches/{switch_id}
versions = all
|
| 2873 | 2026-01-27T01:14:02.135Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = GET
path = /v1/system/identity-providers
versions = all
|
| 2874 | 2026-01-27T01:14:02.135Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = POST
path = /v1/system/identity-providers/local/users
versions = all
|
| 2875 | 2026-01-27T01:14:02.135Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = DELETE
path = /v1/system/identity-providers/local/users/{user_id}
versions = all
|
| 2876 | 2026-01-27T01:14:02.135Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = POST
path = /v1/system/identity-providers/local/users/{user_id}/set-password
versions = all
|
| 2877 | 2026-01-27T01:14:02.135Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = POST
path = /v1/system/identity-providers/saml
versions = all
|
| 2878 | 2026-01-27T01:14:02.135Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = GET
path = /v1/system/identity-providers/saml/{provider}
versions = all
|
| 2879 | 2026-01-27T01:14:02.135Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = GET
path = /v1/system/ip-pools
versions = all
|
| 2880 | 2026-01-27T01:14:02.135Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = POST
path = /v1/system/ip-pools
versions = all
|
| 2881 | 2026-01-27T01:14:02.135Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = DELETE
path = /v1/system/ip-pools/{pool}
versions = all
|
| 2882 | 2026-01-27T01:14:02.135Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = GET
path = /v1/system/ip-pools/{pool}
versions = all
|
| 2883 | 2026-01-27T01:14:02.135Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = PUT
path = /v1/system/ip-pools/{pool}
versions = all
|
| 2884 | 2026-01-27T01:14:02.135Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = GET
path = /v1/system/ip-pools/{pool}/ranges
versions = all
|
| 2885 | 2026-01-27T01:14:02.135Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = POST
path = /v1/system/ip-pools/{pool}/ranges/add
versions = all
|
| 2886 | 2026-01-27T01:14:02.135Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = POST
path = /v1/system/ip-pools/{pool}/ranges/remove
versions = all
|
| 2887 | 2026-01-27T01:14:02.135Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = GET
path = /v1/system/ip-pools/{pool}/silos
versions = all
|
| 2888 | 2026-01-27T01:14:02.135Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = POST
path = /v1/system/ip-pools/{pool}/silos
versions = all
|
| 2889 | 2026-01-27T01:14:02.135Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = DELETE
path = /v1/system/ip-pools/{pool}/silos/{silo}
versions = all
|
| 2890 | 2026-01-27T01:14:02.135Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = PUT
path = /v1/system/ip-pools/{pool}/silos/{silo}
versions = all
|
| 2891 | 2026-01-27T01:14:02.135Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = GET
path = /v1/system/ip-pools/{pool}/utilization
versions = all
|
| 2892 | 2026-01-27T01:14:02.136Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = GET
path = /v1/system/ip-pools-service
versions = all
|
| 2893 | 2026-01-27T01:14:02.136Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = GET
path = /v1/system/ip-pools-service/ranges
versions = all
|
| 2894 | 2026-01-27T01:14:02.136Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = POST
path = /v1/system/ip-pools-service/ranges/add
versions = all
|
| 2895 | 2026-01-27T01:14:02.136Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = POST
path = /v1/system/ip-pools-service/ranges/remove
versions = all
|
| 2896 | 2026-01-27T01:14:02.136Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = GET
path = /v1/system/metrics/{metric_name}
versions = all
|
| 2897 | 2026-01-27T01:14:02.136Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = GET
path = /v1/system/multicast-groups/by-ip/{address}
versions = all ending with 2026010800.0.0
|
| 2898 | 2026-01-27T01:14:02.136Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = GET
path = /v1/system/networking/address-lot
versions = all
|
| 2899 | 2026-01-27T01:14:02.136Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = POST
path = /v1/system/networking/address-lot
versions = all
|
| 2900 | 2026-01-27T01:14:02.136Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = DELETE
path = /v1/system/networking/address-lot/{address_lot}
versions = all
|
| 2901 | 2026-01-27T01:14:02.136Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = GET
path = /v1/system/networking/address-lot/{address_lot}
versions = all
|
| 2902 | 2026-01-27T01:14:02.136Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = GET
path = /v1/system/networking/address-lot/{address_lot}/blocks
versions = all
|
| 2903 | 2026-01-27T01:14:02.136Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = GET
path = /v1/system/networking/allow-list
versions = all
|
| 2904 | 2026-01-27T01:14:02.136Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = PUT
path = /v1/system/networking/allow-list
versions = all
|
| 2905 | 2026-01-27T01:14:02.136Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = POST
path = /v1/system/networking/bfd-disable
versions = all
|
| 2906 | 2026-01-27T01:14:02.136Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = POST
path = /v1/system/networking/bfd-enable
versions = all
|
| 2907 | 2026-01-27T01:14:02.136Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = GET
path = /v1/system/networking/bfd-status
versions = all
|
| 2908 | 2026-01-27T01:14:02.136Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = DELETE
path = /v1/system/networking/bgp
versions = all
|
| 2909 | 2026-01-27T01:14:02.136Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = GET
path = /v1/system/networking/bgp
versions = all
|
| 2910 | 2026-01-27T01:14:02.136Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = POST
path = /v1/system/networking/bgp
versions = all
|
| 2911 | 2026-01-27T01:14:02.136Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = GET
path = /v1/system/networking/bgp-announce-set
versions = all
|
| 2912 | 2026-01-27T01:14:02.136Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = PUT
path = /v1/system/networking/bgp-announce-set
versions = all
|
| 2913 | 2026-01-27T01:14:02.136Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = DELETE
path = /v1/system/networking/bgp-announce-set/{announce_set}
versions = all
|
| 2914 | 2026-01-27T01:14:02.136Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = GET
path = /v1/system/networking/bgp-announce-set/{announce_set}/announcement
versions = all
|
| 2915 | 2026-01-27T01:14:02.136Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = GET
path = /v1/system/networking/bgp-exported
versions = all
|
| 2916 | 2026-01-27T01:14:02.136Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = GET
path = /v1/system/networking/bgp-message-history
versions = all
|
| 2917 | 2026-01-27T01:14:02.137Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = GET
path = /v1/system/networking/bgp-routes-ipv4
versions = all
|
| 2918 | 2026-01-27T01:14:02.137Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = GET
path = /v1/system/networking/bgp-status
versions = all ending with 2025121200.0.0
|
| 2919 | 2026-01-27T01:14:02.137Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = GET
path = /v1/system/networking/bgp-status
versions = all starting from 2025121200.0.0
|
| 2920 | 2026-01-27T01:14:02.137Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = GET
path = /v1/system/networking/inbound-icmp
versions = all
|
| 2921 | 2026-01-27T01:14:02.137Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = PUT
path = /v1/system/networking/inbound-icmp
versions = all
|
| 2922 | 2026-01-27T01:14:02.137Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = GET
path = /v1/system/networking/loopback-address
versions = all
|
| 2923 | 2026-01-27T01:14:02.137Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = POST
path = /v1/system/networking/loopback-address
versions = all
|
| 2924 | 2026-01-27T01:14:02.137Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = DELETE
path = /v1/system/networking/loopback-address/{rack_id}/{switch_location}/{address}/{subnet_mask}
versions = all
|
| 2925 | 2026-01-27T01:14:02.137Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = DELETE
path = /v1/system/networking/switch-port-settings
versions = all
|
| 2926 | 2026-01-27T01:14:02.137Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = GET
path = /v1/system/networking/switch-port-settings
versions = all
|
| 2927 | 2026-01-27T01:14:02.137Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = POST
path = /v1/system/networking/switch-port-settings
versions = all
|
| 2928 | 2026-01-27T01:14:02.137Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = GET
path = /v1/system/networking/switch-port-settings/{port}
versions = all
|
| 2929 | 2026-01-27T01:14:02.137Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = GET
path = /v1/system/policy
versions = all
|
| 2930 | 2026-01-27T01:14:02.137Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = PUT
path = /v1/system/policy
versions = all
|
| 2931 | 2026-01-27T01:14:02.137Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = GET
path = /v1/system/scim/tokens
versions = all
|
| 2932 | 2026-01-27T01:14:02.137Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = POST
path = /v1/system/scim/tokens
versions = all
|
| 2933 | 2026-01-27T01:14:02.137Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = DELETE
path = /v1/system/scim/tokens/{token_id}
versions = all
|
| 2934 | 2026-01-27T01:14:02.137Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = GET
path = /v1/system/scim/tokens/{token_id}
versions = all
|
| 2935 | 2026-01-27T01:14:02.137Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = GET
path = /v1/system/silo-quotas
versions = all
|
| 2936 | 2026-01-27T01:14:02.137Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = GET
path = /v1/system/silos
versions = all
|
| 2937 | 2026-01-27T01:14:02.137Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = POST
path = /v1/system/silos
versions = all
|
| 2938 | 2026-01-27T01:14:02.137Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = DELETE
path = /v1/system/silos/{silo}
versions = all
|
| 2939 | 2026-01-27T01:14:02.137Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = GET
path = /v1/system/silos/{silo}
versions = all
|
| 2940 | 2026-01-27T01:14:02.137Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = GET
path = /v1/system/silos/{silo}/ip-pools
versions = all ending with 2026010100.0.0
|
| 2941 | 2026-01-27T01:14:02.137Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = GET
path = /v1/system/silos/{silo}/ip-pools
versions = all starting from 2026010100.0.0
|
| 2942 | 2026-01-27T01:14:02.137Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = GET
path = /v1/system/silos/{silo}/policy
versions = all
|
| 2943 | 2026-01-27T01:14:02.137Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = PUT
path = /v1/system/silos/{silo}/policy
versions = all
|
| 2944 | 2026-01-27T01:14:02.138Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = GET
path = /v1/system/silos/{silo}/quotas
versions = all
|
| 2945 | 2026-01-27T01:14:02.138Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = PUT
path = /v1/system/silos/{silo}/quotas
versions = all
|
| 2946 | 2026-01-27T01:14:02.138Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = GET
path = /v1/system/subnet-pools
versions = all starting from 2026011601.0.0
|
| 2947 | 2026-01-27T01:14:02.138Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = POST
path = /v1/system/subnet-pools
versions = all starting from 2026012201.0.0
|
| 2948 | 2026-01-27T01:14:02.138Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = POST
path = /v1/system/subnet-pools
versions = from 2026011601.0.0 to 2026012201.0.0
|
| 2949 | 2026-01-27T01:14:02.138Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = DELETE
path = /v1/system/subnet-pools/{pool}
versions = all starting from 2026011601.0.0
|
| 2950 | 2026-01-27T01:14:02.138Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = GET
path = /v1/system/subnet-pools/{pool}
versions = all starting from 2026011601.0.0
|
| 2951 | 2026-01-27T01:14:02.138Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = PUT
path = /v1/system/subnet-pools/{pool}
versions = all starting from 2026011601.0.0
|
| 2952 | 2026-01-27T01:14:02.138Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = GET
path = /v1/system/subnet-pools/{pool}/members
versions = all starting from 2026011601.0.0
|
| 2953 | 2026-01-27T01:14:02.138Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = POST
path = /v1/system/subnet-pools/{pool}/members/add
versions = all starting from 2026012201.0.0
|
| 2954 | 2026-01-27T01:14:02.138Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = POST
path = /v1/system/subnet-pools/{pool}/members/add
versions = from 2026011601.0.0 to 2026012201.0.0
|
| 2955 | 2026-01-27T01:14:02.138Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = POST
path = /v1/system/subnet-pools/{pool}/members/remove
versions = all starting from 2026011601.0.0
|
| 2956 | 2026-01-27T01:14:02.138Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = GET
path = /v1/system/subnet-pools/{pool}/silos
versions = all starting from 2026011601.0.0
|
| 2957 | 2026-01-27T01:14:02.138Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = POST
path = /v1/system/subnet-pools/{pool}/silos
versions = all starting from 2026011601.0.0
|
| 2958 | 2026-01-27T01:14:02.138Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = DELETE
path = /v1/system/subnet-pools/{pool}/silos/{silo}
versions = all starting from 2026011601.0.0
|
| 2959 | 2026-01-27T01:14:02.138Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = PUT
path = /v1/system/subnet-pools/{pool}/silos/{silo}
versions = all starting from 2026011601.0.0
|
| 2960 | 2026-01-27T01:14:02.138Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = GET
path = /v1/system/subnet-pools/{pool}/utilization
versions = all starting from 2026011601.0.0
|
| 2961 | 2026-01-27T01:14:02.138Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = POST
path = /v1/system/timeseries/query
versions = all
|
| 2962 | 2026-01-27T01:14:02.138Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = GET
path = /v1/system/timeseries/schemas
versions = all
|
| 2963 | 2026-01-27T01:14:02.138Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = GET
path = /v1/system/update/repositories
versions = all
|
| 2964 | 2026-01-27T01:14:02.138Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = PUT
path = /v1/system/update/repositories
versions = all
|
| 2965 | 2026-01-27T01:14:02.138Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = GET
path = /v1/system/update/repositories/{system_version}
versions = all
|
| 2966 | 2026-01-27T01:14:02.138Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = GET
path = /v1/system/update/status
versions = all
|
| 2967 | 2026-01-27T01:14:02.138Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = PUT
path = /v1/system/update/target-release
versions = all
|
| 2968 | 2026-01-27T01:14:02.138Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = GET
path = /v1/system/update/trust-roots
versions = all
|
| 2969 | 2026-01-27T01:14:02.138Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = POST
path = /v1/system/update/trust-roots
versions = all
|
| 2970 | 2026-01-27T01:14:02.139Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = DELETE
path = /v1/system/update/trust-roots/{trust_root_id}
versions = all
|
| 2971 | 2026-01-27T01:14:02.139Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = GET
path = /v1/system/update/trust-roots/{trust_root_id}
versions = all
|
| 2972 | 2026-01-27T01:14:02.139Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = GET
path = /v1/system/users
versions = all
|
| 2973 | 2026-01-27T01:14:02.139Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = GET
path = /v1/system/users/{user_id}
versions = all
|
| 2974 | 2026-01-27T01:14:02.139Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = GET
path = /v1/system/users-builtin
versions = all
|
| 2975 | 2026-01-27T01:14:02.139Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = GET
path = /v1/system/users-builtin/{user}
versions = all
|
| 2976 | 2026-01-27T01:14:02.139Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = GET
path = /v1/system/utilization/silos
versions = all
|
| 2977 | 2026-01-27T01:14:02.139Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = GET
path = /v1/system/utilization/silos/{silo}
versions = all
|
| 2978 | 2026-01-27T01:14:02.139Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = POST
path = /v1/timeseries/query
versions = all
|
| 2979 | 2026-01-27T01:14:02.139Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = GET
path = /v1/users
versions = all
|
| 2980 | 2026-01-27T01:14:02.139Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = GET
path = /v1/users/{user_id}
versions = all
|
| 2981 | 2026-01-27T01:14:02.139Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = GET
path = /v1/users/{user_id}/access-tokens
versions = all
|
| 2982 | 2026-01-27T01:14:02.139Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = POST
path = /v1/users/{user_id}/logout
versions = all
|
| 2983 | 2026-01-27T01:14:02.139Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = GET
path = /v1/users/{user_id}/sessions
versions = all
|
| 2984 | 2026-01-27T01:14:02.139Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = GET
path = /v1/utilization
versions = all
|
| 2985 | 2026-01-27T01:14:02.139Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = GET
path = /v1/vpc-firewall-rules
versions = all
|
| 2986 | 2026-01-27T01:14:02.139Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = PUT
path = /v1/vpc-firewall-rules
versions = all
|
| 2987 | 2026-01-27T01:14:02.139Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = GET
path = /v1/vpc-router-routes
versions = all
|
| 2988 | 2026-01-27T01:14:02.139Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = POST
path = /v1/vpc-router-routes
versions = all
|
| 2989 | 2026-01-27T01:14:02.139Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = DELETE
path = /v1/vpc-router-routes/{route}
versions = all
|
| 2990 | 2026-01-27T01:14:02.139Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = GET
path = /v1/vpc-router-routes/{route}
versions = all
|
| 2991 | 2026-01-27T01:14:02.139Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = PUT
path = /v1/vpc-router-routes/{route}
versions = all
|
| 2992 | 2026-01-27T01:14:02.139Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = GET
path = /v1/vpc-routers
versions = all
|
| 2993 | 2026-01-27T01:14:02.139Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = POST
path = /v1/vpc-routers
versions = all
|
| 2994 | 2026-01-27T01:14:02.139Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = DELETE
path = /v1/vpc-routers/{router}
versions = all
|
| 2995 | 2026-01-27T01:14:02.139Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = GET
path = /v1/vpc-routers/{router}
versions = all
|
| 2996 | 2026-01-27T01:14:02.139Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = PUT
path = /v1/vpc-routers/{router}
versions = all
|
| 2997 | 2026-01-27T01:14:02.139Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = GET
path = /v1/vpc-subnets
versions = all
|
| 2998 | 2026-01-27T01:14:02.140Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = POST
path = /v1/vpc-subnets
versions = all
|
| 2999 | 2026-01-27T01:14:02.140Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = DELETE
path = /v1/vpc-subnets/{subnet}
versions = all
|
| 3000 | 2026-01-27T01:14:02.140Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = GET
path = /v1/vpc-subnets/{subnet}
versions = all
|
| 3001 | 2026-01-27T01:14:02.140Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = PUT
path = /v1/vpc-subnets/{subnet}
versions = all
|
| 3002 | 2026-01-27T01:14:02.140Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = GET
path = /v1/vpc-subnets/{subnet}/network-interfaces
versions = all ending with 2026010300.0.0
|
| 3003 | 2026-01-27T01:14:02.140Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = GET
path = /v1/vpc-subnets/{subnet}/network-interfaces
versions = all starting from 2026010300.0.0
|
| 3004 | 2026-01-27T01:14:02.140Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = GET
path = /v1/vpcs
versions = all
|
| 3005 | 2026-01-27T01:14:02.140Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = POST
path = /v1/vpcs
versions = all
|
| 3006 | 2026-01-27T01:14:02.140Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = DELETE
path = /v1/vpcs/{vpc}
versions = all
|
| 3007 | 2026-01-27T01:14:02.140Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = GET
path = /v1/vpcs/{vpc}
versions = all
|
| 3008 | 2026-01-27T01:14:02.140Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = PUT
path = /v1/vpcs/{vpc}
versions = all
|
| 3009 | 2026-01-27T01:14:02.140Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = POST
path = /v1/webhook-receivers
versions = all
|
| 3010 | 2026-01-27T01:14:02.140Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = PUT
path = /v1/webhook-receivers/{receiver}
versions = all
|
| 3011 | 2026-01-27T01:14:02.140Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = GET
path = /v1/webhook-secrets
versions = all
|
| 3012 | 2026-01-27T01:14:02.140Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = POST
path = /v1/webhook-secrets
versions = all
|
| 3013 | 2026-01-27T01:14:02.140Z | DEBG | test_vpcs (dropshot_external): registered endpoint
local_addr = 127.0.0.1:50372
method = DELETE
path = /v1/webhook-secrets/{secret_id}
versions = all
|
| 3014 | 2026-01-27T01:14:02.140Z | INFO | test_vpcs (dropshot_external): listening
local_addr = 127.0.0.1:50372
|
| 3015 | 2026-01-27T01:14:02.140Z | DEBG | test_vpcs (dropshot_external): successfully registered DTrace USDT probes
local_addr = 127.0.0.1:50372
|
| 3016 | 2026-01-27T01:14:02.331Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = GET
path = /
versions = all
|
| 3017 | 2026-01-27T01:14:02.331Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = GET
path = /access
versions = all
|
| 3018 | 2026-01-27T01:14:02.332Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = GET
path = /assets/{path}
versions = all
|
| 3019 | 2026-01-27T01:14:02.332Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = POST
path = /device/auth
versions = all
|
| 3020 | 2026-01-27T01:14:02.332Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = POST
path = /device/confirm
versions = all
|
| 3021 | 2026-01-27T01:14:02.332Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = GET
path = /device/success
versions = all
|
| 3022 | 2026-01-27T01:14:02.332Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = POST
path = /device/token
versions = all
|
| 3023 | 2026-01-27T01:14:02.332Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = GET
path = /device/verify
versions = all
|
| 3024 | 2026-01-27T01:14:02.332Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = GET
path = /experimental/v1/probes
versions = all ending with 2026010300.0.0
|
| 3025 | 2026-01-27T01:14:02.332Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = GET
path = /experimental/v1/probes
versions = all starting from 2026010300.0.0
|
| 3026 | 2026-01-27T01:14:02.332Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = POST
path = /experimental/v1/probes
versions = all ending with 2026010500.0.0
|
| 3027 | 2026-01-27T01:14:02.332Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = POST
path = /experimental/v1/probes
versions = all starting from 2026010500.0.0
|
| 3028 | 2026-01-27T01:14:02.332Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = DELETE
path = /experimental/v1/probes/{probe}
versions = all
|
| 3029 | 2026-01-27T01:14:02.332Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = GET
path = /experimental/v1/probes/{probe}
versions = all ending with 2026010300.0.0
|
| 3030 | 2026-01-27T01:14:02.332Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = GET
path = /experimental/v1/probes/{probe}
versions = all starting from 2026010300.0.0
|
| 3031 | 2026-01-27T01:14:02.332Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = GET
path = /experimental/v1/system/support-bundles
versions = all
|
| 3032 | 2026-01-27T01:14:02.332Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = POST
path = /experimental/v1/system/support-bundles
versions = all
|
| 3033 | 2026-01-27T01:14:02.332Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = DELETE
path = /experimental/v1/system/support-bundles/{bundle_id}
versions = all
|
| 3034 | 2026-01-27T01:14:02.332Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = GET
path = /experimental/v1/system/support-bundles/{bundle_id}
versions = all
|
| 3035 | 2026-01-27T01:14:02.332Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = PUT
path = /experimental/v1/system/support-bundles/{bundle_id}
versions = all
|
| 3036 | 2026-01-27T01:14:02.332Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = GET
path = /experimental/v1/system/support-bundles/{bundle_id}/download
versions = all
|
| 3037 | 2026-01-27T01:14:02.332Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = HEAD
path = /experimental/v1/system/support-bundles/{bundle_id}/download
versions = all
|
| 3038 | 2026-01-27T01:14:02.332Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = GET
path = /experimental/v1/system/support-bundles/{bundle_id}/download/{file}
versions = all
|
| 3039 | 2026-01-27T01:14:02.332Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = HEAD
path = /experimental/v1/system/support-bundles/{bundle_id}/download/{file}
versions = all
|
| 3040 | 2026-01-27T01:14:02.333Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = GET
path = /experimental/v1/system/support-bundles/{bundle_id}/index
versions = all
|
| 3041 | 2026-01-27T01:14:02.333Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = GET
path = /images
versions = all
|
| 3042 | 2026-01-27T01:14:02.333Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = GET
path = /login
versions = all
|
| 3043 | 2026-01-27T01:14:02.333Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = GET
path = /login/{silo_name}/local
versions = all
|
| 3044 | 2026-01-27T01:14:02.333Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = GET
path = /login/{silo_name}/saml/{provider_name}
versions = all
|
| 3045 | 2026-01-27T01:14:02.333Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = POST
path = /login/{silo_name}/saml/{provider_name}
versions = all
|
| 3046 | 2026-01-27T01:14:02.333Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = GET
path = /login/{silo_name}/saml/{provider_name}/redirect
versions = all
|
| 3047 | 2026-01-27T01:14:02.333Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = GET
path = /lookup/{path}
versions = all
|
| 3048 | 2026-01-27T01:14:02.333Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = GET
path = /projects/{path}
versions = all
|
| 3049 | 2026-01-27T01:14:02.333Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = GET
path = /projects-new
versions = all
|
| 3050 | 2026-01-27T01:14:02.333Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = GET
path = /scim/v2/Groups
versions = all
|
| 3051 | 2026-01-27T01:14:02.333Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = POST
path = /scim/v2/Groups
versions = all
|
| 3052 | 2026-01-27T01:14:02.333Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = DELETE
path = /scim/v2/Groups/{group_id}
versions = all
|
| 3053 | 2026-01-27T01:14:02.333Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = GET
path = /scim/v2/Groups/{group_id}
versions = all
|
| 3054 | 2026-01-27T01:14:02.333Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = PATCH
path = /scim/v2/Groups/{group_id}
versions = all
|
| 3055 | 2026-01-27T01:14:02.333Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = PUT
path = /scim/v2/Groups/{group_id}
versions = all
|
| 3056 | 2026-01-27T01:14:02.333Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = GET
path = /scim/v2/Users
versions = all
|
| 3057 | 2026-01-27T01:14:02.333Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = POST
path = /scim/v2/Users
versions = all
|
| 3058 | 2026-01-27T01:14:02.333Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = DELETE
path = /scim/v2/Users/{user_id}
versions = all
|
| 3059 | 2026-01-27T01:14:02.333Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = GET
path = /scim/v2/Users/{user_id}
versions = all
|
| 3060 | 2026-01-27T01:14:02.333Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = PATCH
path = /scim/v2/Users/{user_id}
versions = all
|
| 3061 | 2026-01-27T01:14:02.333Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = PUT
path = /scim/v2/Users/{user_id}
versions = all
|
| 3062 | 2026-01-27T01:14:02.333Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = GET
path = /settings/{path}
versions = all
|
| 3063 | 2026-01-27T01:14:02.334Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = GET
path = /system/{path}
versions = all
|
| 3064 | 2026-01-27T01:14:02.334Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = GET
path = /utilization
versions = all
|
| 3065 | 2026-01-27T01:14:02.334Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = GET
path = /v1/affinity-groups
versions = all
|
| 3066 | 2026-01-27T01:14:02.334Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = POST
path = /v1/affinity-groups
versions = all
|
| 3067 | 2026-01-27T01:14:02.334Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = DELETE
path = /v1/affinity-groups/{affinity_group}
versions = all
|
| 3068 | 2026-01-27T01:14:02.334Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = GET
path = /v1/affinity-groups/{affinity_group}
versions = all
|
| 3069 | 2026-01-27T01:14:02.334Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = PUT
path = /v1/affinity-groups/{affinity_group}
versions = all
|
| 3070 | 2026-01-27T01:14:02.334Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = GET
path = /v1/affinity-groups/{affinity_group}/members
versions = all
|
| 3071 | 2026-01-27T01:14:02.334Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = DELETE
path = /v1/affinity-groups/{affinity_group}/members/instance/{instance}
versions = all
|
| 3072 | 2026-01-27T01:14:02.334Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = GET
path = /v1/affinity-groups/{affinity_group}/members/instance/{instance}
versions = all
|
| 3073 | 2026-01-27T01:14:02.334Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = POST
path = /v1/affinity-groups/{affinity_group}/members/instance/{instance}
versions = all
|
| 3074 | 2026-01-27T01:14:02.334Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = GET
path = /v1/alert-classes
versions = all
|
| 3075 | 2026-01-27T01:14:02.334Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = GET
path = /v1/alert-receivers
versions = all
|
| 3076 | 2026-01-27T01:14:02.334Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = DELETE
path = /v1/alert-receivers/{receiver}
versions = all
|
| 3077 | 2026-01-27T01:14:02.334Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = GET
path = /v1/alert-receivers/{receiver}
versions = all
|
| 3078 | 2026-01-27T01:14:02.334Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = GET
path = /v1/alert-receivers/{receiver}/deliveries
versions = all
|
| 3079 | 2026-01-27T01:14:02.334Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = POST
path = /v1/alert-receivers/{receiver}/probe
versions = all
|
| 3080 | 2026-01-27T01:14:02.334Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = POST
path = /v1/alert-receivers/{receiver}/subscriptions
versions = all
|
| 3081 | 2026-01-27T01:14:02.334Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = DELETE
path = /v1/alert-receivers/{receiver}/subscriptions/{subscription}
versions = all
|
| 3082 | 2026-01-27T01:14:02.334Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = POST
path = /v1/alerts/{alert_id}/resend
versions = all
|
| 3083 | 2026-01-27T01:14:02.334Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = GET
path = /v1/anti-affinity-groups
versions = all
|
| 3084 | 2026-01-27T01:14:02.334Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = POST
path = /v1/anti-affinity-groups
versions = all
|
| 3085 | 2026-01-27T01:14:02.335Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = DELETE
path = /v1/anti-affinity-groups/{anti_affinity_group}
versions = all
|
| 3086 | 2026-01-27T01:14:02.335Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = GET
path = /v1/anti-affinity-groups/{anti_affinity_group}
versions = all
|
| 3087 | 2026-01-27T01:14:02.335Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = PUT
path = /v1/anti-affinity-groups/{anti_affinity_group}
versions = all
|
| 3088 | 2026-01-27T01:14:02.335Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = GET
path = /v1/anti-affinity-groups/{anti_affinity_group}/members
versions = all
|
| 3089 | 2026-01-27T01:14:02.335Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = DELETE
path = /v1/anti-affinity-groups/{anti_affinity_group}/members/instance/{instance}
versions = all
|
| 3090 | 2026-01-27T01:14:02.335Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = GET
path = /v1/anti-affinity-groups/{anti_affinity_group}/members/instance/{instance}
versions = all
|
| 3091 | 2026-01-27T01:14:02.335Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = POST
path = /v1/anti-affinity-groups/{anti_affinity_group}/members/instance/{instance}
versions = all
|
| 3092 | 2026-01-27T01:14:02.335Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = GET
path = /v1/auth-settings
versions = all
|
| 3093 | 2026-01-27T01:14:02.335Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = PUT
path = /v1/auth-settings
versions = all
|
| 3094 | 2026-01-27T01:14:02.335Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = GET
path = /v1/certificates
versions = all
|
| 3095 | 2026-01-27T01:14:02.335Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = POST
path = /v1/certificates
versions = all
|
| 3096 | 2026-01-27T01:14:02.335Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = DELETE
path = /v1/certificates/{certificate}
versions = all
|
| 3097 | 2026-01-27T01:14:02.335Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = GET
path = /v1/certificates/{certificate}
versions = all
|
| 3098 | 2026-01-27T01:14:02.335Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = GET
path = /v1/disks
versions = all ending with 2025120300.0.0
|
| 3099 | 2026-01-27T01:14:02.335Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = GET
path = /v1/disks
versions = all starting from 2025120300.0.0
|
| 3100 | 2026-01-27T01:14:02.335Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = POST
path = /v1/disks
versions = all ending with 2025120300.0.0
|
| 3101 | 2026-01-27T01:14:02.335Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = POST
path = /v1/disks
versions = all starting from 2025120300.0.0
|
| 3102 | 2026-01-27T01:14:02.335Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = DELETE
path = /v1/disks/{disk}
versions = all
|
| 3103 | 2026-01-27T01:14:02.335Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = GET
path = /v1/disks/{disk}
versions = all ending with 2025120300.0.0
|
| 3104 | 2026-01-27T01:14:02.335Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = GET
path = /v1/disks/{disk}
versions = all starting from 2025120300.0.0
|
| 3105 | 2026-01-27T01:14:02.335Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = POST
path = /v1/disks/{disk}/bulk-write
versions = all
|
| 3106 | 2026-01-27T01:14:02.335Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = POST
path = /v1/disks/{disk}/bulk-write-start
versions = all
|
| 3107 | 2026-01-27T01:14:02.335Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = POST
path = /v1/disks/{disk}/bulk-write-stop
versions = all
|
| 3108 | 2026-01-27T01:14:02.335Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = POST
path = /v1/disks/{disk}/finalize
versions = all
|
| 3109 | 2026-01-27T01:14:02.335Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = GET
path = /v1/external-subnets
versions = all starting from 2026011601.0.0
|
| 3110 | 2026-01-27T01:14:02.335Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = POST
path = /v1/external-subnets
versions = all starting from 2026012201.0.0
|
| 3111 | 2026-01-27T01:14:02.336Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = POST
path = /v1/external-subnets
versions = from 2026011601.0.0 to 2026012201.0.0
|
| 3112 | 2026-01-27T01:14:02.336Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = DELETE
path = /v1/external-subnets/{external_subnet}
versions = all starting from 2026011601.0.0
|
| 3113 | 2026-01-27T01:14:02.336Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = GET
path = /v1/external-subnets/{external_subnet}
versions = all starting from 2026011601.0.0
|
| 3114 | 2026-01-27T01:14:02.336Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = PUT
path = /v1/external-subnets/{external_subnet}
versions = all starting from 2026011601.0.0
|
| 3115 | 2026-01-27T01:14:02.336Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = POST
path = /v1/external-subnets/{external_subnet}/attach
versions = all starting from 2026011601.0.0
|
| 3116 | 2026-01-27T01:14:02.336Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = POST
path = /v1/external-subnets/{external_subnet}/detach
versions = all starting from 2026011601.0.0
|
| 3117 | 2026-01-27T01:14:02.336Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = GET
path = /v1/floating-ips
versions = all
|
| 3118 | 2026-01-27T01:14:02.336Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = POST
path = /v1/floating-ips
versions = all starting from 2026012200.0.0
|
| 3119 | 2026-01-27T01:14:02.336Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = POST
path = /v1/floating-ips
versions = from 2026011600.0.0 to 2026012200.0.0
|
| 3120 | 2026-01-27T01:14:02.336Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = POST
path = /v1/floating-ips
versions = from 2026010500.0.0 to 2026011600.0.0
|
| 3121 | 2026-01-27T01:14:02.336Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = POST
path = /v1/floating-ips
versions = from 2025122300.0.0 to 2026010500.0.0
|
| 3122 | 2026-01-27T01:14:02.336Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = POST
path = /v1/floating-ips
versions = all ending with 2025122300.0.0
|
| 3123 | 2026-01-27T01:14:02.336Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = DELETE
path = /v1/floating-ips/{floating_ip}
versions = all
|
| 3124 | 2026-01-27T01:14:02.336Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = GET
path = /v1/floating-ips/{floating_ip}
versions = all
|
| 3125 | 2026-01-27T01:14:02.336Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = PUT
path = /v1/floating-ips/{floating_ip}
versions = all
|
| 3126 | 2026-01-27T01:14:02.336Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = POST
path = /v1/floating-ips/{floating_ip}/attach
versions = all
|
| 3127 | 2026-01-27T01:14:02.336Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = POST
path = /v1/floating-ips/{floating_ip}/detach
versions = all
|
| 3128 | 2026-01-27T01:14:02.336Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = GET
path = /v1/groups
versions = all
|
| 3129 | 2026-01-27T01:14:02.336Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = GET
path = /v1/groups/{group_id}
versions = all
|
| 3130 | 2026-01-27T01:14:02.336Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = GET
path = /v1/images
versions = all
|
| 3131 | 2026-01-27T01:14:02.336Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = POST
path = /v1/images
versions = all
|
| 3132 | 2026-01-27T01:14:02.336Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = DELETE
path = /v1/images/{image}
versions = all
|
| 3133 | 2026-01-27T01:14:02.336Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = GET
path = /v1/images/{image}
versions = all
|
| 3134 | 2026-01-27T01:14:02.336Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = POST
path = /v1/images/{image}/demote
versions = all
|
| 3135 | 2026-01-27T01:14:02.336Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = POST
path = /v1/images/{image}/promote
versions = all
|
| 3136 | 2026-01-27T01:14:02.336Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = GET
path = /v1/instances
versions = all
|
| 3137 | 2026-01-27T01:14:02.337Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = POST
path = /v1/instances
versions = all ending with 2025120300.0.0
|
| 3138 | 2026-01-27T01:14:02.337Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = POST
path = /v1/instances
versions = from 2025120300.0.0 to 2025122300.0.0
|
| 3139 | 2026-01-27T01:14:02.337Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = POST
path = /v1/instances
versions = from 2025122300.0.0 to 2026010300.0.0
|
| 3140 | 2026-01-27T01:14:02.337Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = POST
path = /v1/instances
versions = from 2026010300.0.0 to 2026010500.0.0
|
| 3141 | 2026-01-27T01:14:02.337Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = POST
path = /v1/instances
versions = from 2026010500.0.0 to 2026010800.0.0
|
| 3142 | 2026-01-27T01:14:02.337Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = POST
path = /v1/instances
versions = all starting from 2026010800.0.0
|
| 3143 | 2026-01-27T01:14:02.337Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = DELETE
path = /v1/instances/{instance}
versions = all
|
| 3144 | 2026-01-27T01:14:02.337Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = GET
path = /v1/instances/{instance}
versions = all
|
| 3145 | 2026-01-27T01:14:02.337Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = PUT
path = /v1/instances/{instance}
versions = all ending with 2026010800.0.0
|
| 3146 | 2026-01-27T01:14:02.337Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = PUT
path = /v1/instances/{instance}
versions = all starting from 2026010800.0.0
|
| 3147 | 2026-01-27T01:14:02.337Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = GET
path = /v1/instances/{instance}/affinity-groups
versions = all
|
| 3148 | 2026-01-27T01:14:02.337Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = GET
path = /v1/instances/{instance}/anti-affinity-groups
versions = all
|
| 3149 | 2026-01-27T01:14:02.337Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = GET
path = /v1/instances/{instance}/disks
versions = all ending with 2025120300.0.0
|
| 3150 | 2026-01-27T01:14:02.337Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = GET
path = /v1/instances/{instance}/disks
versions = all starting from 2025120300.0.0
|
| 3151 | 2026-01-27T01:14:02.337Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = POST
path = /v1/instances/{instance}/disks/attach
versions = all ending with 2025120300.0.0
|
| 3152 | 2026-01-27T01:14:02.337Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = POST
path = /v1/instances/{instance}/disks/attach
versions = all starting from 2025120300.0.0
|
| 3153 | 2026-01-27T01:14:02.337Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = POST
path = /v1/instances/{instance}/disks/detach
versions = all ending with 2025120300.0.0
|
| 3154 | 2026-01-27T01:14:02.337Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = POST
path = /v1/instances/{instance}/disks/detach
versions = all starting from 2025120300.0.0
|
| 3155 | 2026-01-27T01:14:02.337Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = GET
path = /v1/instances/{instance}/external-ips
versions = all
|
| 3156 | 2026-01-27T01:14:02.337Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = DELETE
path = /v1/instances/{instance}/external-ips/ephemeral
versions = all
|
| 3157 | 2026-01-27T01:14:02.337Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = POST
path = /v1/instances/{instance}/external-ips/ephemeral
versions = all ending with 2025122300.0.0
|
| 3158 | 2026-01-27T01:14:02.337Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = POST
path = /v1/instances/{instance}/external-ips/ephemeral
versions = from 2025122300.0.0 to 2026010500.0.0
|
| 3159 | 2026-01-27T01:14:02.337Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = POST
path = /v1/instances/{instance}/external-ips/ephemeral
versions = all starting from 2026010500.0.0
|
| 3160 | 2026-01-27T01:14:02.337Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = GET
path = /v1/instances/{instance}/multicast-groups
versions = all ending with 2026010800.0.0
|
| 3161 | 2026-01-27T01:14:02.337Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = GET
path = /v1/instances/{instance}/multicast-groups
versions = all starting from 2026010800.0.0
|
| 3162 | 2026-01-27T01:14:02.337Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = DELETE
path = /v1/instances/{instance}/multicast-groups/{multicast_group}
versions = all ending with 2026010800.0.0
|
| 3163 | 2026-01-27T01:14:02.338Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = DELETE
path = /v1/instances/{instance}/multicast-groups/{multicast_group}
versions = all starting from 2026010800.0.0
|
| 3164 | 2026-01-27T01:14:02.338Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = PUT
path = /v1/instances/{instance}/multicast-groups/{multicast_group}
versions = all ending with 2026010800.0.0
|
| 3165 | 2026-01-27T01:14:02.338Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = PUT
path = /v1/instances/{instance}/multicast-groups/{multicast_group}
versions = all starting from 2026010800.0.0
|
| 3166 | 2026-01-27T01:14:02.338Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = POST
path = /v1/instances/{instance}/reboot
versions = all
|
| 3167 | 2026-01-27T01:14:02.338Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = GET
path = /v1/instances/{instance}/serial-console
versions = all
|
| 3168 | 2026-01-27T01:14:02.338Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = GET
path = /v1/instances/{instance}/serial-console/stream
versions = all
|
| 3169 | 2026-01-27T01:14:02.338Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = GET
path = /v1/instances/{instance}/ssh-public-keys
versions = all
|
| 3170 | 2026-01-27T01:14:02.338Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = POST
path = /v1/instances/{instance}/start
versions = all
|
| 3171 | 2026-01-27T01:14:02.338Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = POST
path = /v1/instances/{instance}/stop
versions = all
|
| 3172 | 2026-01-27T01:14:02.338Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = GET
path = /v1/internet-gateway-ip-addresses
versions = all
|
| 3173 | 2026-01-27T01:14:02.338Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = POST
path = /v1/internet-gateway-ip-addresses
versions = all
|
| 3174 | 2026-01-27T01:14:02.338Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = DELETE
path = /v1/internet-gateway-ip-addresses/{address}
versions = all
|
| 3175 | 2026-01-27T01:14:02.338Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = GET
path = /v1/internet-gateway-ip-pools
versions = all
|
| 3176 | 2026-01-27T01:14:02.338Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = POST
path = /v1/internet-gateway-ip-pools
versions = all
|
| 3177 | 2026-01-27T01:14:02.338Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = DELETE
path = /v1/internet-gateway-ip-pools/{pool}
versions = all
|
| 3178 | 2026-01-27T01:14:02.338Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = GET
path = /v1/internet-gateways
versions = all
|
| 3179 | 2026-01-27T01:14:02.338Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = POST
path = /v1/internet-gateways
versions = all
|
| 3180 | 2026-01-27T01:14:02.338Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = DELETE
path = /v1/internet-gateways/{gateway}
versions = all
|
| 3181 | 2026-01-27T01:14:02.338Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = GET
path = /v1/internet-gateways/{gateway}
versions = all
|
| 3182 | 2026-01-27T01:14:02.338Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = GET
path = /v1/ip-pools
versions = all ending with 2026010100.0.0
|
| 3183 | 2026-01-27T01:14:02.338Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = GET
path = /v1/ip-pools
versions = all starting from 2026010100.0.0
|
| 3184 | 2026-01-27T01:14:02.338Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = GET
path = /v1/ip-pools/{pool}
versions = all ending with 2026010100.0.0
|
| 3185 | 2026-01-27T01:14:02.338Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = GET
path = /v1/ip-pools/{pool}
versions = all starting from 2026010100.0.0
|
| 3186 | 2026-01-27T01:14:02.338Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = POST
path = /v1/login/{silo_name}/local
versions = all
|
| 3187 | 2026-01-27T01:14:02.339Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = POST
path = /v1/logout
versions = all
|
| 3188 | 2026-01-27T01:14:02.339Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = GET
path = /v1/me
versions = all
|
| 3189 | 2026-01-27T01:14:02.339Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = GET
path = /v1/me/access-tokens
versions = all
|
| 3190 | 2026-01-27T01:14:02.339Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = DELETE
path = /v1/me/access-tokens/{token_id}
versions = all
|
| 3191 | 2026-01-27T01:14:02.339Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = GET
path = /v1/me/groups
versions = all
|
| 3192 | 2026-01-27T01:14:02.339Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = GET
path = /v1/me/ssh-keys
versions = all
|
| 3193 | 2026-01-27T01:14:02.339Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = POST
path = /v1/me/ssh-keys
versions = all
|
| 3194 | 2026-01-27T01:14:02.339Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = DELETE
path = /v1/me/ssh-keys/{ssh_key}
versions = all
|
| 3195 | 2026-01-27T01:14:02.339Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = GET
path = /v1/me/ssh-keys/{ssh_key}
versions = all
|
| 3196 | 2026-01-27T01:14:02.339Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = GET
path = /v1/metrics/{metric_name}
versions = all
|
| 3197 | 2026-01-27T01:14:02.339Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = GET
path = /v1/multicast-groups
versions = all ending with 2026010800.0.0
|
| 3198 | 2026-01-27T01:14:02.339Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = GET
path = /v1/multicast-groups
versions = all starting from 2026010800.0.0
|
| 3199 | 2026-01-27T01:14:02.339Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = POST
path = /v1/multicast-groups
versions = all ending with 2026010800.0.0
|
| 3200 | 2026-01-27T01:14:02.339Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = DELETE
path = /v1/multicast-groups/{multicast_group}
versions = all ending with 2026010800.0.0
|
| 3201 | 2026-01-27T01:14:02.339Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = GET
path = /v1/multicast-groups/{multicast_group}
versions = all ending with 2026010800.0.0
|
| 3202 | 2026-01-27T01:14:02.339Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = GET
path = /v1/multicast-groups/{multicast_group}
versions = all starting from 2026010800.0.0
|
| 3203 | 2026-01-27T01:14:02.339Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = PUT
path = /v1/multicast-groups/{multicast_group}
versions = all ending with 2026010800.0.0
|
| 3204 | 2026-01-27T01:14:02.339Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = GET
path = /v1/multicast-groups/{multicast_group}/members
versions = all ending with 2026010800.0.0
|
| 3205 | 2026-01-27T01:14:02.339Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = GET
path = /v1/multicast-groups/{multicast_group}/members
versions = all starting from 2026010800.0.0
|
| 3206 | 2026-01-27T01:14:02.339Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = POST
path = /v1/multicast-groups/{multicast_group}/members
versions = all ending with 2026010800.0.0
|
| 3207 | 2026-01-27T01:14:02.339Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = DELETE
path = /v1/multicast-groups/{multicast_group}/members/{instance}
versions = all ending with 2026010800.0.0
|
| 3208 | 2026-01-27T01:14:02.339Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = GET
path = /v1/network-interfaces
versions = all ending with 2026010300.0.0
|
| 3209 | 2026-01-27T01:14:02.339Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = GET
path = /v1/network-interfaces
versions = all starting from 2026010300.0.0
|
| 3210 | 2026-01-27T01:14:02.339Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = POST
path = /v1/network-interfaces
versions = all ending with 2026010300.0.0
|
| 3211 | 2026-01-27T01:14:02.339Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = POST
path = /v1/network-interfaces
versions = all starting from 2026010300.0.0
|
| 3212 | 2026-01-27T01:14:02.340Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = DELETE
path = /v1/network-interfaces/{interface}
versions = all
|
| 3213 | 2026-01-27T01:14:02.340Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = GET
path = /v1/network-interfaces/{interface}
versions = all ending with 2026010300.0.0
|
| 3214 | 2026-01-27T01:14:02.340Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = GET
path = /v1/network-interfaces/{interface}
versions = all starting from 2026010300.0.0
|
| 3215 | 2026-01-27T01:14:02.340Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = PUT
path = /v1/network-interfaces/{interface}
versions = all ending with 2026010300.0.0
|
| 3216 | 2026-01-27T01:14:02.340Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = PUT
path = /v1/network-interfaces/{interface}
versions = all starting from 2026010300.0.0
|
| 3217 | 2026-01-27T01:14:02.340Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = GET
path = /v1/ping
versions = all
|
| 3218 | 2026-01-27T01:14:02.340Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = GET
path = /v1/policy
versions = all
|
| 3219 | 2026-01-27T01:14:02.340Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = PUT
path = /v1/policy
versions = all
|
| 3220 | 2026-01-27T01:14:02.340Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = GET
path = /v1/projects
versions = all
|
| 3221 | 2026-01-27T01:14:02.340Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = POST
path = /v1/projects
versions = all
|
| 3222 | 2026-01-27T01:14:02.340Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = DELETE
path = /v1/projects/{project}
versions = all
|
| 3223 | 2026-01-27T01:14:02.340Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = GET
path = /v1/projects/{project}
versions = all
|
| 3224 | 2026-01-27T01:14:02.340Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = PUT
path = /v1/projects/{project}
versions = all
|
| 3225 | 2026-01-27T01:14:02.340Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = GET
path = /v1/projects/{project}/policy
versions = all
|
| 3226 | 2026-01-27T01:14:02.340Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = PUT
path = /v1/projects/{project}/policy
versions = all
|
| 3227 | 2026-01-27T01:14:02.340Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = GET
path = /v1/snapshots
versions = all
|
| 3228 | 2026-01-27T01:14:02.340Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = POST
path = /v1/snapshots
versions = all
|
| 3229 | 2026-01-27T01:14:02.340Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = DELETE
path = /v1/snapshots/{snapshot}
versions = all
|
| 3230 | 2026-01-27T01:14:02.340Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = GET
path = /v1/snapshots/{snapshot}
versions = all
|
| 3231 | 2026-01-27T01:14:02.340Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = GET
path = /v1/system/audit-log
versions = all
|
| 3232 | 2026-01-27T01:14:02.340Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = GET
path = /v1/system/hardware/disks
versions = all
|
| 3233 | 2026-01-27T01:14:02.340Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = GET
path = /v1/system/hardware/disks/{disk_id}
versions = all
|
| 3234 | 2026-01-27T01:14:02.340Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = GET
path = /v1/system/hardware/rack-switch-port/{rack_id}/{switch_location}/{port}/lldp/neighbors
versions = all
|
| 3235 | 2026-01-27T01:14:02.340Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = GET
path = /v1/system/hardware/racks
versions = all
|
| 3236 | 2026-01-27T01:14:02.340Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = GET
path = /v1/system/hardware/racks/{rack_id}
versions = all
|
| 3237 | 2026-01-27T01:14:02.340Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = GET
path = /v1/system/hardware/racks/{rack_id}/membership
versions = all starting from 2026012100.0.0
|
| 3238 | 2026-01-27T01:14:02.341Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = POST
path = /v1/system/hardware/racks/{rack_id}/membership/add
versions = all starting from 2026012100.0.0
|
| 3239 | 2026-01-27T01:14:02.341Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = GET
path = /v1/system/hardware/sleds
versions = all
|
| 3240 | 2026-01-27T01:14:02.341Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = POST
path = /v1/system/hardware/sleds
versions = all
|
| 3241 | 2026-01-27T01:14:02.341Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = GET
path = /v1/system/hardware/sleds/{sled_id}
versions = all
|
| 3242 | 2026-01-27T01:14:02.341Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = GET
path = /v1/system/hardware/sleds/{sled_id}/disks
versions = all
|
| 3243 | 2026-01-27T01:14:02.341Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = GET
path = /v1/system/hardware/sleds/{sled_id}/instances
versions = all
|
| 3244 | 2026-01-27T01:14:02.341Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = PUT
path = /v1/system/hardware/sleds/{sled_id}/provision-policy
versions = all
|
| 3245 | 2026-01-27T01:14:02.341Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = GET
path = /v1/system/hardware/sleds-uninitialized
versions = all
|
| 3246 | 2026-01-27T01:14:02.341Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = GET
path = /v1/system/hardware/switch-port
versions = all
|
| 3247 | 2026-01-27T01:14:02.341Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = GET
path = /v1/system/hardware/switch-port/{port}/lldp/config
versions = all
|
| 3248 | 2026-01-27T01:14:02.341Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = POST
path = /v1/system/hardware/switch-port/{port}/lldp/config
versions = all
|
| 3249 | 2026-01-27T01:14:02.341Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = DELETE
path = /v1/system/hardware/switch-port/{port}/settings
versions = all
|
| 3250 | 2026-01-27T01:14:02.341Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = POST
path = /v1/system/hardware/switch-port/{port}/settings
versions = all
|
| 3251 | 2026-01-27T01:14:02.341Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = GET
path = /v1/system/hardware/switch-port/{port}/status
versions = all
|
| 3252 | 2026-01-27T01:14:02.341Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = GET
path = /v1/system/hardware/switches
versions = all
|
| 3253 | 2026-01-27T01:14:02.341Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = GET
path = /v1/system/hardware/switches/{switch_id}
versions = all
|
| 3254 | 2026-01-27T01:14:02.341Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = GET
path = /v1/system/identity-providers
versions = all
|
| 3255 | 2026-01-27T01:14:02.341Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = POST
path = /v1/system/identity-providers/local/users
versions = all
|
| 3256 | 2026-01-27T01:14:02.341Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = DELETE
path = /v1/system/identity-providers/local/users/{user_id}
versions = all
|
| 3257 | 2026-01-27T01:14:02.341Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = POST
path = /v1/system/identity-providers/local/users/{user_id}/set-password
versions = all
|
| 3258 | 2026-01-27T01:14:02.341Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = POST
path = /v1/system/identity-providers/saml
versions = all
|
| 3259 | 2026-01-27T01:14:02.341Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = GET
path = /v1/system/identity-providers/saml/{provider}
versions = all
|
| 3260 | 2026-01-27T01:14:02.341Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = GET
path = /v1/system/ip-pools
versions = all
|
| 3261 | 2026-01-27T01:14:02.341Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = POST
path = /v1/system/ip-pools
versions = all
|
| 3262 | 2026-01-27T01:14:02.341Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = DELETE
path = /v1/system/ip-pools/{pool}
versions = all
|
| 3263 | 2026-01-27T01:14:02.341Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = GET
path = /v1/system/ip-pools/{pool}
versions = all
|
| 3264 | 2026-01-27T01:14:02.342Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = PUT
path = /v1/system/ip-pools/{pool}
versions = all
|
| 3265 | 2026-01-27T01:14:02.342Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = GET
path = /v1/system/ip-pools/{pool}/ranges
versions = all
|
| 3266 | 2026-01-27T01:14:02.342Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = POST
path = /v1/system/ip-pools/{pool}/ranges/add
versions = all
|
| 3267 | 2026-01-27T01:14:02.342Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = POST
path = /v1/system/ip-pools/{pool}/ranges/remove
versions = all
|
| 3268 | 2026-01-27T01:14:02.342Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = GET
path = /v1/system/ip-pools/{pool}/silos
versions = all
|
| 3269 | 2026-01-27T01:14:02.342Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = POST
path = /v1/system/ip-pools/{pool}/silos
versions = all
|
| 3270 | 2026-01-27T01:14:02.342Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = DELETE
path = /v1/system/ip-pools/{pool}/silos/{silo}
versions = all
|
| 3271 | 2026-01-27T01:14:02.342Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = PUT
path = /v1/system/ip-pools/{pool}/silos/{silo}
versions = all
|
| 3272 | 2026-01-27T01:14:02.342Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = GET
path = /v1/system/ip-pools/{pool}/utilization
versions = all
|
| 3273 | 2026-01-27T01:14:02.342Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = GET
path = /v1/system/ip-pools-service
versions = all
|
| 3274 | 2026-01-27T01:14:02.342Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = GET
path = /v1/system/ip-pools-service/ranges
versions = all
|
| 3275 | 2026-01-27T01:14:02.342Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = POST
path = /v1/system/ip-pools-service/ranges/add
versions = all
|
| 3276 | 2026-01-27T01:14:02.342Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = POST
path = /v1/system/ip-pools-service/ranges/remove
versions = all
|
| 3277 | 2026-01-27T01:14:02.342Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = GET
path = /v1/system/metrics/{metric_name}
versions = all
|
| 3278 | 2026-01-27T01:14:02.342Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = GET
path = /v1/system/multicast-groups/by-ip/{address}
versions = all ending with 2026010800.0.0
|
| 3279 | 2026-01-27T01:14:02.342Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = GET
path = /v1/system/networking/address-lot
versions = all
|
| 3280 | 2026-01-27T01:14:02.342Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = POST
path = /v1/system/networking/address-lot
versions = all
|
| 3281 | 2026-01-27T01:14:02.342Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = DELETE
path = /v1/system/networking/address-lot/{address_lot}
versions = all
|
| 3282 | 2026-01-27T01:14:02.342Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = GET
path = /v1/system/networking/address-lot/{address_lot}
versions = all
|
| 3283 | 2026-01-27T01:14:02.342Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = GET
path = /v1/system/networking/address-lot/{address_lot}/blocks
versions = all
|
| 3284 | 2026-01-27T01:14:02.342Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = GET
path = /v1/system/networking/allow-list
versions = all
|
| 3285 | 2026-01-27T01:14:02.342Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = PUT
path = /v1/system/networking/allow-list
versions = all
|
| 3286 | 2026-01-27T01:14:02.342Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = POST
path = /v1/system/networking/bfd-disable
versions = all
|
| 3287 | 2026-01-27T01:14:02.342Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = POST
path = /v1/system/networking/bfd-enable
versions = all
|
| 3288 | 2026-01-27T01:14:02.343Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = GET
path = /v1/system/networking/bfd-status
versions = all
|
| 3289 | 2026-01-27T01:14:02.343Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = DELETE
path = /v1/system/networking/bgp
versions = all
|
| 3290 | 2026-01-27T01:14:02.343Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = GET
path = /v1/system/networking/bgp
versions = all
|
| 3291 | 2026-01-27T01:14:02.343Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = POST
path = /v1/system/networking/bgp
versions = all
|
| 3292 | 2026-01-27T01:14:02.343Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = GET
path = /v1/system/networking/bgp-announce-set
versions = all
|
| 3293 | 2026-01-27T01:14:02.343Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = PUT
path = /v1/system/networking/bgp-announce-set
versions = all
|
| 3294 | 2026-01-27T01:14:02.343Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = DELETE
path = /v1/system/networking/bgp-announce-set/{announce_set}
versions = all
|
| 3295 | 2026-01-27T01:14:02.343Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = GET
path = /v1/system/networking/bgp-announce-set/{announce_set}/announcement
versions = all
|
| 3296 | 2026-01-27T01:14:02.343Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = GET
path = /v1/system/networking/bgp-exported
versions = all
|
| 3297 | 2026-01-27T01:14:02.343Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = GET
path = /v1/system/networking/bgp-message-history
versions = all
|
| 3298 | 2026-01-27T01:14:02.343Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = GET
path = /v1/system/networking/bgp-routes-ipv4
versions = all
|
| 3299 | 2026-01-27T01:14:02.343Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = GET
path = /v1/system/networking/bgp-status
versions = all ending with 2025121200.0.0
|
| 3300 | 2026-01-27T01:14:02.343Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = GET
path = /v1/system/networking/bgp-status
versions = all starting from 2025121200.0.0
|
| 3301 | 2026-01-27T01:14:02.343Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = GET
path = /v1/system/networking/inbound-icmp
versions = all
|
| 3302 | 2026-01-27T01:14:02.343Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = PUT
path = /v1/system/networking/inbound-icmp
versions = all
|
| 3303 | 2026-01-27T01:14:02.343Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = GET
path = /v1/system/networking/loopback-address
versions = all
|
| 3304 | 2026-01-27T01:14:02.343Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = POST
path = /v1/system/networking/loopback-address
versions = all
|
| 3305 | 2026-01-27T01:14:02.343Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = DELETE
path = /v1/system/networking/loopback-address/{rack_id}/{switch_location}/{address}/{subnet_mask}
versions = all
|
| 3306 | 2026-01-27T01:14:02.343Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = DELETE
path = /v1/system/networking/switch-port-settings
versions = all
|
| 3307 | 2026-01-27T01:14:02.343Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = GET
path = /v1/system/networking/switch-port-settings
versions = all
|
| 3308 | 2026-01-27T01:14:02.343Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = POST
path = /v1/system/networking/switch-port-settings
versions = all
|
| 3309 | 2026-01-27T01:14:02.344Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = GET
path = /v1/system/networking/switch-port-settings/{port}
versions = all
|
| 3310 | 2026-01-27T01:14:02.344Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = GET
path = /v1/system/policy
versions = all
|
| 3311 | 2026-01-27T01:14:02.344Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = PUT
path = /v1/system/policy
versions = all
|
| 3312 | 2026-01-27T01:14:02.344Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = GET
path = /v1/system/scim/tokens
versions = all
|
| 3313 | 2026-01-27T01:14:02.344Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = POST
path = /v1/system/scim/tokens
versions = all
|
| 3314 | 2026-01-27T01:14:02.344Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = DELETE
path = /v1/system/scim/tokens/{token_id}
versions = all
|
| 3315 | 2026-01-27T01:14:02.344Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = GET
path = /v1/system/scim/tokens/{token_id}
versions = all
|
| 3316 | 2026-01-27T01:14:02.344Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = GET
path = /v1/system/silo-quotas
versions = all
|
| 3317 | 2026-01-27T01:14:02.344Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = GET
path = /v1/system/silos
versions = all
|
| 3318 | 2026-01-27T01:14:02.344Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = POST
path = /v1/system/silos
versions = all
|
| 3319 | 2026-01-27T01:14:02.344Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = DELETE
path = /v1/system/silos/{silo}
versions = all
|
| 3320 | 2026-01-27T01:14:02.344Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = GET
path = /v1/system/silos/{silo}
versions = all
|
| 3321 | 2026-01-27T01:14:02.344Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = GET
path = /v1/system/silos/{silo}/ip-pools
versions = all ending with 2026010100.0.0
|
| 3322 | 2026-01-27T01:14:02.344Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = GET
path = /v1/system/silos/{silo}/ip-pools
versions = all starting from 2026010100.0.0
|
| 3323 | 2026-01-27T01:14:02.344Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = GET
path = /v1/system/silos/{silo}/policy
versions = all
|
| 3324 | 2026-01-27T01:14:02.344Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = PUT
path = /v1/system/silos/{silo}/policy
versions = all
|
| 3325 | 2026-01-27T01:14:02.344Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = GET
path = /v1/system/silos/{silo}/quotas
versions = all
|
| 3326 | 2026-01-27T01:14:02.344Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = PUT
path = /v1/system/silos/{silo}/quotas
versions = all
|
| 3327 | 2026-01-27T01:14:02.344Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = GET
path = /v1/system/subnet-pools
versions = all starting from 2026011601.0.0
|
| 3328 | 2026-01-27T01:14:02.344Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = POST
path = /v1/system/subnet-pools
versions = all starting from 2026012201.0.0
|
| 3329 | 2026-01-27T01:14:02.344Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = POST
path = /v1/system/subnet-pools
versions = from 2026011601.0.0 to 2026012201.0.0
|
| 3330 | 2026-01-27T01:14:02.344Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = DELETE
path = /v1/system/subnet-pools/{pool}
versions = all starting from 2026011601.0.0
|
| 3331 | 2026-01-27T01:14:02.344Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = GET
path = /v1/system/subnet-pools/{pool}
versions = all starting from 2026011601.0.0
|
| 3332 | 2026-01-27T01:14:02.344Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = PUT
path = /v1/system/subnet-pools/{pool}
versions = all starting from 2026011601.0.0
|
| 3333 | 2026-01-27T01:14:02.345Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = GET
path = /v1/system/subnet-pools/{pool}/members
versions = all starting from 2026011601.0.0
|
| 3334 | 2026-01-27T01:14:02.345Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = POST
path = /v1/system/subnet-pools/{pool}/members/add
versions = all starting from 2026012201.0.0
|
| 3335 | 2026-01-27T01:14:02.345Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = POST
path = /v1/system/subnet-pools/{pool}/members/add
versions = from 2026011601.0.0 to 2026012201.0.0
|
| 3336 | 2026-01-27T01:14:02.345Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = POST
path = /v1/system/subnet-pools/{pool}/members/remove
versions = all starting from 2026011601.0.0
|
| 3337 | 2026-01-27T01:14:02.345Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = GET
path = /v1/system/subnet-pools/{pool}/silos
versions = all starting from 2026011601.0.0
|
| 3338 | 2026-01-27T01:14:02.345Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = POST
path = /v1/system/subnet-pools/{pool}/silos
versions = all starting from 2026011601.0.0
|
| 3339 | 2026-01-27T01:14:02.345Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = DELETE
path = /v1/system/subnet-pools/{pool}/silos/{silo}
versions = all starting from 2026011601.0.0
|
| 3340 | 2026-01-27T01:14:02.345Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = PUT
path = /v1/system/subnet-pools/{pool}/silos/{silo}
versions = all starting from 2026011601.0.0
|
| 3341 | 2026-01-27T01:14:02.345Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = GET
path = /v1/system/subnet-pools/{pool}/utilization
versions = all starting from 2026011601.0.0
|
| 3342 | 2026-01-27T01:14:02.345Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = POST
path = /v1/system/timeseries/query
versions = all
|
| 3343 | 2026-01-27T01:14:02.345Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = GET
path = /v1/system/timeseries/schemas
versions = all
|
| 3344 | 2026-01-27T01:14:02.345Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = GET
path = /v1/system/update/repositories
versions = all
|
| 3345 | 2026-01-27T01:14:02.345Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = PUT
path = /v1/system/update/repositories
versions = all
|
| 3346 | 2026-01-27T01:14:02.345Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = GET
path = /v1/system/update/repositories/{system_version}
versions = all
|
| 3347 | 2026-01-27T01:14:02.345Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = GET
path = /v1/system/update/status
versions = all
|
| 3348 | 2026-01-27T01:14:02.345Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = PUT
path = /v1/system/update/target-release
versions = all
|
| 3349 | 2026-01-27T01:14:02.345Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = GET
path = /v1/system/update/trust-roots
versions = all
|
| 3350 | 2026-01-27T01:14:02.345Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = POST
path = /v1/system/update/trust-roots
versions = all
|
| 3351 | 2026-01-27T01:14:02.345Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = DELETE
path = /v1/system/update/trust-roots/{trust_root_id}
versions = all
|
| 3352 | 2026-01-27T01:14:02.345Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = GET
path = /v1/system/update/trust-roots/{trust_root_id}
versions = all
|
| 3353 | 2026-01-27T01:14:02.345Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = GET
path = /v1/system/users
versions = all
|
| 3354 | 2026-01-27T01:14:02.345Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = GET
path = /v1/system/users/{user_id}
versions = all
|
| 3355 | 2026-01-27T01:14:02.345Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = GET
path = /v1/system/users-builtin
versions = all
|
| 3356 | 2026-01-27T01:14:02.345Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = GET
path = /v1/system/users-builtin/{user}
versions = all
|
| 3357 | 2026-01-27T01:14:02.345Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = GET
path = /v1/system/utilization/silos
versions = all
|
| 3358 | 2026-01-27T01:14:02.346Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = GET
path = /v1/system/utilization/silos/{silo}
versions = all
|
| 3359 | 2026-01-27T01:14:02.346Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = POST
path = /v1/timeseries/query
versions = all
|
| 3360 | 2026-01-27T01:14:02.346Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = GET
path = /v1/users
versions = all
|
| 3361 | 2026-01-27T01:14:02.346Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = GET
path = /v1/users/{user_id}
versions = all
|
| 3362 | 2026-01-27T01:14:02.346Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = GET
path = /v1/users/{user_id}/access-tokens
versions = all
|
| 3363 | 2026-01-27T01:14:02.346Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = POST
path = /v1/users/{user_id}/logout
versions = all
|
| 3364 | 2026-01-27T01:14:02.346Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = GET
path = /v1/users/{user_id}/sessions
versions = all
|
| 3365 | 2026-01-27T01:14:02.346Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = GET
path = /v1/utilization
versions = all
|
| 3366 | 2026-01-27T01:14:02.346Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = GET
path = /v1/vpc-firewall-rules
versions = all
|
| 3367 | 2026-01-27T01:14:02.346Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = PUT
path = /v1/vpc-firewall-rules
versions = all
|
| 3368 | 2026-01-27T01:14:02.346Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = GET
path = /v1/vpc-router-routes
versions = all
|
| 3369 | 2026-01-27T01:14:02.346Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = POST
path = /v1/vpc-router-routes
versions = all
|
| 3370 | 2026-01-27T01:14:02.346Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = DELETE
path = /v1/vpc-router-routes/{route}
versions = all
|
| 3371 | 2026-01-27T01:14:02.346Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = GET
path = /v1/vpc-router-routes/{route}
versions = all
|
| 3372 | 2026-01-27T01:14:02.346Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = PUT
path = /v1/vpc-router-routes/{route}
versions = all
|
| 3373 | 2026-01-27T01:14:02.346Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = GET
path = /v1/vpc-routers
versions = all
|
| 3374 | 2026-01-27T01:14:02.346Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = POST
path = /v1/vpc-routers
versions = all
|
| 3375 | 2026-01-27T01:14:02.346Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = DELETE
path = /v1/vpc-routers/{router}
versions = all
|
| 3376 | 2026-01-27T01:14:02.346Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = GET
path = /v1/vpc-routers/{router}
versions = all
|
| 3377 | 2026-01-27T01:14:02.346Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = PUT
path = /v1/vpc-routers/{router}
versions = all
|
| 3378 | 2026-01-27T01:14:02.346Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = GET
path = /v1/vpc-subnets
versions = all
|
| 3379 | 2026-01-27T01:14:02.346Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = POST
path = /v1/vpc-subnets
versions = all
|
| 3380 | 2026-01-27T01:14:02.346Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = DELETE
path = /v1/vpc-subnets/{subnet}
versions = all
|
| 3381 | 2026-01-27T01:14:02.346Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = GET
path = /v1/vpc-subnets/{subnet}
versions = all
|
| 3382 | 2026-01-27T01:14:02.346Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = PUT
path = /v1/vpc-subnets/{subnet}
versions = all
|
| 3383 | 2026-01-27T01:14:02.346Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = GET
path = /v1/vpc-subnets/{subnet}/network-interfaces
versions = all ending with 2026010300.0.0
|
| 3384 | 2026-01-27T01:14:02.347Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = GET
path = /v1/vpc-subnets/{subnet}/network-interfaces
versions = all starting from 2026010300.0.0
|
| 3385 | 2026-01-27T01:14:02.347Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = GET
path = /v1/vpcs
versions = all
|
| 3386 | 2026-01-27T01:14:02.347Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = POST
path = /v1/vpcs
versions = all
|
| 3387 | 2026-01-27T01:14:02.347Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = DELETE
path = /v1/vpcs/{vpc}
versions = all
|
| 3388 | 2026-01-27T01:14:02.347Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = GET
path = /v1/vpcs/{vpc}
versions = all
|
| 3389 | 2026-01-27T01:14:02.347Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = PUT
path = /v1/vpcs/{vpc}
versions = all
|
| 3390 | 2026-01-27T01:14:02.347Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = POST
path = /v1/webhook-receivers
versions = all
|
| 3391 | 2026-01-27T01:14:02.347Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = PUT
path = /v1/webhook-receivers/{receiver}
versions = all
|
| 3392 | 2026-01-27T01:14:02.347Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = GET
path = /v1/webhook-secrets
versions = all
|
| 3393 | 2026-01-27T01:14:02.347Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = POST
path = /v1/webhook-secrets
versions = all
|
| 3394 | 2026-01-27T01:14:02.347Z | DEBG | test_vpcs (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62010
method = DELETE
path = /v1/webhook-secrets/{secret_id}
versions = all
|
| 3395 | 2026-01-27T01:14:02.347Z | INFO | test_vpcs (dropshot_external_techport): listening
local_addr = 127.0.0.1:62010
|
| 3396 | 2026-01-27T01:14:02.347Z | DEBG | test_vpcs (dropshot_external_techport): successfully registered DTrace USDT probes
local_addr = 127.0.0.1:62010
|
| 3397 | 2026-01-27T01:14:02.347Z | DEBG | test_vpcs (nexus-producer-server): registered DTrace probes
|
| 3398 | 2026-01-27T01:14:02.347Z | DEBG | test_vpcs (dropshot): registered endpoint
local_addr = 127.0.0.1:62938
method = GET
path = /{producer_id}
versions = all
|
| 3399 | 2026-01-27T01:14:02.347Z | INFO | test_vpcs (dropshot): listening
file = /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.6/src/server.rs:328
local_addr = 127.0.0.1:62938
|
| 3400 | 2026-01-27T01:14:02.347Z | DEBG | test_vpcs (dropshot): successfully registered DTrace USDT probes
local_addr = 127.0.0.1:62938
|
| 3401 | 2026-01-27T01:14:02.347Z | DEBG | test_vpcs (nexus-producer-server): Requested any available port, Dropshot server has been bound to 127.0.0.1:62938
|
| 3402 | 2026-01-27T01:14:02.347Z | DEBG | test_vpcs (nexus-producer-server): Nexus IP provided explicitly, will use it
addr = 127.0.0.1:46983
|
| 3403 | 2026-01-27T01:14:02.347Z | DEBG | test_vpcs (nexus-producer-server): starting producer registration task
|
| 3404 | 2026-01-27T01:14:02.347Z | INFO | test_vpcs (nexus-producer-server): starting oximeter metric producer server
address = 127.0.0.1:62938
file = oximeter/producer/src/lib.rs:279
interval = 10s
producer_id = 913233fe-92a8-4635-9572-183f495429c4
|
| 3405 | 2026-01-27T01:14:02.347Z | DEBG | test_vpcs (init_with_steps): Running step start_oximeter
|
| 3406 | 2026-01-27T01:14:02.347Z | DEBG | test_vpcs: Starting Oximeter
|
| 3407 | 2026-01-27T01:14:02.347Z | DEBG | test_vpcs (oximeter): registered DTrace probes
|
| 3408 | 2026-01-27T01:14:02.347Z | INFO | test_vpcs (oximeter): starting oximeter server
file = oximeter/collector/src/lib.rs:264
|
| 3409 | 2026-01-27T01:14:02.347Z | DEBG | test_vpcs (oximeter): creating ClickHouse client
|
| 3410 | 2026-01-27T01:14:02.347Z | DEBG | test_vpcs (clickhouse-client): registered USDT probes
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 719060a6-12ac-470c-bb91-e566c7f997b2
|
| 3411 | 2026-01-27T01:14:02.348Z | DEBG | test_vpcs (producer-registration-task): registering as oximeter producer with Nexus
registration_count = 0
|
| 3412 | 2026-01-27T01:14:02.348Z | DEBG | test_vpcs (producer-registration-task): will register with Nexus at 127.0.0.1:46983
|
| 3413 | 2026-01-27T01:14:02.438Z | DEBG | test_vpcs (producer-registration-task): client request
body = Some(Body)
method = POST
uri = http://127.0.0.1:46983/metrics/producers
|
| 3414 | 2026-01-27T01:14:02.441Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = inventory_collection
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 3415 | 2026-01-27T01:14:02.447Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = inventory_collection
resource = Fleet
result = Ok(())
|
| 3416 | 2026-01-27T01:14:02.447Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = inventory_collection
resource = Database
|
| 3417 | 2026-01-27T01:14:02.447Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = inventory_collection
roles = RoleSet { roles: {} }
|
| 3418 | 2026-01-27T01:14:02.448Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = inventory_collection
resource = Database
result = Ok(())
|
| 3419 | 2026-01-27T01:14:02.449Z | INFO | test_vpcs (dropshot_internal): accepted connection
local_addr = 127.0.0.1:46983
remote_addr = 127.0.0.1:65452
|
| 3420 | 2026-01-27T01:14:02.454Z | TRAC | test_vpcs (dropshot_internal): incoming request
local_addr = 127.0.0.1:46983
method = POST
remote_addr = 127.0.0.1:65452
req_id = cd454bf0-445a-4ef3-8caa-0b895bc76ac4
uri = /metrics/producers
|
| 3421 | 2026-01-27T01:14:02.454Z | DEBG | test_vpcs (dropshot_internal): determined request API version
local_addr = 127.0.0.1:46983
method = POST
remote_addr = 127.0.0.1:65452
req_id = cd454bf0-445a-4ef3-8caa-0b895bc76ac4
uri = /metrics/producers
version = 1.0.0
|
| 3422 | 2026-01-27T01:14:02.466Z | TRAC | test_vpcs (dropshot_internal): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
authenticated = true
local_addr = 127.0.0.1:46983
method = POST
remote_addr = 127.0.0.1:65452
req_id = cd454bf0-445a-4ef3-8caa-0b895bc76ac4
resource = Database
type = user_builtin
uri = /metrics/producers
user_builtin_id = 001de000-05e4-4000-8000-000000000002
|
| 3423 | 2026-01-27T01:14:02.466Z | DEBG | test_vpcs (dropshot_internal): roles
authenticated = true
local_addr = 127.0.0.1:46983
method = POST
remote_addr = 127.0.0.1:65452
req_id = cd454bf0-445a-4ef3-8caa-0b895bc76ac4
roles = RoleSet { roles: {} }
type = user_builtin
uri = /metrics/producers
user_builtin_id = 001de000-05e4-4000-8000-000000000002
|
| 3424 | 2026-01-27T01:14:02.467Z | DEBG | test_vpcs (dropshot_internal): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
authenticated = true
local_addr = 127.0.0.1:46983
method = POST
remote_addr = 127.0.0.1:65452
req_id = cd454bf0-445a-4ef3-8caa-0b895bc76ac4
resource = Database
result = Ok(())
type = user_builtin
uri = /metrics/producers
user_builtin_id = 001de000-05e4-4000-8000-000000000002
|
| 3425 | 2026-01-27T01:14:02.472Z | TRAC | test_vpcs (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 719060a6-12ac-470c-bb91-e566c7f997b2
sql = SELECT MAX(value) AS max_version FROM oximeter.version;
|
| 3426 | 2026-01-27T01:14:02.474Z | DEBG | test_vpcs (BackgroundTasks): activating
background_task = reconfigurator_config_watcher
iteration = 3
reason = Timeout
|
| 3427 | 2026-01-27T01:14:02.474Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = reconfigurator_config_watcher
resource = BlueprintConfig
|
| 3428 | 2026-01-27T01:14:02.474Z | TRAC | test_vpcs (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = reconfigurator_config_watcher
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 3429 | 2026-01-27T01:14:02.474Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = reconfigurator_config_watcher
resource = Database
|
| 3430 | 2026-01-27T01:14:02.474Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = reconfigurator_config_watcher
roles = RoleSet { roles: {} }
|
| 3431 | 2026-01-27T01:14:02.474Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = reconfigurator_config_watcher
resource = Database
result = Ok(())
|
| 3432 | 2026-01-27T01:14:02.479Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = reconfigurator_config_watcher
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 3433 | 2026-01-27T01:14:02.491Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = reconfigurator_config_watcher
resource = BlueprintConfig
result = Ok(())
|
| 3434 | 2026-01-27T01:14:02.491Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = reconfigurator_config_watcher
resource = Database
|
| 3435 | 2026-01-27T01:14:02.491Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = reconfigurator_config_watcher
roles = RoleSet { roles: {} }
|
| 3436 | 2026-01-27T01:14:02.492Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = reconfigurator_config_watcher
resource = Database
result = Ok(())
|
| 3437 | 2026-01-27T01:14:02.495Z | WARN | test_vpcs (clickhouse-client): oximeter database does not exist, or is out-of-date
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
file = oximeter/db/src/client/mod.rs:900
id = 719060a6-12ac-470c-bb91-e566c7f997b2
|
| 3438 | 2026-01-27T01:14:02.495Z | DEBG | test_vpcs (oximeter-agent): oximeter database does not exist, creating
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
|
| 3439 | 2026-01-27T01:14:02.495Z | INFO | test_vpcs (clickhouse-client): reading db version
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
file = oximeter/db/src/client/mod.rs:800
id = 719060a6-12ac-470c-bb91-e566c7f997b2
|
| 3440 | 2026-01-27T01:14:02.495Z | TRAC | test_vpcs (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 719060a6-12ac-470c-bb91-e566c7f997b2
sql = SELECT MAX(value) AS max_version FROM oximeter.version;
|
| 3441 | 2026-01-27T01:14:02.497Z | WARN | test_vpcs (clickhouse-client): oximeter database does not exist, or is out-of-date
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
file = oximeter/db/src/client/mod.rs:900
id = 719060a6-12ac-470c-bb91-e566c7f997b2
|
| 3442 | 2026-01-27T01:14:02.497Z | INFO | test_vpcs (clickhouse-client): read oximeter database version
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
file = oximeter/db/src/client/mod.rs:805
id = 719060a6-12ac-470c-bb91-e566c7f997b2
version = 0
|
| 3443 | 2026-01-27T01:14:02.497Z | INFO | test_vpcs (clickhouse-client): initializing oximeter schema
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
file = oximeter/db/src/client/mod.rs:810
id = 719060a6-12ac-470c-bb91-e566c7f997b2
|
| 3444 | 2026-01-27T01:14:02.497Z | DEBG | test_vpcs (clickhouse-client): initializing ClickHouse database
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 719060a6-12ac-470c-bb91-e566c7f997b2
|
| 3445 | 2026-01-27T01:14:02.497Z | DEBG | test_vpcs (BackgroundTasks): reconfigurator config load complete
background_task = reconfigurator_config_watcher
switches = Loaded(ReconfiguratorConfigView { version: 1, config: ReconfiguratorConfig { planner_enabled: false, planner_config: PlannerConfig { add_zones_with_mupdate_override: false }, tuf_repo_pruner_enabled: true }, time_modified: 2026-01-27T01:13:51.285464Z })
|
| 3446 | 2026-01-27T01:14:02.497Z | DEBG | test_vpcs (BackgroundTasks): activation complete
background_task = reconfigurator_config_watcher
elapsed = 24.551699ms
iteration = 3
status = {"config_updated":false}
|
| 3447 | 2026-01-27T01:14:02.498Z | TRAC | test_vpcs (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 719060a6-12ac-470c-bb91-e566c7f997b2
sql = CREATE DATABASE IF NOT EXISTS oximeter
|
| 3448 | 2026-01-27T01:14:02.506Z | TRAC | test_vpcs (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 719060a6-12ac-470c-bb91-e566c7f997b2
sql = \n\n/* The version table contains metadata about the `oximeter` database */\nCREATE TABLE IF NOT EXISTS oximeter.version\n(\n value UInt64,\n timestamp DateTime64(9, 'UTC')\n)\nENGINE = MergeTree()\nORDER BY (value, timestamp)
|
| 3449 | 2026-01-27T01:14:02.512Z | TRAC | test_vpcs (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 719060a6-12ac-470c-bb91-e566c7f997b2
sql = \n\n/* The measurement tables contain all individual samples from each timeseries.\n *\n * Each table stores a single datum type, and otherwise contains nearly the same\n * structure. The primary sorting key is on the timeseries name, key, and then\n * timestamp, so that all timeseries from the same schema are grouped, followed\n * by all samples from the same timeseries.\n *\n * This reflects that one usually looks up the _key_ in one or more field table,\n * and then uses that to index quickly into the measurements tables.\n */\nCREATE TABLE IF NOT EXISTS oximeter.measurements_bool\n(\n timeseries_name String,\n timeseries_key UInt64,\n timestamp DateTime64(9, 'UTC'),\n datum Nullable(Bool)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
|
| 3450 | 2026-01-27T01:14:02.529Z | TRAC | test_vpcs (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 719060a6-12ac-470c-bb91-e566c7f997b2
sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_i8\n(\n timeseries_name String,\n timeseries_key UInt64,\n timestamp DateTime64(9, 'UTC'),\n datum Nullable(Int8)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
|
| 3451 | 2026-01-27T01:14:02.540Z | TRAC | test_vpcs (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 719060a6-12ac-470c-bb91-e566c7f997b2
sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_u8\n(\n timeseries_name String,\n timeseries_key UInt64,\n timestamp DateTime64(9, 'UTC'),\n datum Nullable(UInt8)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
|
| 3452 | 2026-01-27T01:14:02.553Z | INFO | test_vpcs (dropshot_internal): request completed
error_message_external = Service Unavailable
error_message_internal = no Oximeter instances available for assignment
latency_us = 99593
local_addr = 127.0.0.1:46983
method = POST
remote_addr = 127.0.0.1:65452
req_id = cd454bf0-445a-4ef3-8caa-0b895bc76ac4
response_code = 503
uri = /metrics/producers
|
| 3453 | 2026-01-27T01:14:02.555Z | TRAC | test_vpcs (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 719060a6-12ac-470c-bb91-e566c7f997b2
sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_i16\n(\n timeseries_name String,\n timeseries_key UInt64,\n timestamp DateTime64(9, 'UTC'),\n datum Nullable(Int16)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
|
| 3454 | 2026-01-27T01:14:02.560Z | DEBG | test_vpcs (producer-registration-task): client response
result = Ok(Response { url: "http://127.0.0.1:46983/metrics/producers", status: 503, headers: {"content-type": "application/json", "x-request-id": "cd454bf0-445a-4ef3-8caa-0b895bc76ac4", "content-length": "133", "date": "Tue, 27 Jan 2026 01:14:02 GMT"} })
|
| 3455 | 2026-01-27T01:14:02.561Z | WARN | test_vpcs (producer-registration-task): failed to register with Nexus, will retry
count = 0
delay = 215.694527ms
error = "Error Response: status: 503 Service Unavailable; headers: {\\"content-type\\": \\"application/json\\", \\"x-request-id\\": \\"cd454bf0-445a-4ef3-8caa-0b895bc76ac4\\", \\"content-length\\": \\"133\\", \\"date\\": \\"Tue, 27 Jan 2026 01:14:02 GMT\\"}; value: Error { error_code: Some(\\"ServiceNotAvailable\\"), message: \\"Service Unavailable\\", request_id: \\"cd454bf0-445a-4ef3-8caa-0b895bc76ac4\\" }"
file = oximeter/producer/src/lib.rs:371
|
| 3456 | 2026-01-27T01:14:02.561Z | TRAC | test_vpcs (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 719060a6-12ac-470c-bb91-e566c7f997b2
sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_u16\n(\n timeseries_name String,\n timeseries_key UInt64,\n timestamp DateTime64(9, 'UTC'),\n datum Nullable(UInt16)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
|
| 3457 | 2026-01-27T01:14:02.689Z | DEBG | test_vpcs (BackgroundTasks): begin collection from Sled Agent
background_task = inventory_collection
sled_agent_url = http://[::1]:59842
|
| 3458 | 2026-01-27T01:14:02.690Z | DEBG | test_vpcs (BackgroundTasks): client request
SledAgent = http://[::1]:59842
background_task = inventory_collection
body = None
method = GET
uri = http://[::1]:59842/inventory
|
| 3459 | 2026-01-27T01:14:02.691Z | TRAC | test_vpcs (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 719060a6-12ac-470c-bb91-e566c7f997b2
sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_i32\n(\n timeseries_name String,\n timeseries_key UInt64,\n timestamp DateTime64(9, 'UTC'),\n datum Nullable(Int32)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
|
| 3460 | 2026-01-27T01:14:02.696Z | INFO | test_vpcs (dropshot): accepted connection
local_addr = [::1]:59842
remote_addr = [::1]:55685
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
| 3461 | 2026-01-27T01:14:02.699Z | TRAC | test_vpcs (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 719060a6-12ac-470c-bb91-e566c7f997b2
sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_u32\n(\n timeseries_name String,\n timeseries_key UInt64,\n timestamp DateTime64(9, 'UTC'),\n datum Nullable(UInt32)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
|
| 3462 | 2026-01-27T01:14:02.700Z | TRAC | test_vpcs (dropshot): incoming request
local_addr = [::1]:59842
method = GET
remote_addr = [::1]:55685
req_id = dac183bb-457c-4333-ac95-f0ac9d14a62d
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
uri = /inventory
|
| 3463 | 2026-01-27T01:14:02.700Z | DEBG | test_vpcs (dropshot): determined request API version
local_addr = [::1]:59842
method = GET
remote_addr = [::1]:55685
req_id = dac183bb-457c-4333-ac95-f0ac9d14a62d
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
uri = /inventory
version = 15.0.0
|
| 3464 | 2026-01-27T01:14:02.711Z | INFO | test_vpcs (dropshot): request completed
latency_us = 10965
local_addr = [::1]:59842
method = GET
remote_addr = [::1]:55685
req_id = dac183bb-457c-4333-ac95-f0ac9d14a62d
response_code = 200
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
uri = /inventory
|
| 3465 | 2026-01-27T01:14:02.712Z | TRAC | test_vpcs (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 719060a6-12ac-470c-bb91-e566c7f997b2
sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_i64\n(\n timeseries_name String,\n timeseries_key UInt64,\n timestamp DateTime64(9, 'UTC'),\n datum Nullable(Int64)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
|
| 3466 | 2026-01-27T01:14:02.719Z | DEBG | test_vpcs (BackgroundTasks): client response
SledAgent = http://[::1]:59842
background_task = inventory_collection
result = Ok(Response { url: "http://[::1]:59842/inventory", status: 200, headers: {"content-type": "application/json", "x-request-id": "dac183bb-457c-4333-ac95-f0ac9d14a62d", "content-length": "20487", "date": "Tue, 27 Jan 2026 01:14:02 GMT"} })
|
| 3467 | 2026-01-27T01:14:02.723Z | DEBG | test_vpcs (BackgroundTasks): begin collecting all keepers
background_task = inventory_collection
nkeeper_admin_clients = 0
|
| 3468 | 2026-01-27T01:14:02.723Z | DEBG | test_vpcs (BackgroundTasks): end collecting all keepers
background_task = inventory_collection
nkeeper_admin_clients = 0
|
| 3469 | 2026-01-27T01:14:02.723Z | DEBG | test_vpcs (BackgroundTasks): begin collection from CockroachDB nodes
background_task = inventory_collection
|
| 3470 | 2026-01-27T01:14:02.723Z | DEBG | test_vpcs (CockroachClusterAdminClient): client request
body = None
method = GET
uri = http://[::1]:32222/node/id
|
| 3471 | 2026-01-27T01:14:02.724Z | DEBG | test_vpcs (CockroachClusterAdminClient): client response
result = Err(reqwest::Error { kind: Request, url: "http://[::1]:32222/node/id", source: hyper_util::client::legacy::Error(Connect, ConnectError("tcp connect error", [::1]:32222, Os { code: 146, kind: ConnectionRefused, message: "Connection refused" })) })
|
| 3472 | 2026-01-27T01:14:02.724Z | WARN | test_vpcs (CockroachClusterAdminClient): Failed to fetch metrics from CockroachDB node
error = Failed to get node ID from [::1]:32222
|
| 3473 | 2026-01-27T01:14:02.811Z | DEBG | test_vpcs (BackgroundTasks): begin collection from NTP admin (timesync)
background_task = inventory_collection
sled_agent_url = http://[::1]:10123
zone_id = dfa9197a-b8e0-4f4b-99de-5076da34c291 (omicron_zone)
|
| 3474 | 2026-01-27T01:14:02.812Z | DEBG | test_vpcs (BackgroundTasks): client request
background_task = inventory_collection
body = None
method = GET
ntp_admin_url = http://[::1]:10123
uri = http://[::1]:10123/timesync
|
| 3475 | 2026-01-27T01:14:02.812Z | DEBG | test_vpcs (BackgroundTasks): client response
background_task = inventory_collection
ntp_admin_url = http://[::1]:10123
result = Err(reqwest::Error { kind: Request, url: "http://[::1]:10123/timesync", source: hyper_util::client::legacy::Error(Connect, ConnectError("tcp connect error", [::1]:10123, Os { code: 146, kind: ConnectionRefused, message: "Connection refused" })) })
|
| 3476 | 2026-01-27T01:14:02.815Z | DEBG | test_vpcs (BackgroundTasks): begin collection from internal DNS servers
background_task = inventory_collection
|
| 3477 | 2026-01-27T01:14:02.986Z | DEBG | test_vpcs (BackgroundTasks): begin collection from DNS server
background_task = inventory_collection
zone_id = fb7e8b12-2b9b-4970-85ca-299c62844890 (omicron_zone)
|
| 3478 | 2026-01-27T01:14:02.986Z | DEBG | test_vpcs (BackgroundTasks): client request
background_task = inventory_collection
body = None
internal_dns_url = http://[::1]:65457
method = GET
uri = http://[::1]:65457/config
|
| 3479 | 2026-01-27T01:14:02.986Z | TRAC | test_vpcs (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 719060a6-12ac-470c-bb91-e566c7f997b2
sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_u64\n(\n timeseries_name String,\n timeseries_key UInt64,\n timestamp DateTime64(9, 'UTC'),\n datum Nullable(UInt64)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
|
| 3480 | 2026-01-27T01:14:02.989Z | INFO | test_vpcs (http): accepted connection
kind = dns
local_addr = [::1]:65457
remote_addr = [::1]:47590
|
| 3481 | 2026-01-27T01:14:02.991Z | DEBG | test_vpcs (producer-registration-task): will register with Nexus at 127.0.0.1:46983
|
| 3482 | 2026-01-27T01:14:03.164Z | DEBG | test_vpcs (producer-registration-task): client request
body = Some(Body)
method = POST
uri = http://127.0.0.1:46983/metrics/producers
|
| 3483 | 2026-01-27T01:14:03.167Z | TRAC | test_vpcs (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 719060a6-12ac-470c-bb91-e566c7f997b2
sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_f32\n(\n timeseries_name String,\n timeseries_key UInt64,\n timestamp DateTime64(9, 'UTC'),\n datum Nullable(Float32)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
|
| 3484 | 2026-01-27T01:14:03.167Z | INFO | test_vpcs (dropshot_internal): accepted connection
local_addr = 127.0.0.1:46983
remote_addr = 127.0.0.1:35831
|
| 3485 | 2026-01-27T01:14:03.168Z | TRAC | test_vpcs (http): incoming request
kind = dns
local_addr = [::1]:65457
method = GET
remote_addr = [::1]:47590
req_id = 1b92dff1-2543-4a68-bcbe-b171de82fca2
uri = /config
|
| 3486 | 2026-01-27T01:14:03.168Z | DEBG | test_vpcs (http): determined request API version
kind = dns
local_addr = [::1]:65457
method = GET
remote_addr = [::1]:47590
req_id = 1b92dff1-2543-4a68-bcbe-b171de82fca2
uri = /config
version = 2.0.0
|
| 3487 | 2026-01-27T01:14:03.169Z | INFO | test_vpcs (http): request completed
kind = dns
latency_us = 1075
local_addr = [::1]:65457
method = GET
remote_addr = [::1]:47590
req_id = 1b92dff1-2543-4a68-bcbe-b171de82fca2
response_code = 200
uri = /config
|
| 3488 | 2026-01-27T01:14:03.170Z | TRAC | test_vpcs (dropshot_internal): incoming request
local_addr = 127.0.0.1:46983
method = POST
remote_addr = 127.0.0.1:35831
req_id = e732c62e-7ad6-4f01-90e8-3c398e9a1ce3
uri = /metrics/producers
|
| 3489 | 2026-01-27T01:14:03.170Z | DEBG | test_vpcs (dropshot_internal): determined request API version
local_addr = 127.0.0.1:46983
method = POST
remote_addr = 127.0.0.1:35831
req_id = e732c62e-7ad6-4f01-90e8-3c398e9a1ce3
uri = /metrics/producers
version = 1.0.0
|
| 3490 | 2026-01-27T01:14:03.176Z | DEBG | test_vpcs (BackgroundTasks): client response
background_task = inventory_collection
internal_dns_url = http://[::1]:65457
result = Ok(Response { url: "http://[::1]:65457/config", status: 200, headers: {"content-type": "application/json", "x-request-id": "1b92dff1-2543-4a68-bcbe-b171de82fca2", "content-length": "3478", "date": "Tue, 27 Jan 2026 01:14:03 GMT"} })
|
| 3491 | 2026-01-27T01:14:03.177Z | DEBG | test_vpcs (BackgroundTasks): finished collection from DNS server
background_task = inventory_collection
zone_id = fb7e8b12-2b9b-4970-85ca-299c62844890 (omicron_zone)
|
| 3492 | 2026-01-27T01:14:03.187Z | DEBG | test_vpcs (BackgroundTasks): finished collection from internal DNS servers
background_task = inventory_collection
|
| 3493 | 2026-01-27T01:14:03.187Z | DEBG | test_vpcs (BackgroundTasks): finished collection
background_task = inventory_collection
|
| 3494 | 2026-01-27T01:14:03.188Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Modify
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = inventory_collection
resource = Inventory
|
| 3495 | 2026-01-27T01:14:03.188Z | TRAC | test_vpcs (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = inventory_collection
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 3496 | 2026-01-27T01:14:03.189Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = inventory_collection
resource = Database
|
| 3497 | 2026-01-27T01:14:03.189Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = inventory_collection
roles = RoleSet { roles: {} }
|
| 3498 | 2026-01-27T01:14:03.189Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = inventory_collection
resource = Database
result = Ok(())
|
| 3499 | 2026-01-27T01:14:03.191Z | TRAC | test_vpcs (dropshot_internal): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
authenticated = true
local_addr = 127.0.0.1:46983
method = POST
remote_addr = 127.0.0.1:35831
req_id = e732c62e-7ad6-4f01-90e8-3c398e9a1ce3
resource = Database
type = user_builtin
uri = /metrics/producers
user_builtin_id = 001de000-05e4-4000-8000-000000000002
|
| 3500 | 2026-01-27T01:14:03.191Z | DEBG | test_vpcs (dropshot_internal): roles
authenticated = true
local_addr = 127.0.0.1:46983
method = POST
remote_addr = 127.0.0.1:35831
req_id = e732c62e-7ad6-4f01-90e8-3c398e9a1ce3
roles = RoleSet { roles: {} }
type = user_builtin
uri = /metrics/producers
user_builtin_id = 001de000-05e4-4000-8000-000000000002
|
| 3501 | 2026-01-27T01:14:03.191Z | DEBG | test_vpcs (dropshot_internal): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
authenticated = true
local_addr = 127.0.0.1:46983
method = POST
remote_addr = 127.0.0.1:35831
req_id = e732c62e-7ad6-4f01-90e8-3c398e9a1ce3
resource = Database
result = Ok(())
type = user_builtin
uri = /metrics/producers
user_builtin_id = 001de000-05e4-4000-8000-000000000002
|
| 3502 | 2026-01-27T01:14:03.200Z | TRAC | test_vpcs (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 719060a6-12ac-470c-bb91-e566c7f997b2
sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_f64\n(\n timeseries_name String,\n timeseries_key UInt64,\n timestamp DateTime64(9, 'UTC'),\n datum Nullable(Float64)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
|
| 3503 | 2026-01-27T01:14:03.211Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = inventory_collection
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 3504 | 2026-01-27T01:14:03.216Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Modify
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = inventory_collection
resource = Inventory
result = Ok(())
|
| 3505 | 2026-01-27T01:14:03.216Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = inventory_collection
resource = Database
|
| 3506 | 2026-01-27T01:14:03.216Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = inventory_collection
roles = RoleSet { roles: {} }
|
| 3507 | 2026-01-27T01:14:03.217Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = inventory_collection
resource = Database
result = Ok(())
|
| 3508 | 2026-01-27T01:14:03.219Z | INFO | test_vpcs (dropshot_internal): request completed
error_message_external = Service Unavailable
error_message_internal = no Oximeter instances available for assignment
latency_us = 48859
local_addr = 127.0.0.1:46983
method = POST
remote_addr = 127.0.0.1:35831
req_id = e732c62e-7ad6-4f01-90e8-3c398e9a1ce3
response_code = 503
uri = /metrics/producers
|
| 3509 | 2026-01-27T01:14:03.219Z | TRAC | test_vpcs (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 719060a6-12ac-470c-bb91-e566c7f997b2
sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_string\n(\n timeseries_name String,\n timeseries_key UInt64,\n timestamp DateTime64(9, 'UTC'),\n datum Nullable(String)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
|
| 3510 | 2026-01-27T01:14:03.220Z | DEBG | test_vpcs (producer-registration-task): client response
result = Ok(Response { url: "http://127.0.0.1:46983/metrics/producers", status: 503, headers: {"content-type": "application/json", "x-request-id": "e732c62e-7ad6-4f01-90e8-3c398e9a1ce3", "content-length": "133", "date": "Tue, 27 Jan 2026 01:14:03 GMT"} })
|
| 3511 | 2026-01-27T01:14:03.222Z | WARN | test_vpcs (producer-registration-task): failed to register with Nexus, will retry
count = 1
delay = 876.568527ms
error = "Error Response: status: 503 Service Unavailable; headers: {\\"content-type\\": \\"application/json\\", \\"x-request-id\\": \\"e732c62e-7ad6-4f01-90e8-3c398e9a1ce3\\", \\"content-length\\": \\"133\\", \\"date\\": \\"Tue, 27 Jan 2026 01:14:03 GMT\\"}; value: Error { error_code: Some(\\"ServiceNotAvailable\\"), message: \\"Service Unavailable\\", request_id: \\"e732c62e-7ad6-4f01-90e8-3c398e9a1ce3\\" }"
file = oximeter/producer/src/lib.rs:371
|
| 3512 | 2026-01-27T01:14:03.224Z | TRAC | test_vpcs (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 719060a6-12ac-470c-bb91-e566c7f997b2
sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_bytes\n(\n timeseries_name String,\n timeseries_key UInt64,\n timestamp DateTime64(9, 'UTC'),\n /*\n * NOTE: Right now we can't unambiguously record a nullable byte array.\n * Arrays cannot be nested in `Nullable()` types, and encoding the array as\n * a string isn't palatable for a few reasons.\n * See: https://github.com/oxidecomputer/omicron/issues/4551 for more\n * details.\n */\n datum Array(UInt8)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
|
| 3513 | 2026-01-27T01:14:03.233Z | TRAC | test_vpcs (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 719060a6-12ac-470c-bb91-e566c7f997b2
sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_cumulativei64\n(\n timeseries_name String,\n timeseries_key UInt64,\n start_time DateTime64(9, 'UTC'),\n timestamp DateTime64(9, 'UTC'),\n datum Nullable(Int64)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, start_time, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
|
| 3514 | 2026-01-27T01:14:03.242Z | TRAC | test_vpcs (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 719060a6-12ac-470c-bb91-e566c7f997b2
sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_cumulativeu64\n(\n timeseries_name String,\n timeseries_key UInt64,\n start_time DateTime64(9, 'UTC'),\n timestamp DateTime64(9, 'UTC'),\n datum Nullable(UInt64)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, start_time, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
|
| 3515 | 2026-01-27T01:14:03.249Z | TRAC | test_vpcs (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 719060a6-12ac-470c-bb91-e566c7f997b2
sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_cumulativef32\n(\n timeseries_name String,\n timeseries_key UInt64,\n start_time DateTime64(9, 'UTC'),\n timestamp DateTime64(9, 'UTC'),\n datum Nullable(Float32)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, start_time, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
|
| 3516 | 2026-01-27T01:14:03.253Z | TRAC | test_vpcs (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 719060a6-12ac-470c-bb91-e566c7f997b2
sql = \n\n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_cumulativef64\n(\n timeseries_name String,\n timeseries_key UInt64,\n start_time DateTime64(9, 'UTC'),\n timestamp DateTime64(9, 'UTC'),\n datum Nullable(Float64)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, start_time, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
|
| 3517 | 2026-01-27T01:14:03.256Z | TRAC | test_vpcs (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 719060a6-12ac-470c-bb91-e566c7f997b2
sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_histogrami8\n(\n timeseries_name String,\n timeseries_key UInt64,\n start_time DateTime64(9, 'UTC'),\n timestamp DateTime64(9, 'UTC'),\n /*\n * NOTE: Array types cannot be Nullable, see\n * https://clickhouse.com/docs/en/sql-reference/data-types/nullable\n * for more details.\n *\n * This means we need to use empty arrays to indicate a missing value. This\n * is unfortunate, and at this point relies on the fact that an\n * `oximeter::Histogram` cannot have zero bins. If that changes, we'll need\n * to figure out another way to represent missing samples here.\n */\n bins Array(Int8),\n counts Array(UInt64),\n min Int8,\n max Int8,\n sum_of_samples Int64,\n squared_mean Float64,\n p50_marker_heights Array(Float64),\n p50_marker_positions Array(UInt64),\n p50_desired_marker_positions Array(Float64),\n p90_marker_heights Array(Float64),\n p90_marker_positions Array(UInt64),\n p90_desired_marker_positions Array(Float64),\n p99_marker_heights Array(Float64),\n p99_marker_positions Array(UInt64),\n p99_desired_marker_positions Array(Float64)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, start_time, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
|
| 3518 | 2026-01-27T01:14:03.269Z | TRAC | test_vpcs (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 719060a6-12ac-470c-bb91-e566c7f997b2
sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_histogramu8\n(\n timeseries_name String,\n timeseries_key UInt64,\n start_time DateTime64(9, 'UTC'),\n timestamp DateTime64(9, 'UTC'),\n bins Array(UInt8),\n counts Array(UInt64),\n min UInt8,\n max UInt8,\n sum_of_samples Int64,\n squared_mean Float64,\n p50_marker_heights Array(Float64),\n p50_marker_positions Array(UInt64),\n p50_desired_marker_positions Array(Float64),\n p90_marker_heights Array(Float64),\n p90_marker_positions Array(UInt64),\n p90_desired_marker_positions Array(Float64),\n p99_marker_heights Array(Float64),\n p99_marker_positions Array(UInt64),\n p99_desired_marker_positions Array(Float64)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, start_time, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
|
| 3519 | 2026-01-27T01:14:03.277Z | TRAC | test_vpcs (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 719060a6-12ac-470c-bb91-e566c7f997b2
sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_histogrami16\n(\n timeseries_name String,\n timeseries_key UInt64,\n start_time DateTime64(9, 'UTC'),\n timestamp DateTime64(9, 'UTC'),\n bins Array(Int16),\n counts Array(UInt64),\n min Int16,\n max Int16,\n sum_of_samples Int64,\n squared_mean Float64,\n p50_marker_heights Array(Float64),\n p50_marker_positions Array(UInt64),\n p50_desired_marker_positions Array(Float64),\n p90_marker_heights Array(Float64),\n p90_marker_positions Array(UInt64),\n p90_desired_marker_positions Array(Float64),\n p99_marker_heights Array(Float64),\n p99_marker_positions Array(UInt64),\n p99_desired_marker_positions Array(Float64)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, start_time, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
|
| 3520 | 2026-01-27T01:14:03.297Z | TRAC | test_vpcs (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 719060a6-12ac-470c-bb91-e566c7f997b2
sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_histogramu16\n(\n timeseries_name String,\n timeseries_key UInt64,\n start_time DateTime64(9, 'UTC'),\n timestamp DateTime64(9, 'UTC'),\n bins Array(UInt16),\n counts Array(UInt64),\n min UInt16,\n max UInt16,\n sum_of_samples Int64,\n squared_mean Float64,\n p50_marker_heights Array(Float64),\n p50_marker_positions Array(UInt64),\n p50_desired_marker_positions Array(Float64),\n p90_marker_heights Array(Float64),\n p90_marker_positions Array(UInt64),\n p90_desired_marker_positions Array(Float64),\n p99_marker_heights Array(Float64),\n p99_marker_positions Array(UInt64),\n p99_desired_marker_positions Array(Float64)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, start_time, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
|
| 3521 | 2026-01-27T01:14:03.311Z | TRAC | test_vpcs (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 719060a6-12ac-470c-bb91-e566c7f997b2
sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_histogrami32\n(\n timeseries_name String,\n timeseries_key UInt64,\n start_time DateTime64(9, 'UTC'),\n timestamp DateTime64(9, 'UTC'),\n bins Array(Int32),\n counts Array(UInt64),\n min Int32,\n max Int32,\n sum_of_samples Int64,\n squared_mean Float64,\n p50_marker_heights Array(Float64),\n p50_marker_positions Array(UInt64),\n p50_desired_marker_positions Array(Float64),\n p90_marker_heights Array(Float64),\n p90_marker_positions Array(UInt64),\n p90_desired_marker_positions Array(Float64),\n p99_marker_heights Array(Float64),\n p99_marker_positions Array(UInt64),\n p99_desired_marker_positions Array(Float64)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, start_time, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
|
| 3522 | 2026-01-27T01:14:03.342Z | TRAC | test_vpcs (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 719060a6-12ac-470c-bb91-e566c7f997b2
sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_histogramu32\n(\n timeseries_name String,\n timeseries_key UInt64,\n start_time DateTime64(9, 'UTC'),\n timestamp DateTime64(9, 'UTC'),\n bins Array(UInt32),\n counts Array(UInt64),\n min UInt32,\n max UInt32,\n sum_of_samples Int64,\n squared_mean Float64,\n p50_marker_heights Array(Float64),\n p50_marker_positions Array(UInt64),\n p50_desired_marker_positions Array(Float64),\n p90_marker_heights Array(Float64),\n p90_marker_positions Array(UInt64),\n p90_desired_marker_positions Array(Float64),\n p99_marker_heights Array(Float64),\n p99_marker_positions Array(UInt64),\n p99_desired_marker_positions Array(Float64)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, start_time, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
|
| 3523 | 2026-01-27T01:14:03.353Z | TRAC | test_vpcs (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 719060a6-12ac-470c-bb91-e566c7f997b2
sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_histogrami64\n(\n timeseries_name String,\n timeseries_key UInt64,\n start_time DateTime64(9, 'UTC'),\n timestamp DateTime64(9, 'UTC'),\n bins Array(Int64),\n counts Array(UInt64),\n min Int64,\n max Int64,\n sum_of_samples Int64,\n squared_mean Float64,\n p50_marker_heights Array(Float64),\n p50_marker_positions Array(UInt64),\n p50_desired_marker_positions Array(Float64),\n p90_marker_heights Array(Float64),\n p90_marker_positions Array(UInt64),\n p90_desired_marker_positions Array(Float64),\n p99_marker_heights Array(Float64),\n p99_marker_positions Array(UInt64),\n p99_desired_marker_positions Array(Float64)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, start_time, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
|
| 3524 | 2026-01-27T01:14:03.367Z | TRAC | test_vpcs (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 719060a6-12ac-470c-bb91-e566c7f997b2
sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_histogramu64\n(\n timeseries_name String,\n timeseries_key UInt64,\n start_time DateTime64(9, 'UTC'),\n timestamp DateTime64(9, 'UTC'),\n bins Array(UInt64),\n counts Array(UInt64),\n min UInt64,\n max UInt64,\n sum_of_samples Int64,\n squared_mean Float64,\n p50_marker_heights Array(Float64),\n p50_marker_positions Array(UInt64),\n p50_desired_marker_positions Array(Float64),\n p90_marker_heights Array(Float64),\n p90_marker_positions Array(UInt64),\n p90_desired_marker_positions Array(Float64),\n p99_marker_heights Array(Float64),\n p99_marker_positions Array(UInt64),\n p99_desired_marker_positions Array(Float64)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, start_time, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
|
| 3525 | 2026-01-27T01:14:03.375Z | TRAC | test_vpcs (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 719060a6-12ac-470c-bb91-e566c7f997b2
sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_histogramf32\n(\n timeseries_name String,\n timeseries_key UInt64,\n start_time DateTime64(9, 'UTC'),\n timestamp DateTime64(9, 'UTC'),\n bins Array(Float32),\n counts Array(UInt64),\n min Float32,\n max Float32,\n sum_of_samples Float64,\n squared_mean Float64,\n p50_marker_heights Array(Float64),\n p50_marker_positions Array(UInt64),\n p50_desired_marker_positions Array(Float64),\n p90_marker_heights Array(Float64),\n p90_marker_positions Array(UInt64),\n p90_desired_marker_positions Array(Float64),\n p99_marker_heights Array(Float64),\n p99_marker_positions Array(UInt64),\n p99_desired_marker_positions Array(Float64)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, start_time, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
|
| 3526 | 2026-01-27T01:14:03.395Z | TRAC | test_vpcs (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 719060a6-12ac-470c-bb91-e566c7f997b2
sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_histogramf64\n(\n timeseries_name String,\n timeseries_key UInt64,\n start_time DateTime64(9, 'UTC'),\n timestamp DateTime64(9, 'UTC'),\n bins Array(Float64),\n counts Array(UInt64),\n min Float64,\n max Float64,\n sum_of_samples Float64,\n squared_mean Float64,\n p50_marker_heights Array(Float64),\n p50_marker_positions Array(UInt64),\n p50_desired_marker_positions Array(Float64),\n p90_marker_heights Array(Float64),\n p90_marker_positions Array(UInt64),\n p90_desired_marker_positions Array(Float64),\n p99_marker_heights Array(Float64),\n p99_marker_positions Array(UInt64),\n p99_desired_marker_positions Array(Float64)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, start_time, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
|
| 3527 | 2026-01-27T01:14:03.405Z | TRAC | test_vpcs (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 719060a6-12ac-470c-bb91-e566c7f997b2
sql = \n\n/* The field tables store named dimensions of each timeseries.\n *\n * As with the measurement tables, there is one field table for each field data\n * type. Fields are deduplicated by using the "replacing merge tree", though\n * this behavior **must not** be relied upon for query correctness.\n *\n * The index for the fields differs from the measurements, however. Rows are\n * sorted by timeseries name, then field name, field value, and finally\n * timeseries key. This reflects the most common pattern for looking them up:\n * by field name and possibly value, within a timeseries. The resulting keys are\n * usually then used to look up measurements.\n *\n * NOTE: We may want to consider a secondary index on these tables, sorting by\n * timeseries name and then key, since it would improve lookups where one\n * already has the key. Realistically though, these tables are quite small and\n * so performance benefits will be low in absolute terms.\n *\n * TTL: We use a materialized column to expire old field table records. This\n * column is generated automatically by the database whenever a new row is\n * inserted. It cannot be inserted directly, nor is it returned in a `SELECT *`\n * query. Since these tables are `ReplacingMergeTree`s, that means the last\n * record will remain during a deduplication, which will have the last\n * timestamp. ClickHouse will then expire old data for us, similar to the\n * measurement tables.\n */\nCREATE TABLE IF NOT EXISTS oximeter.fields_bool\n(\n timeseries_name String,\n timeseries_key UInt64,\n field_name String,\n field_value Bool,\n last_updated_at DateTime MATERIALIZED now()\n)\nENGINE = ReplacingMergeTree()\nORDER BY (timeseries_name, field_name, field_value, timeseries_key)\nTTL last_updated_at + INTERVAL 30 DAY
|
| 3528 | 2026-01-27T01:14:03.410Z | TRAC | test_vpcs (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 719060a6-12ac-470c-bb91-e566c7f997b2
sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.fields_i8\n(\n timeseries_name String,\n timeseries_key UInt64,\n field_name String,\n field_value Int8,\n last_updated_at DateTime MATERIALIZED now()\n)\nENGINE = ReplacingMergeTree()\nORDER BY (timeseries_name, field_name, field_value, timeseries_key)\nTTL last_updated_at + INTERVAL 30 DAY
|
| 3529 | 2026-01-27T01:14:03.414Z | TRAC | test_vpcs (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 719060a6-12ac-470c-bb91-e566c7f997b2
sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.fields_u8\n(\n timeseries_name String,\n timeseries_key UInt64,\n field_name String,\n field_value UInt8,\n last_updated_at DateTime MATERIALIZED now()\n)\nENGINE = ReplacingMergeTree()\nORDER BY (timeseries_name, field_name, field_value, timeseries_key)\nTTL last_updated_at + INTERVAL 30 DAY
|
| 3530 | 2026-01-27T01:14:03.421Z | TRAC | test_vpcs (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 719060a6-12ac-470c-bb91-e566c7f997b2
sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.fields_i16\n(\n timeseries_name String,\n timeseries_key UInt64,\n field_name String,\n field_value Int16,\n last_updated_at DateTime MATERIALIZED now()\n)\nENGINE = ReplacingMergeTree()\nORDER BY (timeseries_name, field_name, field_value, timeseries_key)\nTTL last_updated_at + INTERVAL 30 DAY
|
| 3531 | 2026-01-27T01:14:03.449Z | TRAC | test_vpcs (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 719060a6-12ac-470c-bb91-e566c7f997b2
sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.fields_u16\n(\n timeseries_name String,\n timeseries_key UInt64,\n field_name String,\n field_value UInt16,\n last_updated_at DateTime MATERIALIZED now()\n)\nENGINE = ReplacingMergeTree()\nORDER BY (timeseries_name, field_name, field_value, timeseries_key)\nTTL last_updated_at + INTERVAL 30 DAY
|
| 3532 | 2026-01-27T01:14:03.462Z | TRAC | test_vpcs (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 719060a6-12ac-470c-bb91-e566c7f997b2
sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.fields_i32\n(\n timeseries_name String,\n timeseries_key UInt64,\n field_name String,\n field_value Int32,\n last_updated_at DateTime MATERIALIZED now()\n)\nENGINE = ReplacingMergeTree()\nORDER BY (timeseries_name, field_name, field_value, timeseries_key)\nTTL last_updated_at + INTERVAL 30 DAY
|
| 3533 | 2026-01-27T01:14:03.468Z | TRAC | test_vpcs (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 719060a6-12ac-470c-bb91-e566c7f997b2
sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.fields_u32\n(\n timeseries_name String,\n timeseries_key UInt64,\n field_name String,\n field_value UInt32,\n last_updated_at DateTime MATERIALIZED now()\n)\nENGINE = ReplacingMergeTree()\nORDER BY (timeseries_name, field_name, field_value, timeseries_key)\nTTL last_updated_at + INTERVAL 30 DAY
|
| 3534 | 2026-01-27T01:14:03.486Z | TRAC | test_vpcs (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 719060a6-12ac-470c-bb91-e566c7f997b2
sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.fields_i64\n(\n timeseries_name String,\n timeseries_key UInt64,\n field_name String,\n field_value Int64,\n last_updated_at DateTime MATERIALIZED now()\n)\nENGINE = ReplacingMergeTree()\nORDER BY (timeseries_name, field_name, field_value, timeseries_key)\nTTL last_updated_at + INTERVAL 30 DAY
|
| 3535 | 2026-01-27T01:14:03.541Z | TRAC | test_vpcs (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 719060a6-12ac-470c-bb91-e566c7f997b2
sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.fields_u64\n(\n timeseries_name String,\n timeseries_key UInt64,\n field_name String,\n field_value UInt64,\n last_updated_at DateTime MATERIALIZED now()\n)\nENGINE = ReplacingMergeTree()\nORDER BY (timeseries_name, field_name, field_value, timeseries_key)\nTTL last_updated_at + INTERVAL 30 DAY
|
| 3536 | 2026-01-27T01:14:03.561Z | TRAC | test_vpcs (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 719060a6-12ac-470c-bb91-e566c7f997b2
sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.fields_ipaddr\n(\n timeseries_name String,\n timeseries_key UInt64,\n field_name String,\n field_value IPv6,\n last_updated_at DateTime MATERIALIZED now()\n)\nENGINE = ReplacingMergeTree()\nORDER BY (timeseries_name, field_name, field_value, timeseries_key)\nTTL last_updated_at + INTERVAL 30 DAY
|
| 3537 | 2026-01-27T01:14:03.574Z | TRAC | test_vpcs (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 719060a6-12ac-470c-bb91-e566c7f997b2
sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.fields_string\n(\n timeseries_name String,\n timeseries_key UInt64,\n field_name String,\n field_value String,\n last_updated_at DateTime MATERIALIZED now()\n)\nENGINE = ReplacingMergeTree()\nORDER BY (timeseries_name, field_name, field_value, timeseries_key)\nTTL last_updated_at + INTERVAL 30 DAY
|
| 3538 | 2026-01-27T01:14:03.593Z | TRAC | test_vpcs (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 719060a6-12ac-470c-bb91-e566c7f997b2
sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.fields_uuid\n(\n timeseries_name String,\n timeseries_key UInt64,\n field_name String,\n field_value UUID,\n last_updated_at DateTime MATERIALIZED now()\n)\nENGINE = ReplacingMergeTree()\nORDER BY (timeseries_name, field_name, field_value, timeseries_key)\nTTL last_updated_at + INTERVAL 30 DAY
|
| 3539 | 2026-01-27T01:14:03.610Z | TRAC | test_vpcs (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 719060a6-12ac-470c-bb91-e566c7f997b2
sql = \n\n/* The timeseries schema table stores the extracted schema for the samples\n * oximeter collects.\n */\nCREATE TABLE IF NOT EXISTS oximeter.timeseries_schema\n(\n timeseries_name String,\n fields Nested(\n name String,\n type Enum(\n 'Bool' = 1,\n 'I64' = 2,\n 'IpAddr' = 3,\n 'String' = 4,\n 'Uuid' = 6,\n 'I8' = 7,\n 'U8' = 8,\n 'I16' = 9,\n 'U16' = 10,\n 'I32' = 11,\n 'U32' = 12,\n 'U64' = 13\n ),\n source Enum(\n 'Target' = 1,\n 'Metric' = 2\n )\n ),\n datum_type Enum(\n 'Bool' = 1,\n 'I64' = 2,\n 'F64' = 3,\n 'String' = 4,\n 'Bytes' = 5,\n 'CumulativeI64' = 6,\n 'CumulativeF64' = 7,\n 'HistogramI64' = 8,\n 'HistogramF64' = 9,\n 'I8' = 10,\n 'U8' = 11,\n 'I16' = 12,\n 'U16' = 13,\n 'I32' = 14,\n 'U32' = 15,\n 'U64' = 16,\n 'F32' = 17,\n 'CumulativeU64' = 18,\n 'CumulativeF32' = 19,\n 'HistogramI8' = 20,\n 'HistogramU8' = 21,\n 'HistogramI16' = 22,\n 'HistogramU16' = 23,\n 'HistogramI32' = 24,\n 'HistogramU32' = 25,\n 'HistogramU64' = 26,\n 'HistogramF32' = 27\n ),\n created DateTime64(9, 'UTC')\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, fields.name)
|
| 3540 | 2026-01-27T01:14:03.617Z | INFO | test_vpcs (clickhouse-client): inserting current version
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
file = oximeter/db/src/client/mod.rs:831
id = 719060a6-12ac-470c-bb91-e566c7f997b2
version = 14
|
| 3541 | 2026-01-27T01:14:03.617Z | TRAC | test_vpcs (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 719060a6-12ac-470c-bb91-e566c7f997b2
sql = INSERT INTO oximeter.version (*) VALUES (14, now());
|
| 3542 | 2026-01-27T01:14:03.625Z | DEBG | test_vpcs (clickhouse-client): registered USDT probes
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 4751cf52-7dde-4a54-919f-14f8550f8912
|
| 3543 | 2026-01-27T01:14:03.626Z | DEBG | test_vpcs (dropshot): registered endpoint
local_addr = [::1]:46496
method = GET
path = /info
versions = all
|
| 3544 | 2026-01-27T01:14:03.626Z | DEBG | test_vpcs (dropshot): registered endpoint
local_addr = [::1]:46496
method = GET
path = /producers
versions = all
|
| 3545 | 2026-01-27T01:14:03.626Z | DEBG | test_vpcs (dropshot): registered endpoint
local_addr = [::1]:46496
method = DELETE
path = /producers/{producer_id}
versions = all
|
| 3546 | 2026-01-27T01:14:03.626Z | DEBG | test_vpcs (dropshot): registered endpoint
local_addr = [::1]:46496
method = GET
path = /producers/{producer_id}
versions = all
|
| 3547 | 2026-01-27T01:14:03.626Z | INFO | test_vpcs (dropshot): listening
file = /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.6/src/server.rs:328
local_addr = [::1]:46496
|
| 3548 | 2026-01-27T01:14:03.627Z | DEBG | test_vpcs (dropshot): successfully registered DTrace USDT probes
local_addr = [::1]:46496
|
| 3549 | 2026-01-27T01:14:03.629Z | DEBG | test_vpcs (oximeter): registered USDT probes
|
| 3550 | 2026-01-27T01:14:03.629Z | DEBG | test_vpcs (oximeter): contacting nexus
|
| 3551 | 2026-01-27T01:14:04.563Z | DEBG | test_vpcs (oximeter): client request
body = Some(Body)
method = POST
uri = http://127.0.0.1:46983/metrics/collectors
|
| 3552 | 2026-01-27T01:14:04.564Z | DEBG | test_vpcs (producer-registration-task): will register with Nexus at 127.0.0.1:46983
|
| 3553 | 2026-01-27T01:14:04.715Z | DEBG | test_vpcs (producer-registration-task): client request
body = Some(Body)
method = POST
uri = http://127.0.0.1:46983/metrics/producers
|
| 3554 | 2026-01-27T01:14:04.720Z | INFO | test_vpcs (dropshot_internal): accepted connection
local_addr = 127.0.0.1:46983
remote_addr = 127.0.0.1:62470
|
| 3555 | 2026-01-27T01:14:04.720Z | INFO | test_vpcs (dropshot_internal): accepted connection
local_addr = 127.0.0.1:46983
remote_addr = 127.0.0.1:41164
|
| 3556 | 2026-01-27T01:14:04.721Z | TRAC | test_vpcs (results-sink): batch interval expired, but no samples to insert
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
|
| 3557 | 2026-01-27T01:14:04.721Z | TRAC | test_vpcs (results-sink-cluster): batch interval expired, but no samples to insert
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
|
| 3558 | 2026-01-27T01:14:04.723Z | TRAC | test_vpcs (dropshot_internal): incoming request
local_addr = 127.0.0.1:46983
method = POST
remote_addr = 127.0.0.1:41164
req_id = 33575175-ea69-4604-9c23-1eb857774614
uri = /metrics/producers
|
| 3559 | 2026-01-27T01:14:04.723Z | DEBG | test_vpcs (dropshot_internal): determined request API version
local_addr = 127.0.0.1:46983
method = POST
remote_addr = 127.0.0.1:41164
req_id = 33575175-ea69-4604-9c23-1eb857774614
uri = /metrics/producers
version = 1.0.0
|
| 3560 | 2026-01-27T01:14:04.724Z | TRAC | test_vpcs (dropshot_internal): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
authenticated = true
local_addr = 127.0.0.1:46983
method = POST
remote_addr = 127.0.0.1:41164
req_id = 33575175-ea69-4604-9c23-1eb857774614
resource = Database
type = user_builtin
uri = /metrics/producers
user_builtin_id = 001de000-05e4-4000-8000-000000000002
|
| 3561 | 2026-01-27T01:14:04.724Z | DEBG | test_vpcs (dropshot_internal): roles
authenticated = true
local_addr = 127.0.0.1:46983
method = POST
remote_addr = 127.0.0.1:41164
req_id = 33575175-ea69-4604-9c23-1eb857774614
roles = RoleSet { roles: {} }
type = user_builtin
uri = /metrics/producers
user_builtin_id = 001de000-05e4-4000-8000-000000000002
|
| 3562 | 2026-01-27T01:14:04.725Z | DEBG | test_vpcs (dropshot_internal): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
authenticated = true
local_addr = 127.0.0.1:46983
method = POST
remote_addr = 127.0.0.1:41164
req_id = 33575175-ea69-4604-9c23-1eb857774614
resource = Database
result = Ok(())
type = user_builtin
uri = /metrics/producers
user_builtin_id = 001de000-05e4-4000-8000-000000000002
|
| 3563 | 2026-01-27T01:14:04.729Z | TRAC | test_vpcs (dropshot_internal): incoming request
local_addr = 127.0.0.1:46983
method = POST
remote_addr = 127.0.0.1:62470
req_id = 74918082-4350-4d86-87c0-2d7ce79a9ee7
uri = /metrics/collectors
|
| 3564 | 2026-01-27T01:14:04.729Z | DEBG | test_vpcs (dropshot_internal): determined request API version
local_addr = 127.0.0.1:46983
method = POST
remote_addr = 127.0.0.1:62470
req_id = 74918082-4350-4d86-87c0-2d7ce79a9ee7
uri = /metrics/collectors
version = 1.0.0
|
| 3565 | 2026-01-27T01:14:04.729Z | TRAC | test_vpcs (dropshot_internal): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
authenticated = true
local_addr = 127.0.0.1:46983
method = POST
remote_addr = 127.0.0.1:62470
req_id = 74918082-4350-4d86-87c0-2d7ce79a9ee7
resource = Database
type = user_builtin
uri = /metrics/collectors
user_builtin_id = 001de000-05e4-4000-8000-000000000002
|
| 3566 | 2026-01-27T01:14:04.729Z | DEBG | test_vpcs (dropshot_internal): roles
authenticated = true
local_addr = 127.0.0.1:46983
method = POST
remote_addr = 127.0.0.1:62470
req_id = 74918082-4350-4d86-87c0-2d7ce79a9ee7
roles = RoleSet { roles: {} }
type = user_builtin
uri = /metrics/collectors
user_builtin_id = 001de000-05e4-4000-8000-000000000002
|
| 3567 | 2026-01-27T01:14:04.730Z | DEBG | test_vpcs (dropshot_internal): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
authenticated = true
local_addr = 127.0.0.1:46983
method = POST
remote_addr = 127.0.0.1:62470
req_id = 74918082-4350-4d86-87c0-2d7ce79a9ee7
resource = Database
result = Ok(())
type = user_builtin
uri = /metrics/collectors
user_builtin_id = 001de000-05e4-4000-8000-000000000002
|
| 3568 | 2026-01-27T01:14:04.740Z | INFO | test_vpcs (nexus): registered new oximeter metric collection server
address = [::1]:46496
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
|
| 3569 | 2026-01-27T01:14:04.740Z | INFO | test_vpcs (dropshot_internal): request completed
latency_us = 11201
local_addr = 127.0.0.1:46983
method = POST
remote_addr = 127.0.0.1:62470
req_id = 74918082-4350-4d86-87c0-2d7ce79a9ee7
response_code = 204
uri = /metrics/collectors
|
| 3570 | 2026-01-27T01:14:04.741Z | DEBG | test_vpcs (oximeter): client response
result = Ok(Response { url: "http://127.0.0.1:46983/metrics/collectors", status: 204, headers: {"x-request-id": "74918082-4350-4d86-87c0-2d7ce79a9ee7", "date": "Tue, 27 Jan 2026 01:14:04 GMT"} })
|
| 3571 | 2026-01-27T01:14:04.741Z | INFO | test_vpcs (oximeter): oximeter registered with nexus
file = oximeter/collector/src/lib.rs:427
id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
|
| 3572 | 2026-01-27T01:14:04.741Z | DEBG | test_vpcs (init_with_steps): Running step start_producer_server
|
| 3573 | 2026-01-27T01:14:04.741Z | DEBG | test_vpcs: Starting test metric Producer Server
|
| 3574 | 2026-01-27T01:14:04.748Z | INFO | test_vpcs (external client test context): client request
body = Body { inner: BoxBody }
method = POST
uri = http://127.0.0.1:50372/v1/projects
|
| 3575 | 2026-01-27T01:14:04.749Z | INFO | test_vpcs (oximeter-agent): starting refresh list task
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
file = oximeter/collector/src/agent.rs:554
|
| 3576 | 2026-01-27T01:14:04.841Z | INFO | test_vpcs (nexus): assigned collector to new producer
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
producer_id = 913233fe-92a8-4635-9572-183f495429c4
|
| 3577 | 2026-01-27T01:14:04.841Z | INFO | test_vpcs (dropshot_internal): request completed
latency_us = 118179
local_addr = 127.0.0.1:46983
method = POST
remote_addr = 127.0.0.1:41164
req_id = 33575175-ea69-4604-9c23-1eb857774614
response_code = 201
uri = /metrics/producers
|
| 3578 | 2026-01-27T01:14:04.842Z | INFO | test_vpcs (dropshot_internal): accepted connection
local_addr = 127.0.0.1:46983
remote_addr = 127.0.0.1:53398
|
| 3579 | 2026-01-27T01:14:04.842Z | INFO | test_vpcs (dropshot_external): accepted connection
local_addr = 127.0.0.1:50372
remote_addr = 127.0.0.1:38658
|
| 3580 | 2026-01-27T01:14:04.843Z | INFO | test_vpcs (oximeter-agent): refreshing list of producers from Nexus
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
file = oximeter/collector/src/agent.rs:557
|
| 3581 | 2026-01-27T01:14:04.843Z | DEBG | test_vpcs (producer-registration-task): client response
result = Ok(Response { url: "http://127.0.0.1:46983/metrics/producers", status: 201, headers: {"content-type": "application/json", "x-request-id": "33575175-ea69-4604-9c23-1eb857774614", "content-length": "41", "date": "Tue, 27 Jan 2026 01:14:04 GMT"} })
|
| 3582 | 2026-01-27T01:14:04.845Z | DEBG | test_vpcs (producer-registration-task): successfully registered with Nexus, pausing until time to renew lease
lease_duration = 600s
wait_period = 150s
|
| 3583 | 2026-01-27T01:14:04.845Z | DEBG | test_vpcs (oximeter): client request
body = None
method = GET
uri = http://127.0.0.1:46983/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
|
| 3584 | 2026-01-27T01:14:04.846Z | TRAC | test_vpcs (dropshot_internal): incoming request
local_addr = 127.0.0.1:46983
method = GET
remote_addr = 127.0.0.1:62470
req_id = 125e6699-9d36-4957-8dcc-68b47186b6db
uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
|
| 3585 | 2026-01-27T01:14:04.846Z | DEBG | test_vpcs (dropshot_internal): determined request API version
local_addr = 127.0.0.1:46983
method = GET
remote_addr = 127.0.0.1:62470
req_id = 125e6699-9d36-4957-8dcc-68b47186b6db
uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
version = 1.0.0
|
| 3586 | 2026-01-27T01:14:04.846Z | TRAC | test_vpcs (dropshot_internal): incoming request
local_addr = 127.0.0.1:46983
method = POST
remote_addr = 127.0.0.1:53398
req_id = becee102-7514-448f-90b4-4f5614168a06
uri = /metrics/producers
|
| 3587 | 2026-01-27T01:14:04.847Z | DEBG | test_vpcs (dropshot_internal): determined request API version
local_addr = 127.0.0.1:46983
method = POST
remote_addr = 127.0.0.1:53398
req_id = becee102-7514-448f-90b4-4f5614168a06
uri = /metrics/producers
version = 1.0.0
|
| 3588 | 2026-01-27T01:14:04.852Z | TRAC | test_vpcs (dropshot_internal): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
authenticated = true
local_addr = 127.0.0.1:46983
method = GET
remote_addr = 127.0.0.1:62470
req_id = 125e6699-9d36-4957-8dcc-68b47186b6db
resource = Database
type = user_builtin
uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
user_builtin_id = 001de000-05e4-4000-8000-000000000002
|
| 3589 | 2026-01-27T01:14:04.852Z | DEBG | test_vpcs (dropshot_internal): roles
authenticated = true
local_addr = 127.0.0.1:46983
method = GET
remote_addr = 127.0.0.1:62470
req_id = 125e6699-9d36-4957-8dcc-68b47186b6db
roles = RoleSet { roles: {} }
type = user_builtin
uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
user_builtin_id = 001de000-05e4-4000-8000-000000000002
|
| 3590 | 2026-01-27T01:14:04.853Z | DEBG | test_vpcs (dropshot_internal): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
authenticated = true
local_addr = 127.0.0.1:46983
method = GET
remote_addr = 127.0.0.1:62470
req_id = 125e6699-9d36-4957-8dcc-68b47186b6db
resource = Database
result = Ok(())
type = user_builtin
uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
user_builtin_id = 001de000-05e4-4000-8000-000000000002
|
| 3591 | 2026-01-27T01:14:04.855Z | TRAC | test_vpcs (dropshot_internal): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
authenticated = true
local_addr = 127.0.0.1:46983
method = POST
remote_addr = 127.0.0.1:53398
req_id = becee102-7514-448f-90b4-4f5614168a06
resource = Database
type = user_builtin
uri = /metrics/producers
user_builtin_id = 001de000-05e4-4000-8000-000000000002
|
| 3592 | 2026-01-27T01:14:04.855Z | DEBG | test_vpcs (dropshot_internal): roles
authenticated = true
local_addr = 127.0.0.1:46983
method = POST
remote_addr = 127.0.0.1:53398
req_id = becee102-7514-448f-90b4-4f5614168a06
roles = RoleSet { roles: {} }
type = user_builtin
uri = /metrics/producers
user_builtin_id = 001de000-05e4-4000-8000-000000000002
|
| 3593 | 2026-01-27T01:14:04.855Z | DEBG | test_vpcs (dropshot_internal): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
authenticated = true
local_addr = 127.0.0.1:46983
method = POST
remote_addr = 127.0.0.1:53398
req_id = becee102-7514-448f-90b4-4f5614168a06
resource = Database
result = Ok(())
type = user_builtin
uri = /metrics/producers
user_builtin_id = 001de000-05e4-4000-8000-000000000002
|
| 3594 | 2026-01-27T01:14:04.858Z | TRAC | test_vpcs (dropshot_external): incoming request
local_addr = 127.0.0.1:50372
method = POST
remote_addr = 127.0.0.1:38658
req_id = 080f25fb-73f3-4a96-a048-da3d85194d7a
uri = /v1/projects
|
| 3595 | 2026-01-27T01:14:04.858Z | DEBG | test_vpcs (dropshot_external): determined request API version
local_addr = 127.0.0.1:50372
method = POST
remote_addr = 127.0.0.1:38658
req_id = 080f25fb-73f3-4a96-a048-da3d85194d7a
uri = /v1/projects
version = 2026012300.0.0
|
| 3596 | 2026-01-27T01:14:04.858Z | TRAC | test_vpcs (dropshot_external): authn: trying Spoof
local_addr = 127.0.0.1:50372
method = POST
remote_addr = 127.0.0.1:38658
req_id = 080f25fb-73f3-4a96-a048-da3d85194d7a
uri = /v1/projects
|
| 3597 | 2026-01-27T01:14:04.858Z | DEBG | test_vpcs (dropshot_external): looking up silo for user
local_addr = 127.0.0.1:50372
method = POST
remote_addr = 127.0.0.1:38658
req_id = 080f25fb-73f3-4a96-a048-da3d85194d7a
silo_user_id = 001de000-05e4-4000-8000-000000004007
uri = /v1/projects
|
| 3598 | 2026-01-27T01:14:04.858Z | TRAC | test_vpcs (ExternalAuthn): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. })
resource = Database
|
| 3599 | 2026-01-27T01:14:04.858Z | DEBG | test_vpcs (ExternalAuthn): roles
roles = RoleSet { roles: {} }
|
| 3600 | 2026-01-27T01:14:04.859Z | DEBG | test_vpcs (ExternalAuthn): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 3601 | 2026-01-27T01:14:04.866Z | INFO | test_vpcs (dropshot_internal): request completed
latency_us = 20010
local_addr = 127.0.0.1:46983
method = GET
remote_addr = 127.0.0.1:62470
req_id = 125e6699-9d36-4957-8dcc-68b47186b6db
response_code = 200
uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
|
| 3602 | 2026-01-27T01:14:04.867Z | DEBG | test_vpcs (oximeter): client response
result = Ok(Response { url: "http://127.0.0.1:46983/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending", status: 200, headers: {"content-type": "application/json", "x-request-id": "125e6699-9d36-4957-8dcc-68b47186b6db", "content-length": "286", "date": "Tue, 27 Jan 2026 01:14:04 GMT"} })
|
| 3603 | 2026-01-27T01:14:04.868Z | DEBG | test_vpcs (oximeter): client request
body = None
method = GET
uri = http://127.0.0.1:46983/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiI5MTMyMzNmZS05MmE4LTQ2MzUtOTU3Mi0xODNmNDk1NDI5YzQifX0%3D
|
| 3604 | 2026-01-27T01:14:04.868Z | TRAC | test_vpcs (ExternalAuthn): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. })
resource = Database
|
| 3605 | 2026-01-27T01:14:04.868Z | DEBG | test_vpcs (ExternalAuthn): roles
roles = RoleSet { roles: {} }
|
| 3606 | 2026-01-27T01:14:04.869Z | DEBG | test_vpcs (ExternalAuthn): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 3607 | 2026-01-27T01:14:04.873Z | TRAC | test_vpcs (dropshot_internal): incoming request
local_addr = 127.0.0.1:46983
method = GET
remote_addr = 127.0.0.1:62470
req_id = e1e90e33-7777-42e1-8f13-ae7cedb78d74
uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiI5MTMyMzNmZS05MmE4LTQ2MzUtOTU3Mi0xODNmNDk1NDI5YzQifX0%3D
|
| 3608 | 2026-01-27T01:14:04.873Z | DEBG | test_vpcs (dropshot_internal): determined request API version
local_addr = 127.0.0.1:46983
method = GET
remote_addr = 127.0.0.1:62470
req_id = e1e90e33-7777-42e1-8f13-ae7cedb78d74
uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiI5MTMyMzNmZS05MmE4LTQ2MzUtOTU3Mi0xODNmNDk1NDI5YzQifX0%3D
version = 1.0.0
|
| 3609 | 2026-01-27T01:14:04.883Z | TRAC | test_vpcs (dropshot_internal): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
authenticated = true
local_addr = 127.0.0.1:46983
method = GET
remote_addr = 127.0.0.1:62470
req_id = e1e90e33-7777-42e1-8f13-ae7cedb78d74
resource = Database
type = user_builtin
uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiI5MTMyMzNmZS05MmE4LTQ2MzUtOTU3Mi0xODNmNDk1NDI5YzQifX0%3D
user_builtin_id = 001de000-05e4-4000-8000-000000000002
|
| 3610 | 2026-01-27T01:14:04.883Z | DEBG | test_vpcs (dropshot_internal): roles
authenticated = true
local_addr = 127.0.0.1:46983
method = GET
remote_addr = 127.0.0.1:62470
req_id = e1e90e33-7777-42e1-8f13-ae7cedb78d74
roles = RoleSet { roles: {} }
type = user_builtin
uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiI5MTMyMzNmZS05MmE4LTQ2MzUtOTU3Mi0xODNmNDk1NDI5YzQifX0%3D
user_builtin_id = 001de000-05e4-4000-8000-000000000002
|
| 3611 | 2026-01-27T01:14:04.887Z | DEBG | test_vpcs (dropshot_internal): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
authenticated = true
local_addr = 127.0.0.1:46983
method = GET
remote_addr = 127.0.0.1:62470
req_id = e1e90e33-7777-42e1-8f13-ae7cedb78d74
resource = Database
result = Ok(())
type = user_builtin
uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiI5MTMyMzNmZS05MmE4LTQ2MzUtOTU3Mi0xODNmNDk1NDI5YzQifX0%3D
user_builtin_id = 001de000-05e4-4000-8000-000000000002
|
| 3612 | 2026-01-27T01:14:04.888Z | TRAC | test_vpcs (ExternalAuthn): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. })
resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007 (silo_user), lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
|
| 3613 | 2026-01-27T01:14:04.888Z | TRAC | test_vpcs (ExternalAuthn): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. }
resource_id = 001de000-5110-4000-8000-000000000000
resource_type = Silo
|
| 3614 | 2026-01-27T01:14:04.888Z | TRAC | test_vpcs (ExternalAuthn): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. })
resource = Database
|
| 3615 | 2026-01-27T01:14:04.888Z | DEBG | test_vpcs (ExternalAuthn): roles
roles = RoleSet { roles: {} }
|
| 3616 | 2026-01-27T01:14:04.889Z | DEBG | test_vpcs (ExternalAuthn): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 3617 | 2026-01-27T01:14:04.895Z | TRAC | test_vpcs (ExternalAuthn): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 3618 | 2026-01-27T01:14:04.898Z | TRAC | test_vpcs (ExternalAuthn): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. })
resource = Database
|
| 3619 | 2026-01-27T01:14:04.898Z | DEBG | test_vpcs (ExternalAuthn): roles
roles = RoleSet { roles: {} }
|
| 3620 | 2026-01-27T01:14:04.899Z | DEBG | test_vpcs (ExternalAuthn): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 3621 | 2026-01-27T01:14:04.901Z | INFO | test_vpcs (dropshot_internal): request completed
latency_us = 28479
local_addr = 127.0.0.1:46983
method = GET
remote_addr = 127.0.0.1:62470
req_id = e1e90e33-7777-42e1-8f13-ae7cedb78d74
response_code = 200
uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiI5MTMyMzNmZS05MmE4LTQ2MzUtOTU3Mi0xODNmNDk1NDI5YzQifX0%3D
|
| 3622 | 2026-01-27T01:14:04.905Z | DEBG | test_vpcs (oximeter): client response
result = Ok(Response { url: "http://127.0.0.1:46983/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiI5MTMyMzNmZS05MmE4LTQ2MzUtOTU3Mi0xODNmNDk1NDI5YzQifX0%3D", status: 200, headers: {"content-type": "application/json", "x-request-id": "e1e90e33-7777-42e1-8f13-ae7cedb78d74", "content-length": "29", "date": "Tue, 27 Jan 2026 01:14:04 GMT"} })
|
| 3623 | 2026-01-27T01:14:04.905Z | DEBG | test_vpcs (oximeter-agent): registered new metric producer
address = 127.0.0.1:62938
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
producer_id = 913233fe-92a8-4635-9572-183f495429c4
|
| 3624 | 2026-01-27T01:14:04.905Z | INFO | test_vpcs (oximeter-agent): refreshed list of producers from Nexus
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
file = oximeter/collector/src/agent.rs:632
n_current_tasks = 1
n_pruned_tasks = 0
|
| 3625 | 2026-01-27T01:14:04.982Z | TRAC | test_vpcs (collection-task): top of inner collection loop, waiting for next request
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
producer_id = 913233fe-92a8-4635-9572-183f495429c4
producer_ip = 127.0.0.1
producer_port = 62938
|
| 3626 | 2026-01-27T01:14:04.983Z | DEBG | test_vpcs (ExternalAuthn): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
|
| 3627 | 2026-01-27T01:14:04.987Z | DEBG | test_vpcs (ExternalAuthn): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. })
resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007 (silo_user), lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
result = Ok(())
|
| 3628 | 2026-01-27T01:14:04.987Z | TRAC | test_vpcs (ExternalAuthn): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. })
resource = Database
|
| 3629 | 2026-01-27T01:14:04.987Z | DEBG | test_vpcs (ExternalAuthn): roles
roles = RoleSet { roles: {} }
|
| 3630 | 2026-01-27T01:14:04.988Z | DEBG | test_vpcs (ExternalAuthn): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 3631 | 2026-01-27T01:14:04.990Z | INFO | test_vpcs (nexus): assigned collector to new producer
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
producer_id = a6458b7d-87c3-4483-be96-854d814c20de
|
| 3632 | 2026-01-27T01:14:04.991Z | INFO | test_vpcs (dropshot_internal): request completed
latency_us = 144085
local_addr = 127.0.0.1:46983
method = POST
remote_addr = 127.0.0.1:53398
req_id = becee102-7514-448f-90b4-4f5614168a06
response_code = 201
uri = /metrics/producers
|
| 3633 | 2026-01-27T01:14:04.992Z | DEBG | test_vpcs (collection-task): reporting oximeter self-collection statistics
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
producer_id = 913233fe-92a8-4635-9572-183f495429c4
producer_ip = 127.0.0.1
producer_port = 62938
|
| 3634 | 2026-01-27T01:14:04.993Z | DEBG | test_vpcs (collection-task): sent timer-based collection request to the collection task
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
producer_id = 913233fe-92a8-4635-9572-183f495429c4
producer_ip = 127.0.0.1
producer_port = 62938
|
| 3635 | 2026-01-27T01:14:05.001Z | DEBG | test_vpcs (collection-task): collecting from producer
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
producer_id = 913233fe-92a8-4635-9572-183f495429c4
producer_ip = 127.0.0.1
producer_port = 62938
|
| 3636 | 2026-01-27T01:14:05.003Z | INFO | test_vpcs (dropshot): accepted connection
file = /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.6/src/server.rs:1025
local_addr = 127.0.0.1:62938
remote_addr = 127.0.0.1:54278
|
| 3637 | 2026-01-27T01:14:05.004Z | TRAC | test_vpcs (ExternalAuthn): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. })
resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
|
| 3638 | 2026-01-27T01:14:05.005Z | TRAC | test_vpcs (ExternalAuthn): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. }
resource_id = 001de000-5110-4000-8000-000000000000
resource_type = Silo
|
| 3639 | 2026-01-27T01:14:05.005Z | TRAC | test_vpcs (ExternalAuthn): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. })
resource = Database
|
| 3640 | 2026-01-27T01:14:05.005Z | DEBG | test_vpcs (ExternalAuthn): roles
roles = RoleSet { roles: {} }
|
| 3641 | 2026-01-27T01:14:05.005Z | DEBG | test_vpcs (ExternalAuthn): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 3642 | 2026-01-27T01:14:05.008Z | TRAC | test_vpcs (dropshot): incoming request
local_addr = 127.0.0.1:62938
method = GET
remote_addr = 127.0.0.1:54278
req_id = 61a93a76-56a9-4498-bb3b-5549e4562abc
uri = /913233fe-92a8-4635-9572-183f495429c4
|
| 3643 | 2026-01-27T01:14:05.029Z | INFO | test_vpcs (dropshot): request completed
file = /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.6/src/server.rs:867
latency_us = 21292
local_addr = 127.0.0.1:62938
method = GET
remote_addr = 127.0.0.1:54278
req_id = 61a93a76-56a9-4498-bb3b-5549e4562abc
response_code = 200
uri = /913233fe-92a8-4635-9572-183f495429c4
|
| 3644 | 2026-01-27T01:14:05.032Z | TRAC | test_vpcs (collection-task): sent collection request to producer
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
producer_id = 913233fe-92a8-4635-9572-183f495429c4
producer_ip = 127.0.0.1
producer_port = 62938
|
| 3645 | 2026-01-27T01:14:05.067Z | DEBG | test_vpcs (collection-task): collected results from producer
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
n_results = 5
producer_id = 913233fe-92a8-4635-9572-183f495429c4
producer_ip = 127.0.0.1
producer_port = 62938
|
| 3646 | 2026-01-27T01:14:05.067Z | TRAC | test_vpcs (collection-task): forwarded results to main collection loop
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
producer_id = 913233fe-92a8-4635-9572-183f495429c4
producer_ip = 127.0.0.1
producer_port = 62938
|
| 3647 | 2026-01-27T01:14:05.067Z | TRAC | test_vpcs (collection-task): top of inner collection loop, waiting for next request
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
producer_id = 913233fe-92a8-4635-9572-183f495429c4
producer_ip = 127.0.0.1
producer_port = 62938
|
| 3648 | 2026-01-27T01:14:05.068Z | DEBG | test_vpcs (results-sink): inserting 19 samples into database
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
|
| 3649 | 2026-01-27T01:14:05.068Z | DEBG | test_vpcs (results-sink-cluster): inserting 19 samples into database
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
|
| 3650 | 2026-01-27T01:14:05.069Z | TRAC | test_vpcs (ExternalAuthn): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 3651 | 2026-01-27T01:14:05.069Z | TRAC | test_vpcs (ExternalAuthn): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. })
resource = Database
|
| 3652 | 2026-01-27T01:14:05.069Z | DEBG | test_vpcs (ExternalAuthn): roles
roles = RoleSet { roles: {} }
|
| 3653 | 2026-01-27T01:14:05.070Z | DEBG | test_vpcs (ExternalAuthn): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 3654 | 2026-01-27T01:14:05.074Z | DEBG | test_vpcs (clickhouse-client): unrolling 19 total samples
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 719060a6-12ac-470c-bb91-e566c7f997b2
|
| 3655 | 2026-01-27T01:14:05.075Z | DEBG | test_vpcs (clickhouse-client): retrieving timeseries schema from database
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 719060a6-12ac-470c-bb91-e566c7f997b2
|
| 3656 | 2026-01-27T01:14:05.075Z | TRAC | test_vpcs (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 719060a6-12ac-470c-bb91-e566c7f997b2
sql = SELECT * FROM oximeter.timeseries_schema FORMAT Native;
|
| 3657 | 2026-01-27T01:14:05.079Z | TRAC | test_vpcs (clickhouse-client): no new timeseries schema in database
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 719060a6-12ac-470c-bb91-e566c7f997b2
|
| 3658 | 2026-01-27T01:14:05.080Z | DEBG | test_vpcs (clickhouse-client): new timeseries schema
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 719060a6-12ac-470c-bb91-e566c7f997b2
schema = TimeseriesSchema { timeseries_name: TimeseriesName("oximeter_collector:collections"), description: TimeseriesDescription { target: "", metric: "" }, field_schema: {FieldSchema { name: "base_route", field_type: String, source: Metric, description: "" }, FieldSchema { name: "collector_id", field_type: Uuid, source: Target, description: "" }, FieldSchema { name: "collector_ip", field_type: IpAddr, source: Target, description: "" }, FieldSchema { name: "collector_port", field_type: U16, source: Target, description: "" }, FieldSchema { name: "producer_id", field_type: Uuid, source: Metric, description: "" }, FieldSchema { name: "producer_ip", field_type: IpAddr, source: Metric, description: "" }, FieldSchema { name: "producer_port", field_type: U16, source: Metric, description: "" }}, datum_type: CumulativeU64, version: 1, authz_scope: Fleet, units: Count, created: 2026-01-27T01:14:05.075244811Z }
timeseries_name = oximeter_collector:collections
|
| 3659 | 2026-01-27T01:14:05.081Z | DEBG | test_vpcs (clickhouse-client): retrieving timeseries schema from database
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 719060a6-12ac-470c-bb91-e566c7f997b2
|
| 3660 | 2026-01-27T01:14:05.081Z | TRAC | test_vpcs (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 719060a6-12ac-470c-bb91-e566c7f997b2
sql = SELECT * FROM oximeter.timeseries_schema WHERE timeseries_name NOT IN ('oximeter_collector:collections') FORMAT Native;
|
| 3661 | 2026-01-27T01:14:05.084Z | DEBG | test_vpcs (ExternalAuthn): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
|
| 3662 | 2026-01-27T01:14:05.089Z | DEBG | test_vpcs (ExternalAuthn): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. })
resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
result = Ok(())
|
| 3663 | 2026-01-27T01:14:05.089Z | TRAC | test_vpcs (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }, device_token_expiration: None, credential_id: None }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [Spoof] })
local_addr = 127.0.0.1:50372
method = POST
remote_addr = 127.0.0.1:38658
req_id = 080f25fb-73f3-4a96-a048-da3d85194d7a
uri = /v1/projects
|
| 3664 | 2026-01-27T01:14:05.089Z | TRAC | test_vpcs (dropshot_external): authorize begin
action = CreateChild
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
local_addr = 127.0.0.1:50372
method = POST
remote_addr = 127.0.0.1:38658
req_id = 080f25fb-73f3-4a96-a048-da3d85194d7a
resource = AuditLog
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
uri = /v1/projects
|
| 3665 | 2026-01-27T01:14:05.089Z | TRAC | test_vpcs (dropshot_external): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }
authenticated = true
local_addr = 127.0.0.1:50372
method = POST
remote_addr = 127.0.0.1:38658
req_id = 080f25fb-73f3-4a96-a048-da3d85194d7a
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
uri = /v1/projects
|
| 3666 | 2026-01-27T01:14:05.089Z | TRAC | test_vpcs (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
local_addr = 127.0.0.1:50372
method = POST
remote_addr = 127.0.0.1:38658
req_id = 080f25fb-73f3-4a96-a048-da3d85194d7a
resource = Database
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
uri = /v1/projects
|
| 3667 | 2026-01-27T01:14:05.089Z | DEBG | test_vpcs (dropshot_external): roles
authenticated = true
local_addr = 127.0.0.1:50372
method = POST
remote_addr = 127.0.0.1:38658
req_id = 080f25fb-73f3-4a96-a048-da3d85194d7a
roles = RoleSet { roles: {} }
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
uri = /v1/projects
|
| 3668 | 2026-01-27T01:14:05.089Z | DEBG | test_vpcs (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
local_addr = 127.0.0.1:50372
method = POST
remote_addr = 127.0.0.1:38658
req_id = 080f25fb-73f3-4a96-a048-da3d85194d7a
resource = Database
result = Ok(())
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
uri = /v1/projects
|
| 3669 | 2026-01-27T01:14:05.139Z | TRAC | test_vpcs (clickhouse-client): no new timeseries schema in database
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 719060a6-12ac-470c-bb91-e566c7f997b2
|
| 3670 | 2026-01-27T01:14:05.139Z | DEBG | test_vpcs (clickhouse-client): new timeseries schema
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 719060a6-12ac-470c-bb91-e566c7f997b2
schema = TimeseriesSchema { timeseries_name: TimeseriesName("http_service:request_latency_histogram"), description: TimeseriesDescription { target: "", metric: "" }, field_schema: {FieldSchema { name: "id", field_type: Uuid, source: Target, description: "" }, FieldSchema { name: "name", field_type: String, source: Target, description: "" }, FieldSchema { name: "operation_id", field_type: String, source: Metric, description: "" }, FieldSchema { name: "status_code", field_type: U16, source: Metric, description: "" }}, datum_type: HistogramU64, version: 1, authz_scope: Fleet, units: Count, created: 2026-01-27T01:14:05.081189619Z }
timeseries_name = http_service:request_latency_histogram
|
| 3671 | 2026-01-27T01:14:05.148Z | DEBG | test_vpcs (clickhouse-client): retrieving timeseries schema from database
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 719060a6-12ac-470c-bb91-e566c7f997b2
|
| 3672 | 2026-01-27T01:14:05.149Z | TRAC | test_vpcs (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 719060a6-12ac-470c-bb91-e566c7f997b2
sql = SELECT * FROM oximeter.timeseries_schema WHERE timeseries_name NOT IN ('http_service:request_latency_histogram', 'oximeter_collector:collections') FORMAT Native;
|
| 3673 | 2026-01-27T01:14:05.154Z | DEBG | test_vpcs (dropshot_external): roles
authenticated = true
local_addr = 127.0.0.1:50372
method = POST
remote_addr = 127.0.0.1:38658
req_id = 080f25fb-73f3-4a96-a048-da3d85194d7a
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
uri = /v1/projects
|
| 3674 | 2026-01-27T01:14:05.157Z | DEBG | test_vpcs (dropshot_external): authorize result
action = CreateChild
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
local_addr = 127.0.0.1:50372
method = POST
remote_addr = 127.0.0.1:38658
req_id = 080f25fb-73f3-4a96-a048-da3d85194d7a
resource = AuditLog
result = Ok(())
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
uri = /v1/projects
|
| 3675 | 2026-01-27T01:14:05.158Z | TRAC | test_vpcs (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
local_addr = 127.0.0.1:50372
method = POST
remote_addr = 127.0.0.1:38658
req_id = 080f25fb-73f3-4a96-a048-da3d85194d7a
resource = Database
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
uri = /v1/projects
|
| 3676 | 2026-01-27T01:14:05.158Z | DEBG | test_vpcs (dropshot_external): roles
authenticated = true
local_addr = 127.0.0.1:50372
method = POST
remote_addr = 127.0.0.1:38658
req_id = 080f25fb-73f3-4a96-a048-da3d85194d7a
roles = RoleSet { roles: {} }
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
uri = /v1/projects
|
| 3677 | 2026-01-27T01:14:05.159Z | DEBG | test_vpcs (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
local_addr = 127.0.0.1:50372
method = POST
remote_addr = 127.0.0.1:38658
req_id = 080f25fb-73f3-4a96-a048-da3d85194d7a
resource = Database
result = Ok(())
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
uri = /v1/projects
|
| 3678 | 2026-01-27T01:14:05.165Z | TRAC | test_vpcs (clickhouse-client): no new timeseries schema in database
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 719060a6-12ac-470c-bb91-e566c7f997b2
|
| 3679 | 2026-01-27T01:14:05.166Z | DEBG | test_vpcs (clickhouse-client): new timeseries schema
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 719060a6-12ac-470c-bb91-e566c7f997b2
schema = TimeseriesSchema { timeseries_name: TimeseriesName("collection_target:cpus_provisioned"), description: TimeseriesDescription { target: "", metric: "" }, field_schema: {FieldSchema { name: "id", field_type: Uuid, source: Target, description: "" }}, datum_type: I64, version: 1, authz_scope: Fleet, units: Count, created: 2026-01-27T01:14:05.148800623Z }
timeseries_name = collection_target:cpus_provisioned
|
| 3680 | 2026-01-27T01:14:05.167Z | DEBG | test_vpcs (clickhouse-client): retrieving timeseries schema from database
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 719060a6-12ac-470c-bb91-e566c7f997b2
|
| 3681 | 2026-01-27T01:14:05.167Z | TRAC | test_vpcs (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 719060a6-12ac-470c-bb91-e566c7f997b2
sql = SELECT * FROM oximeter.timeseries_schema WHERE timeseries_name NOT IN ('collection_target:cpus_provisioned', 'http_service:request_latency_histogram', 'oximeter_collector:collections') FORMAT Native;
|
| 3682 | 2026-01-27T01:14:05.171Z | TRAC | test_vpcs (clickhouse-client): no new timeseries schema in database
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 719060a6-12ac-470c-bb91-e566c7f997b2
|
| 3683 | 2026-01-27T01:14:05.171Z | DEBG | test_vpcs (clickhouse-client): new timeseries schema
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 719060a6-12ac-470c-bb91-e566c7f997b2
schema = TimeseriesSchema { timeseries_name: TimeseriesName("collection_target:ram_provisioned"), description: TimeseriesDescription { target: "", metric: "" }, field_schema: {FieldSchema { name: "id", field_type: Uuid, source: Target, description: "" }}, datum_type: I64, version: 1, authz_scope: Fleet, units: Count, created: 2026-01-27T01:14:05.167132554Z }
timeseries_name = collection_target:ram_provisioned
|
| 3684 | 2026-01-27T01:14:05.172Z | DEBG | test_vpcs (clickhouse-client): retrieving timeseries schema from database
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 719060a6-12ac-470c-bb91-e566c7f997b2
|
| 3685 | 2026-01-27T01:14:05.172Z | TRAC | test_vpcs (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 719060a6-12ac-470c-bb91-e566c7f997b2
sql = SELECT * FROM oximeter.timeseries_schema WHERE timeseries_name NOT IN ('collection_target:cpus_provisioned', 'collection_target:ram_provisioned', 'http_service:request_latency_histogram', 'oximeter_collector:collections') FORMAT Native;
|
| 3686 | 2026-01-27T01:14:05.175Z | WARN | test_vpcs (results-sink-cluster): failed to insert some results into metric DB
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
error = Failed to check out connection to database: No backends found for this service
file = oximeter/collector/src/results_sink.rs:92
|
| 3687 | 2026-01-27T01:14:05.175Z | TRAC | test_vpcs (clickhouse-client): no new timeseries schema in database
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 719060a6-12ac-470c-bb91-e566c7f997b2
|
| 3688 | 2026-01-27T01:14:05.175Z | DEBG | test_vpcs (clickhouse-client): new timeseries schema
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 719060a6-12ac-470c-bb91-e566c7f997b2
schema = TimeseriesSchema { timeseries_name: TimeseriesName("collection_target:virtual_disk_space_provisioned"), description: TimeseriesDescription { target: "", metric: "" }, field_schema: {FieldSchema { name: "id", field_type: Uuid, source: Target, description: "" }}, datum_type: I64, version: 1, authz_scope: Fleet, units: Count, created: 2026-01-27T01:14:05.172305766Z }
timeseries_name = collection_target:virtual_disk_space_provisioned
|
| 3689 | 2026-01-27T01:14:05.184Z | DEBG | test_vpcs (clickhouse-client): inserting 5 new timeseries schema
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 719060a6-12ac-470c-bb91-e566c7f997b2
|
| 3690 | 2026-01-27T01:14:05.184Z | TRAC | test_vpcs (clickhouse-client): inserting data
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 719060a6-12ac-470c-bb91-e566c7f997b2
n_columns = 6
n_rows = 5
sql = INSERT INTO oximeter.timeseries_schema FORMAT Native
|
| 3691 | 2026-01-27T01:14:05.197Z | TRAC | test_vpcs (clickhouse-client): inserting data
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 719060a6-12ac-470c-bb91-e566c7f997b2
n_columns = 4
n_rows = 2
sql = INSERT INTO oximeter.fields_ipaddr FORMAT Native
|
| 3692 | 2026-01-27T01:14:05.203Z | DEBG | test_vpcs (clickhouse-client): inserted rows into table
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 719060a6-12ac-470c-bb91-e566c7f997b2
n_rows = 2
table_name = fields_ipaddr
|
| 3693 | 2026-01-27T01:14:05.203Z | TRAC | test_vpcs (clickhouse-client): inserting data
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 719060a6-12ac-470c-bb91-e566c7f997b2
n_columns = 4
n_rows = 13
sql = INSERT INTO oximeter.fields_string FORMAT Native
|
| 3694 | 2026-01-27T01:14:05.211Z | DEBG | test_vpcs (clickhouse-client): inserted rows into table
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 719060a6-12ac-470c-bb91-e566c7f997b2
n_rows = 13
table_name = fields_string
|
| 3695 | 2026-01-27T01:14:05.211Z | TRAC | test_vpcs (clickhouse-client): inserting data
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 719060a6-12ac-470c-bb91-e566c7f997b2
n_columns = 4
n_rows = 8
sql = INSERT INTO oximeter.fields_u16 FORMAT Native
|
| 3696 | 2026-01-27T01:14:05.240Z | DEBG | test_vpcs (clickhouse-client): inserted rows into table
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 719060a6-12ac-470c-bb91-e566c7f997b2
n_rows = 8
table_name = fields_u16
|
| 3697 | 2026-01-27T01:14:05.240Z | TRAC | test_vpcs (clickhouse-client): inserting data
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 719060a6-12ac-470c-bb91-e566c7f997b2
n_columns = 4
n_rows = 20
sql = INSERT INTO oximeter.fields_uuid FORMAT Native
|
| 3698 | 2026-01-27T01:14:05.256Z | DEBG | test_vpcs (clickhouse-client): inserted rows into table
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 719060a6-12ac-470c-bb91-e566c7f997b2
n_rows = 20
table_name = fields_uuid
|
| 3699 | 2026-01-27T01:14:05.256Z | TRAC | test_vpcs (clickhouse-client): inserting data
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 719060a6-12ac-470c-bb91-e566c7f997b2
n_columns = 5
n_rows = 1
sql = INSERT INTO oximeter.measurements_cumulativeu64 FORMAT Native
|
| 3700 | 2026-01-27T01:14:05.268Z | DEBG | test_vpcs (clickhouse-client): inserted rows into table
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 719060a6-12ac-470c-bb91-e566c7f997b2
n_rows = 1
table_name = measurements_cumulativeu64
|
| 3701 | 2026-01-27T01:14:05.268Z | TRAC | test_vpcs (clickhouse-client): inserting data
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 719060a6-12ac-470c-bb91-e566c7f997b2
n_columns = 19
n_rows = 6
sql = INSERT INTO oximeter.measurements_histogramu64 FORMAT Native
|
| 3702 | 2026-01-27T01:14:05.273Z | DEBG | test_vpcs (clickhouse-client): inserted rows into table
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 719060a6-12ac-470c-bb91-e566c7f997b2
n_rows = 6
table_name = measurements_histogramu64
|
| 3703 | 2026-01-27T01:14:05.273Z | TRAC | test_vpcs (clickhouse-client): inserting data
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 719060a6-12ac-470c-bb91-e566c7f997b2
n_columns = 4
n_rows = 12
sql = INSERT INTO oximeter.measurements_i64 FORMAT Native
|
| 3704 | 2026-01-27T01:14:05.276Z | DEBG | test_vpcs (clickhouse-client): inserted rows into table
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 719060a6-12ac-470c-bb91-e566c7f997b2
n_rows = 12
table_name = measurements_i64
|
| 3705 | 2026-01-27T01:14:05.276Z | TRAC | test_vpcs (results-sink): successfully inserted samples
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
|
| 3706 | 2026-01-27T01:14:05.355Z | TRAC | test_vpcs (dropshot_external): authorize begin
action = CreateChild
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
local_addr = 127.0.0.1:50372
method = POST
remote_addr = 127.0.0.1:38658
req_id = 080f25fb-73f3-4a96-a048-da3d85194d7a
resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
uri = /v1/projects
|
| 3707 | 2026-01-27T01:14:05.355Z | TRAC | test_vpcs (dropshot_external): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }
authenticated = true
local_addr = 127.0.0.1:50372
method = POST
remote_addr = 127.0.0.1:38658
req_id = 080f25fb-73f3-4a96-a048-da3d85194d7a
resource_id = 001de000-5110-4000-8000-000000000000
resource_type = Silo
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
uri = /v1/projects
|
| 3708 | 2026-01-27T01:14:05.355Z | TRAC | test_vpcs (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
local_addr = 127.0.0.1:50372
method = POST
remote_addr = 127.0.0.1:38658
req_id = 080f25fb-73f3-4a96-a048-da3d85194d7a
resource = Database
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
uri = /v1/projects
|
| 3709 | 2026-01-27T01:14:05.355Z | DEBG | test_vpcs (dropshot_external): roles
authenticated = true
local_addr = 127.0.0.1:50372
method = POST
remote_addr = 127.0.0.1:38658
req_id = 080f25fb-73f3-4a96-a048-da3d85194d7a
roles = RoleSet { roles: {} }
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
uri = /v1/projects
|
| 3710 | 2026-01-27T01:14:05.374Z | DEBG | test_vpcs (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
local_addr = 127.0.0.1:50372
method = POST
remote_addr = 127.0.0.1:38658
req_id = 080f25fb-73f3-4a96-a048-da3d85194d7a
resource = Database
result = Ok(())
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
uri = /v1/projects
|
| 3711 | 2026-01-27T01:14:05.394Z | TRAC | test_vpcs (dropshot_external): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }
authenticated = true
local_addr = 127.0.0.1:50372
method = POST
remote_addr = 127.0.0.1:38658
req_id = 080f25fb-73f3-4a96-a048-da3d85194d7a
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
uri = /v1/projects
|
| 3712 | 2026-01-27T01:14:05.394Z | TRAC | test_vpcs (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
local_addr = 127.0.0.1:50372
method = POST
remote_addr = 127.0.0.1:38658
req_id = 080f25fb-73f3-4a96-a048-da3d85194d7a
resource = Database
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
uri = /v1/projects
|
| 3713 | 2026-01-27T01:14:05.394Z | DEBG | test_vpcs (dropshot_external): roles
authenticated = true
local_addr = 127.0.0.1:50372
method = POST
remote_addr = 127.0.0.1:38658
req_id = 080f25fb-73f3-4a96-a048-da3d85194d7a
roles = RoleSet { roles: {} }
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
uri = /v1/projects
|
| 3714 | 2026-01-27T01:14:05.398Z | DEBG | test_vpcs (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
local_addr = 127.0.0.1:50372
method = POST
remote_addr = 127.0.0.1:38658
req_id = 080f25fb-73f3-4a96-a048-da3d85194d7a
resource = Database
result = Ok(())
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
uri = /v1/projects
|
| 3715 | 2026-01-27T01:14:05.406Z | DEBG | test_vpcs (dropshot_external): roles
authenticated = true
local_addr = 127.0.0.1:50372
method = POST
remote_addr = 127.0.0.1:38658
req_id = 080f25fb-73f3-4a96-a048-da3d85194d7a
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} }
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
uri = /v1/projects
|
| 3716 | 2026-01-27T01:14:05.411Z | DEBG | test_vpcs (dropshot_external): authorize result
action = CreateChild
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
local_addr = 127.0.0.1:50372
method = POST
remote_addr = 127.0.0.1:38658
req_id = 080f25fb-73f3-4a96-a048-da3d85194d7a
resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
result = Ok(())
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
uri = /v1/projects
|
| 3717 | 2026-01-27T01:14:05.412Z | INFO | test_vpcs (SagaQuiesceHandle): tracking newly created saga
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
|
| 3718 | 2026-01-27T01:14:05.412Z | INFO | test_vpcs (SagaExecutor): preparing saga
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
saga_name = project-create
|
| 3719 | 2026-01-27T01:14:05.415Z | INFO | test_vpcs (SEC): saga create
dag = {"end_node":21,"graph":{"edge_property":"directed","edges":[[0,1,null],[1,2,null],[3,4,null],[4,5,null],[5,6,null],[6,7,null],[7,8,null],[8,9,null],[9,10,null],[10,11,null],[11,12,null],[12,13,null],[13,14,null],[14,15,null],[15,16,null],[16,17,null],[17,18,null],[2,3,null],[18,19,null],[20,0,null],[19,21,null]],"node_holes":[],"nodes":[{"Action":{"action_name":"project_create.project_create_record","label":"ProjectCreateRecord","name":"project"}},{"Action":{"action_name":"project_create.project_create_vpc_params","label":"ProjectCreateVpcParams","name":"vpc_create_params"}},{"SubsagaStart":{"params_node_name":"vpc_create_params","saga_name":"vpc-create"}},{"Action":{"action_name":"common.uuid_generate","label":"GenerateVpcId","name":"vpc_id"}},{"Action":{"action_name":"common.uuid_generate","label":"GenerateSystemRouterId","name":"system_router_id"}},{"Action":{"action_name":"common.uuid_generate","label":"GenerateDefaultV4RouteId","name":"default_v4_route_id"}},{"Action":{"action_name":"common.uuid_generate","label":"GenerateDefaultV6RouteId","name":"default_v6_route_id"}},{"Action":{"action_name":"common.uuid_generate","label":"GenerateSubnetRouteId","name":"subnet_route_id"}},{"Action":{"action_name":"common.uuid_generate","label":"GenerateDefaultSubnetId","name":"default_subnet_id"}},{"Action":{"action_name":"common.uuid_generate","label":"GenerateDefaultInternetGatewayId","name":"default_internet_gateway_id"}},{"Action":{"action_name":"vpc_create.vpc_create_vpc","label":"VpcCreateVpc","name":"vpc"}},{"Action":{"action_name":"vpc_create.vpc_create_router","label":"VpcCreateRouter","name":"router"}},{"Action":{"action_name":"vpc_create.vpc_create_v4_route","label":"VpcCreateV4Route","name":"route4"}},{"Action":{"action_name":"vpc_create.vpc_create_v6_route","label":"VpcCreateV6Route","name":"route6"}},{"Action":{"action_name":"vpc_create.vpc_create_subnet","label":"VpcCreateSubnet","name":"subnet"}},{"Action":{"action_name":"vpc_create.vpc_create_subnet_route","label":"VpcCreateSubnetRoute","name":"route"}},{"Action":{"action_name":"vpc_create.vpc_update_firewall","label":"VpcUpdateFirewall","name":"firewall"}},{"Action":{"action_name":"vpc_create.vpc_create_gateway","label":"VpcCreateGateway","name":"gateway"}},{"Action":{"action_name":"vpc_create.vpc_notify_sleds","label":"VpcNotifySleds","name":"no_result"}},{"SubsagaEnd":{"name":"vpc"}},{"Start":{"params":{"authz_silo":{"key":"001de000-5110-4000-8000-000000000000","lookup_type":{"ById":"001de000-5110-4000-8000-000000000000"},"parent":null},"project_create":{"description":"a pier","name":"springfield-squidport"},"serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}},"credential_id":null,"device_token_expiration":null},{"mapped_fleet_roles":{}}]}}}}},"End"]},"saga_name":"project-create","start_node":20}
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
saga_name = project-create
sec_id = 913233fe-92a8-4635-9572-183f495429c4
|
| 3720 | 2026-01-27T01:14:05.415Z | INFO | test_vpcs (SecStore): creating saga
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
saga_name = project-create
|
| 3721 | 2026-01-27T01:14:05.429Z | INFO | test_vpcs (SagaExecutor): starting saga
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
saga_name = project-create
|
| 3722 | 2026-01-27T01:14:05.430Z | INFO | test_vpcs (SEC): saga start
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
saga_name = project-create
sec_id = 913233fe-92a8-4635-9572-183f495429c4
|
| 3723 | 2026-01-27T01:14:05.430Z | DEBG | test_vpcs (SEC): saga log event
new_state = N020 started
sec_id = 913233fe-92a8-4635-9572-183f495429c4
|
| 3724 | 2026-01-27T01:14:05.430Z | DEBG | test_vpcs (SecStore): recording saga event
event_type = Started
node_id = 20
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
|
| 3725 | 2026-01-27T01:14:05.486Z | DEBG | test_vpcs (SEC): saga log event
new_state = N020 succeeded
sec_id = 913233fe-92a8-4635-9572-183f495429c4
|
| 3726 | 2026-01-27T01:14:05.487Z | DEBG | test_vpcs (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 20
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
|
| 3727 | 2026-01-27T01:14:05.509Z | DEBG | test_vpcs (SEC): saga log event
new_state = N000 started
sec_id = 913233fe-92a8-4635-9572-183f495429c4
|
| 3728 | 2026-01-27T01:14:05.510Z | DEBG | test_vpcs (SecStore): recording saga event
event_type = Started
node_id = 0
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
|
| 3729 | 2026-01-27T01:14:05.528Z | TRAC | test_vpcs (SagaExecutor): authorize begin
action = CreateChild
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
saga_name = project-create
saga_node = ProjectCreateRecord
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 3730 | 2026-01-27T01:14:05.529Z | TRAC | test_vpcs (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }
authenticated = true
resource_id = 001de000-5110-4000-8000-000000000000
resource_type = Silo
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
saga_name = project-create
saga_node = ProjectCreateRecord
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 3731 | 2026-01-27T01:14:05.529Z | TRAC | test_vpcs (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
saga_name = project-create
saga_node = ProjectCreateRecord
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 3732 | 2026-01-27T01:14:05.529Z | DEBG | test_vpcs (SagaExecutor): roles
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
saga_name = project-create
saga_node = ProjectCreateRecord
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 3733 | 2026-01-27T01:14:05.530Z | DEBG | test_vpcs (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
result = Ok(())
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
saga_name = project-create
saga_node = ProjectCreateRecord
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 3734 | 2026-01-27T01:14:05.540Z | INFO | test_vpcs (BackgroundTasks): inserted inventory collection
background_task = inventory_collection
collection_id = 26e04365-9d11-40b8-b64d-d52efd2ebbc3
|
| 3735 | 2026-01-27T01:14:05.541Z | DEBG | test_vpcs (BackgroundTasks): inventory collection complete
background_task = inventory_collection
collection_id = 26e04365-9d11-40b8-b64d-d52efd2ebbc3
time_started = 2026-01-27 01:14:00.923174 UTC
|
| 3736 | 2026-01-27T01:14:05.541Z | DEBG | test_vpcs (BackgroundTasks): activation complete
background_task = inventory_collection
elapsed = 5.285769344s
iteration = 3
status = {"collection_id":"26e04365-9d11-40b8-b64d-d52efd2ebbc3","time_done":"2026-01-27 01:14:03.187386 UTC","time_started":"2026-01-27 01:14:00.923174 UTC"}
|
| 3737 | 2026-01-27T01:14:05.541Z | DEBG | test_vpcs (BackgroundTasks): activating
background_task = inventory_loader
iteration = 2
reason = Dependency
|
| 3738 | 2026-01-27T01:14:05.541Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = inventory_loader
resource = Inventory
|
| 3739 | 2026-01-27T01:14:05.541Z | TRAC | test_vpcs (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = inventory_loader
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 3740 | 2026-01-27T01:14:05.541Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = inventory_loader
resource = Database
|
| 3741 | 2026-01-27T01:14:05.541Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = inventory_loader
roles = RoleSet { roles: {} }
|
| 3742 | 2026-01-27T01:14:05.541Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = inventory_loader
resource = Database
result = Ok(())
|
| 3743 | 2026-01-27T01:14:05.543Z | DEBG | test_vpcs (BackgroundTasks): activating
background_task = multicast_reconciler
iteration = 2
reason = Dependency
|
| 3744 | 2026-01-27T01:14:05.543Z | TRAC | test_vpcs (BackgroundTasks): multicast group reconciler activating
background_task = multicast_reconciler
|
| 3745 | 2026-01-27T01:14:05.543Z | TRAC | test_vpcs (BackgroundTasks): starting multicast reconciliation pass
background_task = multicast_reconciler
|
| 3746 | 2026-01-27T01:14:05.543Z | INFO | test_vpcs (BackgroundTasks): invalidating multicast caches due to topology change
background_task = multicast_reconciler
|
| 3747 | 2026-01-27T01:14:05.543Z | TRAC | test_vpcs (DnsResolver): lookup_all_socket_v6 srv
dns_name = _dendrite._tcp.control-plane.oxide.internal
|
| 3748 | 2026-01-27T01:14:05.544Z | TRAC | test_vpcs (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }
authenticated = true
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
saga_name = project-create
saga_node = ProjectCreateRecord
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 3749 | 2026-01-27T01:14:05.544Z | TRAC | test_vpcs (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
saga_name = project-create
saga_node = ProjectCreateRecord
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 3750 | 2026-01-27T01:14:05.545Z | DEBG | test_vpcs (SagaExecutor): roles
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
saga_name = project-create
saga_node = ProjectCreateRecord
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 3751 | 2026-01-27T01:14:05.545Z | DEBG | test_vpcs (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
result = Ok(())
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
saga_name = project-create
saga_node = ProjectCreateRecord
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 3752 | 2026-01-27T01:14:05.558Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = inventory_loader
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 3753 | 2026-01-27T01:14:05.569Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = inventory_loader
resource = Inventory
result = Ok(())
|
| 3754 | 2026-01-27T01:14:05.569Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = inventory_loader
resource = Database
|
| 3755 | 2026-01-27T01:14:05.570Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = inventory_loader
roles = RoleSet { roles: {} }
|
| 3756 | 2026-01-27T01:14:05.570Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = inventory_loader
resource = Database
result = Ok(())
|
| 3757 | 2026-01-27T01:14:05.575Z | DEBG | test_vpcs (SagaExecutor): roles
authenticated = true
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} }
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
saga_name = project-create
saga_node = ProjectCreateRecord
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 3758 | 2026-01-27T01:14:05.582Z | DEBG | test_vpcs (SagaExecutor): authorize result
action = CreateChild
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
result = Ok(())
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
saga_name = project-create
saga_node = ProjectCreateRecord
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 3759 | 2026-01-27T01:14:05.583Z | TRAC | test_vpcs (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
saga_name = project-create
saga_node = ProjectCreateRecord
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 3760 | 2026-01-27T01:14:05.583Z | DEBG | test_vpcs (SagaExecutor): roles
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
saga_name = project-create
saga_node = ProjectCreateRecord
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 3761 | 2026-01-27T01:14:05.583Z | DEBG | test_vpcs (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
result = Ok(())
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
saga_name = project-create
saga_node = ProjectCreateRecord
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 3762 | 2026-01-27T01:14:05.587Z | TRAC | test_vpcs (dns): buffer
buffer = Length: 72 (0x48) bytes\n0000: a8 8d 01 00 00 01 00 00 00 00 00 01 09 5f 64 65 ............._de\n0010: 6e 64 72 69 74 65 04 5f 74 63 70 0d 63 6f 6e 74 ndrite._tcp.cont\n0020: 72 6f 6c 2d 70 6c 61 6e 65 05 6f 78 69 64 65 08 rol-plane.oxide.\n0030: 69 6e 74 65 72 6e 61 6c 00 00 21 00 01 00 00 29 internal..!....)\n0040: 04 d0 00 00 00 00 00 00 ........
kind = dns
peer_addr = [::1]:41532
req_id = 89ad338d-1066-47d4-a681-0885a3b4bf9a
|
| 3763 | 2026-01-27T01:14:05.587Z | DEBG | test_vpcs (dns): message_request
kind = dns
mr = MessageRequest {\n header: Header {\n id: 43149,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n queries: Queries {\n queries: [\n LowerQuery {\n name: LowerName(\n Name("_dendrite._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_dendrite._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n ],\n original: [\n 9,\n 95,\n 100,\n 101,\n 110,\n 100,\n 114,\n 105,\n 116,\n 101,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n flags: EdnsFlags {\n dnssec_ok: false,\n z: 0,\n },\n max_payload: 1232,\n options: OPT {\n options: [],\n },\n },\n ),\n}
peer_addr = [::1]:41532
req_id = 89ad338d-1066-47d4-a681-0885a3b4bf9a
|
| 3764 | 2026-01-27T01:14:05.588Z | DEBG | test_vpcs (store): query key
key = _dendrite._tcp
|
| 3765 | 2026-01-27T01:14:05.588Z | DEBG | test_vpcs (store): query key
key = dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host
|
| 3766 | 2026-01-27T01:14:05.588Z | DEBG | test_vpcs (dns): dns response
additional_records = [Record { name_labels: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal"), dns_class: IN, ttl: 0, rdata: AAAA(AAAA(::1)) }]
kind = dns
peer_addr = [::1]:41532
query = LowerQuery { name: LowerName(Name("_dendrite._tcp.control-plane.oxide.internal.")), original: Query { name: Name("_dendrite._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN } }
records = [Record { name_labels: Name("_dendrite._tcp.control-plane.oxide.internal."), dns_class: IN, ttl: 0, rdata: SRV(SRV { priority: 0, weight: 0, port: 53072, target: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal") }) }]
req_id = 89ad338d-1066-47d4-a681-0885a3b4bf9a
|
| 3767 | 2026-01-27T01:14:05.588Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = inventory_loader
resource = Database
|
| 3768 | 2026-01-27T01:14:05.589Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = inventory_loader
roles = RoleSet { roles: {} }
|
| 3769 | 2026-01-27T01:14:05.590Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = inventory_loader
resource = Database
result = Ok(())
|
| 3770 | 2026-01-27T01:14:05.595Z | DEBG | test_vpcs (DnsResolver): lookup_all_socket_v6 srv
dns_name = _dendrite._tcp.control-plane.oxide.internal
response = SrvLookup(Lookup { query: Query { name: Name("_dendrite._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN }, records: [Record { name_labels: Name("_dendrite._tcp.control-plane.oxide.internal."), dns_class: IN, ttl: 0, rdata: SRV(SRV { priority: 0, weight: 0, port: 53072, target: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal.") }) }, Record { name_labels: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."), dns_class: IN, ttl: 0, rdata: AAAA(AAAA(::1)) }], valid_until: Instant { tv_sec: 10287, tv_nsec: 404402519 } })
|
| 3771 | 2026-01-27T01:14:05.595Z | TRAC | test_vpcs (DnsResolver): lookup_service_targets: looking up SRV target
|
| 3772 | 2026-01-27T01:14:05.606Z | TRAC | test_vpcs (dns): buffer
buffer = Length: 108 (0x6c) bytes\n0000: d2 f3 01 00 00 01 00 00 00 00 00 01 2d 64 65 6e ............-den\n0010: 64 72 69 74 65 2d 62 36 64 36 35 33 34 31 2d 31 drite-b6d65341-1\n0020: 36 37 63 2d 34 31 64 66 2d 39 62 35 63 2d 34 31 67c-41df-9b5c-41\n0030: 63 64 65 64 39 39 63 32 32 39 04 68 6f 73 74 0d cded99c229.host.\n0040: 63 6f 6e 74 72 6f 6c 2d 70 6c 61 6e 65 05 6f 78 control-plane.ox\n0050: 69 64 65 08 69 6e 74 65 72 6e 61 6c 00 00 1c 00 ide.internal....\n0060: 01 00 00 29 04 d0 00 00 00 00 00 00 ...)........
kind = dns
peer_addr = [::1]:20083
req_id = 495e253f-a529-4918-aae8-f5a6fdd81e50
|
| 3773 | 2026-01-27T01:14:05.606Z | DEBG | test_vpcs (dns): message_request
kind = dns
mr = MessageRequest {\n header: Header {\n id: 54003,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n queries: Queries {\n queries: [\n LowerQuery {\n name: LowerName(\n Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."),\n query_type: AAAA,\n query_class: IN,\n },\n },\n ],\n original: [\n 45,\n 100,\n 101,\n 110,\n 100,\n 114,\n 105,\n 116,\n 101,\n 45,\n 98,\n 54,\n 100,\n 54,\n 53,\n 51,\n 52,\n 49,\n 45,\n 49,\n 54,\n 55,\n 99,\n 45,\n 52,\n 49,\n 100,\n 102,\n 45,\n 57,\n 98,\n 53,\n 99,\n 45,\n 52,\n 49,\n 99,\n 100,\n 101,\n 100,\n 57,\n 57,\n 99,\n 50,\n 50,\n 57,\n 4,\n 104,\n 111,\n 115,\n 116,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 28,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n flags: EdnsFlags {\n dnssec_ok: false,\n z: 0,\n },\n max_payload: 1232,\n options: OPT {\n options: [],\n },\n },\n ),\n}
peer_addr = [::1]:20083
req_id = 495e253f-a529-4918-aae8-f5a6fdd81e50
|
| 3774 | 2026-01-27T01:14:05.607Z | DEBG | test_vpcs (store): query key
key = dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host
|
| 3775 | 2026-01-27T01:14:05.607Z | DEBG | test_vpcs (dns): dns response
additional_records = []
kind = dns
peer_addr = [::1]:20083
query = LowerQuery { name: LowerName(Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal.")), original: Query { name: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."), query_type: AAAA, query_class: IN } }
records = [Record { name_labels: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."), dns_class: IN, ttl: 0, rdata: AAAA(AAAA(::1)) }]
req_id = 495e253f-a529-4918-aae8-f5a6fdd81e50
|
| 3776 | 2026-01-27T01:14:05.709Z | TRAC | test_vpcs (DpdClient): client request
background_task = multicast_reconciler
body = None
method = GET
uri = http://[::1]:53072/switch/identifiers
|
| 3777 | 2026-01-27T01:14:05.710Z | TRAC | test_vpcs (results-sink): batch interval expired, but no samples to insert
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
|
| 3778 | 2026-01-27T01:14:05.710Z | TRAC | test_vpcs (results-sink-cluster): batch interval expired, but no samples to insert
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
|
| 3779 | 2026-01-27T01:14:05.733Z | TRAC | test_vpcs (DpdClient): client response
background_task = multicast_reconciler
result = Ok(Response { url: "http://[::1]:53072/switch/identifiers", status: 200, headers: {"content-type": "application/json", "x-request-id": "2eed54cb-bb68-4388-8fed-c11443cfbaa9", "content-length": "206", "date": "Tue, 27 Jan 2026 01:14:05 GMT"} })
|
| 3780 | 2026-01-27T01:14:05.734Z | TRAC | test_vpcs (BackgroundTasks): searching for multicast groups
background_task = multicast_reconciler
state = Creating
|
| 3781 | 2026-01-27T01:14:05.735Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = multicast_reconciler
resource = Database
|
| 3782 | 2026-01-27T01:14:05.743Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = multicast_reconciler
roles = RoleSet { roles: {} }
|
| 3783 | 2026-01-27T01:14:05.744Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = multicast_reconciler
resource = Database
result = Ok(())
|
| 3784 | 2026-01-27T01:14:05.758Z | DEBG | test_vpcs (SEC): saga log event
new_state = N000 succeeded
sec_id = 913233fe-92a8-4635-9572-183f495429c4
|
| 3785 | 2026-01-27T01:14:05.758Z | DEBG | test_vpcs (SecStore): recording saga event
event_type = Succeeded(Array [Object {"key": String("a1a9a9c7-9e7e-48b3-8937-c3723503857b"), "lookup_type": Object {"ByName": String("springfield-squidport")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}, Object {"identity": Object {"description": String("a pier"), "id": String("a1a9a9c7-9e7e-48b3-8937-c3723503857b"), "name": String("springfield-squidport"), "time_created": String("2026-01-27T01:14:05.528374Z"), "time_deleted": Null, "time_modified": String("2026-01-27T01:14:05.528374Z")}, "rcgen": Number(1), "silo_id": String("001de000-5110-4000-8000-000000000000")}])
node_id = 0
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
|
| 3786 | 2026-01-27T01:14:05.787Z | DEBG | test_vpcs (SEC): saga log event
new_state = N001 started
sec_id = 913233fe-92a8-4635-9572-183f495429c4
|
| 3787 | 2026-01-27T01:14:05.787Z | DEBG | test_vpcs (SecStore): recording saga event
event_type = Started
node_id = 1
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
|
| 3788 | 2026-01-27T01:14:05.803Z | DEBG | test_vpcs (SEC): saga log event
new_state = N001 succeeded
sec_id = 913233fe-92a8-4635-9572-183f495429c4
|
| 3789 | 2026-01-27T01:14:05.810Z | DEBG | test_vpcs (SecStore): recording saga event
event_type = Succeeded(Object {"authz_project": Object {"key": String("a1a9a9c7-9e7e-48b3-8937-c3723503857b"), "lookup_type": Object {"ByName": String("springfield-squidport")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}, "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}, "credential_id": Null, "device_token_expiration": Null}, Object {"mapped_fleet_roles": Object {}}]}}, "vpc_create": Object {"description": String("Default VPC"), "dns_name": String("default"), "ipv6_prefix": String("fd6f:1fa5:6c45::/48"), "name": String("default")}})
node_id = 1
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
|
| 3790 | 2026-01-27T01:14:05.822Z | DEBG | test_vpcs (SEC): saga log event
new_state = N002 started
sec_id = 913233fe-92a8-4635-9572-183f495429c4
|
| 3791 | 2026-01-27T01:14:05.823Z | DEBG | test_vpcs (SecStore): recording saga event
event_type = Started
node_id = 2
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
|
| 3792 | 2026-01-27T01:14:05.851Z | TRAC | test_vpcs (BackgroundTasks): found multicast groups
background_task = multicast_reconciler
count = 0
state = Creating
|
| 3793 | 2026-01-27T01:14:05.863Z | TRAC | test_vpcs (BackgroundTasks): reconciling member state changes
background_task = multicast_reconciler
|
| 3794 | 2026-01-27T01:14:05.864Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = multicast_reconciler
resource = Database
|
| 3795 | 2026-01-27T01:14:05.864Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = multicast_reconciler
roles = RoleSet { roles: {} }
|
| 3796 | 2026-01-27T01:14:05.865Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = multicast_reconciler
resource = Database
result = Ok(())
|
| 3797 | 2026-01-27T01:14:05.868Z | DEBG | test_vpcs (SEC): saga log event
new_state = N002 succeeded
sec_id = 913233fe-92a8-4635-9572-183f495429c4
|
| 3798 | 2026-01-27T01:14:05.868Z | DEBG | test_vpcs (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 2
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
|
| 3799 | 2026-01-27T01:14:05.896Z | DEBG | test_vpcs (SEC): saga log event
new_state = N003 started
sec_id = 913233fe-92a8-4635-9572-183f495429c4
|
| 3800 | 2026-01-27T01:14:05.896Z | DEBG | test_vpcs (SecStore): recording saga event
event_type = Started
node_id = 3
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
|
| 3801 | 2026-01-27T01:14:05.956Z | DEBG | test_vpcs (SEC): saga log event
new_state = N003 succeeded
sec_id = 913233fe-92a8-4635-9572-183f495429c4
|
| 3802 | 2026-01-27T01:14:05.957Z | DEBG | test_vpcs (SecStore): recording saga event
event_type = Succeeded(String("9702b4b6-b761-4a78-93c1-48a3b0004b27"))
node_id = 3
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
|
| 3803 | 2026-01-27T01:14:05.973Z | DEBG | test_vpcs (SEC): saga log event
new_state = N004 started
sec_id = 913233fe-92a8-4635-9572-183f495429c4
|
| 3804 | 2026-01-27T01:14:05.973Z | DEBG | test_vpcs (SecStore): recording saga event
event_type = Started
node_id = 4
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
|
| 3805 | 2026-01-27T01:14:06.016Z | DEBG | test_vpcs (SEC): saga log event
new_state = N004 succeeded
sec_id = 913233fe-92a8-4635-9572-183f495429c4
|
| 3806 | 2026-01-27T01:14:06.017Z | DEBG | test_vpcs (SecStore): recording saga event
event_type = Succeeded(String("9b4d23dd-a0db-427f-957b-c661053a0cc4"))
node_id = 4
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
|
| 3807 | 2026-01-27T01:14:06.028Z | DEBG | test_vpcs (SEC): saga log event
new_state = N005 started
sec_id = 913233fe-92a8-4635-9572-183f495429c4
|
| 3808 | 2026-01-27T01:14:06.028Z | DEBG | test_vpcs (SecStore): recording saga event
event_type = Started
node_id = 5
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
|
| 3809 | 2026-01-27T01:14:06.033Z | DEBG | test_vpcs (SEC): saga log event
new_state = N005 succeeded
sec_id = 913233fe-92a8-4635-9572-183f495429c4
|
| 3810 | 2026-01-27T01:14:06.033Z | DEBG | test_vpcs (SecStore): recording saga event
event_type = Succeeded(String("02ab13cb-7e3c-4290-85f5-7c4e1cfdbc3f"))
node_id = 5
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
|
| 3811 | 2026-01-27T01:14:06.043Z | DEBG | test_vpcs (SEC): saga log event
new_state = N006 started
sec_id = 913233fe-92a8-4635-9572-183f495429c4
|
| 3812 | 2026-01-27T01:14:06.043Z | DEBG | test_vpcs (SecStore): recording saga event
event_type = Started
node_id = 6
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
|
| 3813 | 2026-01-27T01:14:06.060Z | DEBG | test_vpcs (SEC): saga log event
new_state = N006 succeeded
sec_id = 913233fe-92a8-4635-9572-183f495429c4
|
| 3814 | 2026-01-27T01:14:06.060Z | DEBG | test_vpcs (SecStore): recording saga event
event_type = Succeeded(String("9b7b7a26-0077-4905-8449-e7599aee34cf"))
node_id = 6
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
|
| 3815 | 2026-01-27T01:14:06.069Z | DEBG | test_vpcs (SEC): saga log event
new_state = N007 started
sec_id = 913233fe-92a8-4635-9572-183f495429c4
|
| 3816 | 2026-01-27T01:14:06.070Z | DEBG | test_vpcs (SecStore): recording saga event
event_type = Started
node_id = 7
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
|
| 3817 | 2026-01-27T01:14:06.071Z | DEBG | test_vpcs (BackgroundTasks): member state reconciliation completed
background_task = multicast_reconciler
members_processed = 0
|
| 3818 | 2026-01-27T01:14:06.071Z | TRAC | test_vpcs (BackgroundTasks): cleaning up deleted multicast members
background_task = multicast_reconciler
|
| 3819 | 2026-01-27T01:14:06.071Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = multicast_reconciler
resource = Database
|
| 3820 | 2026-01-27T01:14:06.071Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = multicast_reconciler
roles = RoleSet { roles: {} }
|
| 3821 | 2026-01-27T01:14:06.072Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = multicast_reconciler
resource = Database
result = Ok(())
|
| 3822 | 2026-01-27T01:14:06.077Z | DEBG | test_vpcs (SEC): saga log event
new_state = N007 succeeded
sec_id = 913233fe-92a8-4635-9572-183f495429c4
|
| 3823 | 2026-01-27T01:14:06.077Z | DEBG | test_vpcs (SecStore): recording saga event
event_type = Succeeded(String("70322159-3612-4366-a5c5-0de230edee74"))
node_id = 7
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
|
| 3824 | 2026-01-27T01:14:06.083Z | DEBG | test_vpcs (SEC): saga log event
new_state = N008 started
sec_id = 913233fe-92a8-4635-9572-183f495429c4
|
| 3825 | 2026-01-27T01:14:06.084Z | DEBG | test_vpcs (SecStore): recording saga event
event_type = Started
node_id = 8
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
|
| 3826 | 2026-01-27T01:14:06.096Z | DEBG | test_vpcs (SEC): saga log event
new_state = N008 succeeded
sec_id = 913233fe-92a8-4635-9572-183f495429c4
|
| 3827 | 2026-01-27T01:14:06.096Z | DEBG | test_vpcs (SecStore): recording saga event
event_type = Succeeded(String("8876f6e2-bc47-4ea3-bd82-a5551e4427e8"))
node_id = 8
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
|
| 3828 | 2026-01-27T01:14:06.104Z | DEBG | test_vpcs (SEC): saga log event
new_state = N009 started
sec_id = 913233fe-92a8-4635-9572-183f495429c4
|
| 3829 | 2026-01-27T01:14:06.104Z | DEBG | test_vpcs (SecStore): recording saga event
event_type = Started
node_id = 9
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
|
| 3830 | 2026-01-27T01:14:06.108Z | DEBG | test_vpcs (SEC): saga log event
new_state = N009 succeeded
sec_id = 913233fe-92a8-4635-9572-183f495429c4
|
| 3831 | 2026-01-27T01:14:06.109Z | DEBG | test_vpcs (SecStore): recording saga event
event_type = Succeeded(String("3b9499d6-e746-4ec4-846d-b9447f3c858f"))
node_id = 9
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
|
| 3832 | 2026-01-27T01:14:06.115Z | DEBG | test_vpcs (SEC): saga log event
new_state = N010 started
sec_id = 913233fe-92a8-4635-9572-183f495429c4
|
| 3833 | 2026-01-27T01:14:06.115Z | DEBG | test_vpcs (SecStore): recording saga event
event_type = Started
node_id = 10
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
|
| 3834 | 2026-01-27T01:14:06.121Z | TRAC | test_vpcs (SagaExecutor): authorize begin
action = CreateChild
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: a1a9a9c7-9e7e-48b3-8937-c3723503857b, lookup_type: ByName("springfield-squidport") }
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
saga_name = project-create
saga_node = VpcCreateVpc
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 3835 | 2026-01-27T01:14:06.121Z | TRAC | test_vpcs (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }
authenticated = true
resource_id = a1a9a9c7-9e7e-48b3-8937-c3723503857b
resource_type = Project
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
saga_name = project-create
saga_node = VpcCreateVpc
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 3836 | 2026-01-27T01:14:06.121Z | TRAC | test_vpcs (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
saga_name = project-create
saga_node = VpcCreateVpc
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 3837 | 2026-01-27T01:14:06.121Z | DEBG | test_vpcs (SagaExecutor): roles
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
saga_name = project-create
saga_node = VpcCreateVpc
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 3838 | 2026-01-27T01:14:06.123Z | DEBG | test_vpcs (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
result = Ok(())
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
saga_name = project-create
saga_node = VpcCreateVpc
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 3839 | 2026-01-27T01:14:06.158Z | TRAC | test_vpcs (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }
authenticated = true
resource_id = 001de000-5110-4000-8000-000000000000
resource_type = Silo
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
saga_name = project-create
saga_node = VpcCreateVpc
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 3840 | 2026-01-27T01:14:06.158Z | TRAC | test_vpcs (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
saga_name = project-create
saga_node = VpcCreateVpc
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 3841 | 2026-01-27T01:14:06.158Z | DEBG | test_vpcs (SagaExecutor): roles
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
saga_name = project-create
saga_node = VpcCreateVpc
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 3842 | 2026-01-27T01:14:06.160Z | DEBG | test_vpcs (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
result = Ok(())
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
saga_name = project-create
saga_node = VpcCreateVpc
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 3843 | 2026-01-27T01:14:06.168Z | TRAC | test_vpcs (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }
authenticated = true
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
saga_name = project-create
saga_node = VpcCreateVpc
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 3844 | 2026-01-27T01:14:06.168Z | TRAC | test_vpcs (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
saga_name = project-create
saga_node = VpcCreateVpc
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 3845 | 2026-01-27T01:14:06.168Z | DEBG | test_vpcs (SagaExecutor): roles
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
saga_name = project-create
saga_node = VpcCreateVpc
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 3846 | 2026-01-27T01:14:06.169Z | DEBG | test_vpcs (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
result = Ok(())
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
saga_name = project-create
saga_node = VpcCreateVpc
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 3847 | 2026-01-27T01:14:06.171Z | DEBG | test_vpcs (BackgroundTasks): multicast group member complete deletion finished
background_task = multicast_reconciler
left_and_time_deleted_members_deleted = 0
|
| 3848 | 2026-01-27T01:14:06.171Z | TRAC | test_vpcs (BackgroundTasks): checking for empty multicast groups to implicitly delete
background_task = multicast_reconciler
|
| 3849 | 2026-01-27T01:14:06.171Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = multicast_reconciler
resource = Database
|
| 3850 | 2026-01-27T01:14:06.171Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = multicast_reconciler
roles = RoleSet { roles: {} }
|
| 3851 | 2026-01-27T01:14:06.172Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = multicast_reconciler
resource = Database
result = Ok(())
|
| 3852 | 2026-01-27T01:14:06.177Z | TRAC | test_vpcs (BackgroundTasks): searching for multicast groups
background_task = multicast_reconciler
state = Active
|
| 3853 | 2026-01-27T01:14:06.177Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = multicast_reconciler
resource = Database
|
| 3854 | 2026-01-27T01:14:06.177Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = multicast_reconciler
roles = RoleSet { roles: {} }
|
| 3855 | 2026-01-27T01:14:06.178Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = multicast_reconciler
resource = Database
result = Ok(())
|
| 3856 | 2026-01-27T01:14:06.181Z | DEBG | test_vpcs (SagaExecutor): roles
authenticated = true
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} }
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
saga_name = project-create
saga_node = VpcCreateVpc
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 3857 | 2026-01-27T01:14:06.194Z | DEBG | test_vpcs (SagaExecutor): authorize result
action = CreateChild
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: a1a9a9c7-9e7e-48b3-8937-c3723503857b, lookup_type: ByName("springfield-squidport") }
result = Ok(())
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
saga_name = project-create
saga_node = VpcCreateVpc
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 3858 | 2026-01-27T01:14:06.194Z | TRAC | test_vpcs (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
saga_name = project-create
saga_node = VpcCreateVpc
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 3859 | 2026-01-27T01:14:06.195Z | DEBG | test_vpcs (SagaExecutor): roles
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
saga_name = project-create
saga_node = VpcCreateVpc
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 3860 | 2026-01-27T01:14:06.195Z | DEBG | test_vpcs (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
result = Ok(())
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
saga_name = project-create
saga_node = VpcCreateVpc
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 3861 | 2026-01-27T01:14:06.200Z | TRAC | test_vpcs (BackgroundTasks): found multicast groups
background_task = multicast_reconciler
count = 0
state = Active
|
| 3862 | 2026-01-27T01:14:06.200Z | TRAC | test_vpcs (BackgroundTasks): searching for multicast groups
background_task = multicast_reconciler
state = Deleting
|
| 3863 | 2026-01-27T01:14:06.200Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = multicast_reconciler
resource = Database
|
| 3864 | 2026-01-27T01:14:06.200Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = multicast_reconciler
roles = RoleSet { roles: {} }
|
| 3865 | 2026-01-27T01:14:06.201Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = multicast_reconciler
resource = Database
result = Ok(())
|
| 3866 | 2026-01-27T01:14:06.209Z | TRAC | test_vpcs (BackgroundTasks): found multicast groups
background_task = multicast_reconciler
count = 0
state = Deleting
|
| 3867 | 2026-01-27T01:14:06.210Z | TRAC | test_vpcs (BackgroundTasks): multicast RPW reconciliation cycle completed
active_groups_verified = 0
background_task = multicast_reconciler
error_count = 0
external_groups_created = 0
external_groups_deleted = 0
member_lifecycle_transitions = 0
orphaned_member_cleanup = 0
total_dpd_operations = 0
|
| 3868 | 2026-01-27T01:14:06.211Z | TRAC | test_vpcs (BackgroundTasks): multicast RPW reconciliation pass completed - dataplane consistent
background_task = multicast_reconciler
|
| 3869 | 2026-01-27T01:14:06.212Z | DEBG | test_vpcs (BackgroundTasks): activation complete
background_task = multicast_reconciler
elapsed = 668.463598ms
iteration = 2
status = {"disabled":false,"empty_groups_marked":0,"errors":[],"groups_created":0,"groups_deleted":0,"groups_verified":0,"members_deleted":0,"members_processed":0}
|
| 3870 | 2026-01-27T01:14:06.212Z | DEBG | test_vpcs (BackgroundTasks): activation complete
background_task = inventory_loader
elapsed = 672.279985ms
iteration = 2
status = {"Loaded":{"collection_id":"26e04365-9d11-40b8-b64d-d52efd2ebbc3","time_loaded":"2026-01-27T01:14:05.540289437Z","time_started":"2026-01-27T01:14:00.923174Z"}}
|
| 3871 | 2026-01-27T01:14:06.213Z | DEBG | test_vpcs (BackgroundTasks): activating
background_task = multicast_reconciler
iteration = 3
reason = Dependency
|
| 3872 | 2026-01-27T01:14:06.213Z | TRAC | test_vpcs (BackgroundTasks): multicast group reconciler activating
background_task = multicast_reconciler
|
| 3873 | 2026-01-27T01:14:06.213Z | TRAC | test_vpcs (BackgroundTasks): starting multicast reconciliation pass
background_task = multicast_reconciler
|
| 3874 | 2026-01-27T01:14:06.213Z | TRAC | test_vpcs (DnsResolver): lookup_all_socket_v6 srv
dns_name = _dendrite._tcp.control-plane.oxide.internal
|
| 3875 | 2026-01-27T01:14:06.213Z | DEBG | test_vpcs (BackgroundTasks): activating
background_task = blueprint_planner
iteration = 4
reason = Dependency
|
| 3876 | 2026-01-27T01:14:06.213Z | DEBG | test_vpcs (BackgroundTasks): blueprint planning disabled, doing nothing
background_task = blueprint_planner
|
| 3877 | 2026-01-27T01:14:06.213Z | DEBG | test_vpcs (BackgroundTasks): activation complete
background_task = blueprint_planner
elapsed = 68.295\u{b5}s
iteration = 4
status = "Disabled"
|
| 3878 | 2026-01-27T01:14:06.214Z | DEBG | test_vpcs (BackgroundTasks): activating
background_task = physical_disk_adoption
iteration = 2
reason = Dependency
|
| 3879 | 2026-01-27T01:14:06.214Z | DEBG | test_vpcs (BackgroundTasks): activation complete
background_task = physical_disk_adoption
elapsed = 20.35\u{b5}s
iteration = 2
status = {"error":"task disabled"}
|
| 3880 | 2026-01-27T01:14:06.214Z | DEBG | test_vpcs (BackgroundTasks): activating
background_task = blueprint_rendezvous
iteration = 2
reason = Dependency
|
| 3881 | 2026-01-27T01:14:06.214Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = blueprint_rendezvous
resource = Fleet
|
| 3882 | 2026-01-27T01:14:06.214Z | TRAC | test_vpcs (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = blueprint_rendezvous
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 3883 | 2026-01-27T01:14:06.214Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = blueprint_rendezvous
resource = Database
|
| 3884 | 2026-01-27T01:14:06.214Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = blueprint_rendezvous
roles = RoleSet { roles: {} }
|
| 3885 | 2026-01-27T01:14:06.215Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = blueprint_rendezvous
resource = Database
result = Ok(())
|
| 3886 | 2026-01-27T01:14:06.220Z | TRAC | test_vpcs (dns): buffer
buffer = Length: 72 (0x48) bytes\n0000: 19 4c 01 00 00 01 00 00 00 00 00 01 09 5f 64 65 .L..........._de\n0010: 6e 64 72 69 74 65 04 5f 74 63 70 0d 63 6f 6e 74 ndrite._tcp.cont\n0020: 72 6f 6c 2d 70 6c 61 6e 65 05 6f 78 69 64 65 08 rol-plane.oxide.\n0030: 69 6e 74 65 72 6e 61 6c 00 00 21 00 01 00 00 29 internal..!....)\n0040: 04 d0 00 00 00 00 00 00 ........
kind = dns
peer_addr = [::1]:46583
req_id = 73e410bc-b7ca-4a64-b1eb-882316cf3490
|
| 3887 | 2026-01-27T01:14:06.220Z | DEBG | test_vpcs (dns): message_request
kind = dns
mr = MessageRequest {\n header: Header {\n id: 6476,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n queries: Queries {\n queries: [\n LowerQuery {\n name: LowerName(\n Name("_dendrite._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_dendrite._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n ],\n original: [\n 9,\n 95,\n 100,\n 101,\n 110,\n 100,\n 114,\n 105,\n 116,\n 101,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n flags: EdnsFlags {\n dnssec_ok: false,\n z: 0,\n },\n max_payload: 1232,\n options: OPT {\n options: [],\n },\n },\n ),\n}
peer_addr = [::1]:46583
req_id = 73e410bc-b7ca-4a64-b1eb-882316cf3490
|
| 3888 | 2026-01-27T01:14:06.220Z | DEBG | test_vpcs (store): query key
key = _dendrite._tcp
|
| 3889 | 2026-01-27T01:14:06.220Z | DEBG | test_vpcs (store): query key
key = dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host
|
| 3890 | 2026-01-27T01:14:06.221Z | DEBG | test_vpcs (dns): dns response
additional_records = [Record { name_labels: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal"), dns_class: IN, ttl: 0, rdata: AAAA(AAAA(::1)) }]
kind = dns
peer_addr = [::1]:46583
query = LowerQuery { name: LowerName(Name("_dendrite._tcp.control-plane.oxide.internal.")), original: Query { name: Name("_dendrite._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN } }
records = [Record { name_labels: Name("_dendrite._tcp.control-plane.oxide.internal."), dns_class: IN, ttl: 0, rdata: SRV(SRV { priority: 0, weight: 0, port: 53072, target: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal") }) }]
req_id = 73e410bc-b7ca-4a64-b1eb-882316cf3490
|
| 3891 | 2026-01-27T01:14:06.221Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = blueprint_rendezvous
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 3892 | 2026-01-27T01:14:06.228Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = blueprint_rendezvous
resource = Fleet
result = Ok(())
|
| 3893 | 2026-01-27T01:14:06.229Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = blueprint_rendezvous
resource = Fleet
|
| 3894 | 2026-01-27T01:14:06.229Z | TRAC | test_vpcs (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = blueprint_rendezvous
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 3895 | 2026-01-27T01:14:06.229Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = blueprint_rendezvous
resource = Database
|
| 3896 | 2026-01-27T01:14:06.229Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = blueprint_rendezvous
roles = RoleSet { roles: {} }
|
| 3897 | 2026-01-27T01:14:06.229Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = blueprint_rendezvous
resource = Database
result = Ok(())
|
| 3898 | 2026-01-27T01:14:06.232Z | DEBG | test_vpcs (SEC): saga log event
new_state = N010 succeeded
sec_id = 913233fe-92a8-4635-9572-183f495429c4
|
| 3899 | 2026-01-27T01:14:06.232Z | DEBG | test_vpcs (SecStore): recording saga event
event_type = Succeeded(Array [Object {"key": String("9702b4b6-b761-4a78-93c1-48a3b0004b27"), "lookup_type": Object {"ByName": String("default")}, "parent": Object {"key": String("a1a9a9c7-9e7e-48b3-8937-c3723503857b"), "lookup_type": Object {"ByName": String("springfield-squidport")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}}, Object {"dns_name": String("default"), "firewall_gen": Number(1), "identity": Object {"description": String("Default VPC"), "id": String("9702b4b6-b761-4a78-93c1-48a3b0004b27"), "name": String("default"), "time_created": String("2026-01-27T01:14:06.121281Z"), "time_deleted": Null, "time_modified": String("2026-01-27T01:14:06.121281Z")}, "ipv6_prefix": String("fd6f:1fa5:6c45::/48"), "project_id": String("a1a9a9c7-9e7e-48b3-8937-c3723503857b"), "subnet_gen": Number(1), "system_router_id": String("9b4d23dd-a0db-427f-957b-c661053a0cc4"), "vni": Number(16560289)}])
node_id = 10
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
|
| 3900 | 2026-01-27T01:14:06.238Z | DEBG | test_vpcs (DnsResolver): lookup_all_socket_v6 srv
dns_name = _dendrite._tcp.control-plane.oxide.internal
response = SrvLookup(Lookup { query: Query { name: Name("_dendrite._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN }, records: [Record { name_labels: Name("_dendrite._tcp.control-plane.oxide.internal."), dns_class: IN, ttl: 0, rdata: SRV(SRV { priority: 0, weight: 0, port: 53072, target: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal.") }) }, Record { name_labels: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."), dns_class: IN, ttl: 0, rdata: AAAA(AAAA(::1)) }], valid_until: Instant { tv_sec: 10288, tv_nsec: 44258350 } })
|
| 3901 | 2026-01-27T01:14:06.238Z | TRAC | test_vpcs (DnsResolver): lookup_service_targets: looking up SRV target
|
| 3902 | 2026-01-27T01:14:06.240Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = blueprint_rendezvous
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 3903 | 2026-01-27T01:14:06.249Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = blueprint_rendezvous
resource = Fleet
result = Ok(())
|
| 3904 | 2026-01-27T01:14:06.249Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = blueprint_rendezvous
resource = Database
|
| 3905 | 2026-01-27T01:14:06.249Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = blueprint_rendezvous
roles = RoleSet { roles: {} }
|
| 3906 | 2026-01-27T01:14:06.250Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = blueprint_rendezvous
resource = Database
result = Ok(())
|
| 3907 | 2026-01-27T01:14:06.253Z | DEBG | test_vpcs (SEC): saga log event
new_state = N011 started
sec_id = 913233fe-92a8-4635-9572-183f495429c4
|
| 3908 | 2026-01-27T01:14:06.254Z | DEBG | test_vpcs (SecStore): recording saga event
event_type = Started
node_id = 11
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
|
| 3909 | 2026-01-27T01:14:06.263Z | TRAC | test_vpcs (dns): buffer
buffer = Length: 108 (0x6c) bytes\n0000: b2 bb 01 00 00 01 00 00 00 00 00 01 2d 64 65 6e ............-den\n0010: 64 72 69 74 65 2d 62 36 64 36 35 33 34 31 2d 31 drite-b6d65341-1\n0020: 36 37 63 2d 34 31 64 66 2d 39 62 35 63 2d 34 31 67c-41df-9b5c-41\n0030: 63 64 65 64 39 39 63 32 32 39 04 68 6f 73 74 0d cded99c229.host.\n0040: 63 6f 6e 74 72 6f 6c 2d 70 6c 61 6e 65 05 6f 78 control-plane.ox\n0050: 69 64 65 08 69 6e 74 65 72 6e 61 6c 00 00 1c 00 ide.internal....\n0060: 01 00 00 29 04 d0 00 00 00 00 00 00 ...)........
kind = dns
peer_addr = [::1]:3258
req_id = 5f2d02ac-df24-4864-80f0-77358192e070
|
| 3910 | 2026-01-27T01:14:06.263Z | DEBG | test_vpcs (dns): message_request
kind = dns
mr = MessageRequest {\n header: Header {\n id: 45755,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n queries: Queries {\n queries: [\n LowerQuery {\n name: LowerName(\n Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."),\n query_type: AAAA,\n query_class: IN,\n },\n },\n ],\n original: [\n 45,\n 100,\n 101,\n 110,\n 100,\n 114,\n 105,\n 116,\n 101,\n 45,\n 98,\n 54,\n 100,\n 54,\n 53,\n 51,\n 52,\n 49,\n 45,\n 49,\n 54,\n 55,\n 99,\n 45,\n 52,\n 49,\n 100,\n 102,\n 45,\n 57,\n 98,\n 53,\n 99,\n 45,\n 52,\n 49,\n 99,\n 100,\n 101,\n 100,\n 57,\n 57,\n 99,\n 50,\n 50,\n 57,\n 4,\n 104,\n 111,\n 115,\n 116,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 28,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n flags: EdnsFlags {\n dnssec_ok: false,\n z: 0,\n },\n max_payload: 1232,\n options: OPT {\n options: [],\n },\n },\n ),\n}
peer_addr = [::1]:3258
req_id = 5f2d02ac-df24-4864-80f0-77358192e070
|
| 3911 | 2026-01-27T01:14:06.263Z | DEBG | test_vpcs (store): query key
key = dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host
|
| 3912 | 2026-01-27T01:14:06.263Z | DEBG | test_vpcs (dns): dns response
additional_records = []
kind = dns
peer_addr = [::1]:3258
query = LowerQuery { name: LowerName(Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal.")), original: Query { name: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."), query_type: AAAA, query_class: IN } }
records = [Record { name_labels: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."), dns_class: IN, ttl: 0, rdata: AAAA(AAAA(::1)) }]
req_id = 5f2d02ac-df24-4864-80f0-77358192e070
|
| 3913 | 2026-01-27T01:14:06.337Z | TRAC | test_vpcs (DpdClient): client request
background_task = multicast_reconciler
body = None
method = GET
uri = http://[::1]:53072/switch/identifiers
|
| 3914 | 2026-01-27T01:14:06.340Z | TRAC | test_vpcs (SagaExecutor): authorize begin
action = CreateChild
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: a1a9a9c7-9e7e-48b3-8937-c3723503857b, lookup_type: ByName("springfield-squidport") }, key: 9702b4b6-b761-4a78-93c1-48a3b0004b27, lookup_type: ByName("default") }
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
saga_name = project-create
saga_node = VpcCreateRouter
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 3915 | 2026-01-27T01:14:06.340Z | TRAC | test_vpcs (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }
authenticated = true
resource_id = a1a9a9c7-9e7e-48b3-8937-c3723503857b
resource_type = Project
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
saga_name = project-create
saga_node = VpcCreateRouter
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 3916 | 2026-01-27T01:14:06.340Z | TRAC | test_vpcs (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
saga_name = project-create
saga_node = VpcCreateRouter
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 3917 | 2026-01-27T01:14:06.341Z | DEBG | test_vpcs (SagaExecutor): roles
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
saga_name = project-create
saga_node = VpcCreateRouter
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 3918 | 2026-01-27T01:14:06.341Z | DEBG | test_vpcs (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
result = Ok(())
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
saga_name = project-create
saga_node = VpcCreateRouter
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 3919 | 2026-01-27T01:14:06.343Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = blueprint_rendezvous
resource = Fleet
|
| 3920 | 2026-01-27T01:14:06.343Z | TRAC | test_vpcs (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = blueprint_rendezvous
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 3921 | 2026-01-27T01:14:06.344Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = blueprint_rendezvous
resource = Database
|
| 3922 | 2026-01-27T01:14:06.344Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = blueprint_rendezvous
roles = RoleSet { roles: {} }
|
| 3923 | 2026-01-27T01:14:06.344Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = blueprint_rendezvous
resource = Database
result = Ok(())
|
| 3924 | 2026-01-27T01:14:06.348Z | TRAC | test_vpcs (DpdClient): client response
background_task = multicast_reconciler
result = Ok(Response { url: "http://[::1]:53072/switch/identifiers", status: 200, headers: {"content-type": "application/json", "x-request-id": "b2bddeaf-4cee-4b5e-b7d6-fe1b4bc10d22", "content-length": "206", "date": "Tue, 27 Jan 2026 01:14:06 GMT"} })
|
| 3925 | 2026-01-27T01:14:06.348Z | TRAC | test_vpcs (BackgroundTasks): searching for multicast groups
background_task = multicast_reconciler
state = Creating
|
| 3926 | 2026-01-27T01:14:06.348Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = multicast_reconciler
resource = Database
|
| 3927 | 2026-01-27T01:14:06.348Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = multicast_reconciler
roles = RoleSet { roles: {} }
|
| 3928 | 2026-01-27T01:14:06.351Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = multicast_reconciler
resource = Database
result = Ok(())
|
| 3929 | 2026-01-27T01:14:06.353Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = blueprint_rendezvous
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 3930 | 2026-01-27T01:14:06.360Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = blueprint_rendezvous
resource = Fleet
result = Ok(())
|
| 3931 | 2026-01-27T01:14:06.360Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = blueprint_rendezvous
resource = Fleet
|
| 3932 | 2026-01-27T01:14:06.360Z | TRAC | test_vpcs (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = blueprint_rendezvous
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 3933 | 2026-01-27T01:14:06.360Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = blueprint_rendezvous
resource = Database
|
| 3934 | 2026-01-27T01:14:06.360Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = blueprint_rendezvous
roles = RoleSet { roles: {} }
|
| 3935 | 2026-01-27T01:14:06.361Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = blueprint_rendezvous
resource = Database
result = Ok(())
|
| 3936 | 2026-01-27T01:14:06.362Z | TRAC | test_vpcs (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }
authenticated = true
resource_id = 001de000-5110-4000-8000-000000000000
resource_type = Silo
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
saga_name = project-create
saga_node = VpcCreateRouter
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 3937 | 2026-01-27T01:14:06.363Z | TRAC | test_vpcs (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
saga_name = project-create
saga_node = VpcCreateRouter
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 3938 | 2026-01-27T01:14:06.363Z | DEBG | test_vpcs (SagaExecutor): roles
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
saga_name = project-create
saga_node = VpcCreateRouter
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 3939 | 2026-01-27T01:14:06.363Z | DEBG | test_vpcs (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
result = Ok(())
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
saga_name = project-create
saga_node = VpcCreateRouter
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 3940 | 2026-01-27T01:14:06.370Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = blueprint_rendezvous
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 3941 | 2026-01-27T01:14:06.376Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = blueprint_rendezvous
resource = Fleet
result = Ok(())
|
| 3942 | 2026-01-27T01:14:06.376Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = blueprint_rendezvous
resource = Database
|
| 3943 | 2026-01-27T01:14:06.376Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = blueprint_rendezvous
roles = RoleSet { roles: {} }
|
| 3944 | 2026-01-27T01:14:06.377Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = blueprint_rendezvous
resource = Database
result = Ok(())
|
| 3945 | 2026-01-27T01:14:06.399Z | TRAC | test_vpcs (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }
authenticated = true
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
saga_name = project-create
saga_node = VpcCreateRouter
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 3946 | 2026-01-27T01:14:06.399Z | TRAC | test_vpcs (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
saga_name = project-create
saga_node = VpcCreateRouter
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 3947 | 2026-01-27T01:14:06.399Z | DEBG | test_vpcs (SagaExecutor): roles
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
saga_name = project-create
saga_node = VpcCreateRouter
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 3948 | 2026-01-27T01:14:06.400Z | DEBG | test_vpcs (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
result = Ok(())
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
saga_name = project-create
saga_node = VpcCreateRouter
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 3949 | 2026-01-27T01:14:06.402Z | INFO | test_vpcs (BackgroundTasks): ensured all Crucible datasets present in inventory have database records
background_task = blueprint_rendezvous
num_already_exist = 0
num_inserted = 0
num_not_in_inventory = 0
|
| 3950 | 2026-01-27T01:14:06.402Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = blueprint_rendezvous
resource = Fleet
|
| 3951 | 2026-01-27T01:14:06.403Z | TRAC | test_vpcs (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = blueprint_rendezvous
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 3952 | 2026-01-27T01:14:06.403Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = blueprint_rendezvous
resource = Database
|
| 3953 | 2026-01-27T01:14:06.403Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = blueprint_rendezvous
roles = RoleSet { roles: {} }
|
| 3954 | 2026-01-27T01:14:06.405Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = blueprint_rendezvous
resource = Database
result = Ok(())
|
| 3955 | 2026-01-27T01:14:06.420Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = blueprint_rendezvous
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 3956 | 2026-01-27T01:14:06.425Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = blueprint_rendezvous
resource = Fleet
result = Ok(())
|
| 3957 | 2026-01-27T01:14:06.426Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = blueprint_rendezvous
resource = Fleet
|
| 3958 | 2026-01-27T01:14:06.426Z | TRAC | test_vpcs (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = blueprint_rendezvous
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 3959 | 2026-01-27T01:14:06.426Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = blueprint_rendezvous
resource = Database
|
| 3960 | 2026-01-27T01:14:06.426Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = blueprint_rendezvous
roles = RoleSet { roles: {} }
|
| 3961 | 2026-01-27T01:14:06.426Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = blueprint_rendezvous
resource = Database
result = Ok(())
|
| 3962 | 2026-01-27T01:14:06.428Z | DEBG | test_vpcs (SagaExecutor): roles
authenticated = true
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} }
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
saga_name = project-create
saga_node = VpcCreateRouter
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 3963 | 2026-01-27T01:14:06.447Z | DEBG | test_vpcs (SagaExecutor): authorize result
action = CreateChild
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: a1a9a9c7-9e7e-48b3-8937-c3723503857b, lookup_type: ByName("springfield-squidport") }, key: 9702b4b6-b761-4a78-93c1-48a3b0004b27, lookup_type: ByName("default") }
result = Ok(())
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
saga_name = project-create
saga_node = VpcCreateRouter
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 3964 | 2026-01-27T01:14:06.447Z | TRAC | test_vpcs (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
saga_name = project-create
saga_node = VpcCreateRouter
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 3965 | 2026-01-27T01:14:06.447Z | DEBG | test_vpcs (SagaExecutor): roles
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
saga_name = project-create
saga_node = VpcCreateRouter
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 3966 | 2026-01-27T01:14:06.450Z | DEBG | test_vpcs (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
result = Ok(())
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
saga_name = project-create
saga_node = VpcCreateRouter
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 3967 | 2026-01-27T01:14:06.453Z | TRAC | test_vpcs (BackgroundTasks): found multicast groups
background_task = multicast_reconciler
count = 0
state = Creating
|
| 3968 | 2026-01-27T01:14:06.453Z | TRAC | test_vpcs (BackgroundTasks): reconciling member state changes
background_task = multicast_reconciler
|
| 3969 | 2026-01-27T01:14:06.453Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = multicast_reconciler
resource = Database
|
| 3970 | 2026-01-27T01:14:06.453Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = multicast_reconciler
roles = RoleSet { roles: {} }
|
| 3971 | 2026-01-27T01:14:06.454Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = multicast_reconciler
resource = Database
result = Ok(())
|
| 3972 | 2026-01-27T01:14:06.456Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = blueprint_rendezvous
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 3973 | 2026-01-27T01:14:06.461Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = blueprint_rendezvous
resource = Fleet
result = Ok(())
|
| 3974 | 2026-01-27T01:14:06.461Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = blueprint_rendezvous
resource = Database
|
| 3975 | 2026-01-27T01:14:06.461Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = blueprint_rendezvous
roles = RoleSet { roles: {} }
|
| 3976 | 2026-01-27T01:14:06.462Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = blueprint_rendezvous
resource = Database
result = Ok(())
|
| 3977 | 2026-01-27T01:14:06.470Z | DEBG | test_vpcs (BackgroundTasks): member state reconciliation completed
background_task = multicast_reconciler
members_processed = 0
|
| 3978 | 2026-01-27T01:14:06.470Z | TRAC | test_vpcs (BackgroundTasks): cleaning up deleted multicast members
background_task = multicast_reconciler
|
| 3979 | 2026-01-27T01:14:06.470Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = multicast_reconciler
resource = Database
|
| 3980 | 2026-01-27T01:14:06.470Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = multicast_reconciler
roles = RoleSet { roles: {} }
|
| 3981 | 2026-01-27T01:14:06.472Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = multicast_reconciler
resource = Database
result = Ok(())
|
| 3982 | 2026-01-27T01:14:06.490Z | DEBG | test_vpcs (BackgroundTasks): activating
background_task = inventory_loader
iteration = 3
reason = Timeout
|
| 3983 | 2026-01-27T01:14:06.490Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = inventory_loader
resource = Inventory
|
| 3984 | 2026-01-27T01:14:06.491Z | TRAC | test_vpcs (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = inventory_loader
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 3985 | 2026-01-27T01:14:06.491Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = inventory_loader
resource = Database
|
| 3986 | 2026-01-27T01:14:06.491Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = inventory_loader
roles = RoleSet { roles: {} }
|
| 3987 | 2026-01-27T01:14:06.492Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = inventory_loader
resource = Database
result = Ok(())
|
| 3988 | 2026-01-27T01:14:06.497Z | INFO | test_vpcs (BackgroundTasks): all LocalStorage datasets reconciled
background_task = blueprint_rendezvous
num_already_exist = 0
num_already_tombstoned = 0
num_inserted = 0
num_not_in_inventory = 0
num_tombstoned = 0
|
| 3989 | 2026-01-27T01:14:06.497Z | DEBG | test_vpcs (BackgroundTasks): activation complete
background_task = blueprint_rendezvous
elapsed = 283.29989ms
iteration = 2
status = {"blueprint_id":"c01a6e26-b5bc-40f6-ba41-c1d23b303d2d","inventory_collection_id":"26e04365-9d11-40b8-b64d-d52efd2ebbc3","stats":{"crucible_dataset":{"num_already_exist":0,"num_inserted":0,"num_not_in_inventory":0},"debug_dataset":{"num_already_exist":0,"num_already_tombstoned":0,"num_inserted":0,"num_not_in_inventory":0,"num_tombstoned":0},"local_storage_dataset":{"num_already_exist":0,"num_already_tombstoned":0,"num_inserted":0,"num_not_in_inventory":0,"num_tombstoned":0}}}
|
| 3990 | 2026-01-27T01:14:06.516Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = inventory_loader
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 3991 | 2026-01-27T01:14:06.537Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = inventory_loader
resource = Inventory
result = Ok(())
|
| 3992 | 2026-01-27T01:14:06.538Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = inventory_loader
resource = Database
|
| 3993 | 2026-01-27T01:14:06.538Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = inventory_loader
roles = RoleSet { roles: {} }
|
| 3994 | 2026-01-27T01:14:06.538Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = inventory_loader
resource = Database
result = Ok(())
|
| 3995 | 2026-01-27T01:14:06.550Z | DEBG | test_vpcs (BackgroundTasks): latest inventory collection is unchanged
background_task = inventory_loader
original_id = 26e04365-9d11-40b8-b64d-d52efd2ebbc3
original_time_started = 2026-01-27 01:14:00.923174 UTC
|
| 3996 | 2026-01-27T01:14:06.550Z | DEBG | test_vpcs (BackgroundTasks): activation complete
background_task = inventory_loader
elapsed = 60.19701ms
iteration = 3
status = {"Loaded":{"collection_id":"26e04365-9d11-40b8-b64d-d52efd2ebbc3","time_loaded":"2026-01-27T01:14:06.490663666Z","time_started":"2026-01-27T01:14:00.923174Z"}}
|
| 3997 | 2026-01-27T01:14:06.564Z | DEBG | test_vpcs (SEC): saga log event
new_state = N011 succeeded
sec_id = 913233fe-92a8-4635-9572-183f495429c4
|
| 3998 | 2026-01-27T01:14:06.564Z | DEBG | test_vpcs (SecStore): recording saga event
event_type = Succeeded(Object {"key": String("9b4d23dd-a0db-427f-957b-c661053a0cc4"), "lookup_type": Object {"ById": String("9b4d23dd-a0db-427f-957b-c661053a0cc4")}, "parent": Object {"key": String("9702b4b6-b761-4a78-93c1-48a3b0004b27"), "lookup_type": Object {"ByName": String("default")}, "parent": Object {"key": String("a1a9a9c7-9e7e-48b3-8937-c3723503857b"), "lookup_type": Object {"ByName": String("springfield-squidport")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}}})
node_id = 11
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
|
| 3999 | 2026-01-27T01:14:06.584Z | DEBG | test_vpcs (SEC): saga log event
new_state = N012 started
sec_id = 913233fe-92a8-4635-9572-183f495429c4
|
| 4000 | 2026-01-27T01:14:06.585Z | DEBG | test_vpcs (SecStore): recording saga event
event_type = Started
node_id = 12
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
|
| 4001 | 2026-01-27T01:14:06.593Z | TRAC | test_vpcs (SagaExecutor): authorize begin
action = CreateChild
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: a1a9a9c7-9e7e-48b3-8937-c3723503857b, lookup_type: ByName("springfield-squidport") }, key: 9702b4b6-b761-4a78-93c1-48a3b0004b27, lookup_type: ByName("default") }, key: 9b4d23dd-a0db-427f-957b-c661053a0cc4, lookup_type: ById(9b4d23dd-a0db-427f-957b-c661053a0cc4) }
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
saga_name = project-create
saga_node = VpcCreateV4Route
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4002 | 2026-01-27T01:14:06.593Z | TRAC | test_vpcs (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }
authenticated = true
resource_id = a1a9a9c7-9e7e-48b3-8937-c3723503857b
resource_type = Project
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
saga_name = project-create
saga_node = VpcCreateV4Route
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4003 | 2026-01-27T01:14:06.593Z | TRAC | test_vpcs (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
saga_name = project-create
saga_node = VpcCreateV4Route
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4004 | 2026-01-27T01:14:06.593Z | DEBG | test_vpcs (SagaExecutor): roles
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
saga_name = project-create
saga_node = VpcCreateV4Route
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4005 | 2026-01-27T01:14:06.594Z | DEBG | test_vpcs (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
result = Ok(())
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
saga_name = project-create
saga_node = VpcCreateV4Route
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4006 | 2026-01-27T01:14:06.602Z | DEBG | test_vpcs (BackgroundTasks): multicast group member complete deletion finished
background_task = multicast_reconciler
left_and_time_deleted_members_deleted = 0
|
| 4007 | 2026-01-27T01:14:06.602Z | TRAC | test_vpcs (BackgroundTasks): checking for empty multicast groups to implicitly delete
background_task = multicast_reconciler
|
| 4008 | 2026-01-27T01:14:06.603Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = multicast_reconciler
resource = Database
|
| 4009 | 2026-01-27T01:14:06.603Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = multicast_reconciler
roles = RoleSet { roles: {} }
|
| 4010 | 2026-01-27T01:14:06.605Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = multicast_reconciler
resource = Database
result = Ok(())
|
| 4011 | 2026-01-27T01:14:06.606Z | TRAC | test_vpcs (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }
authenticated = true
resource_id = 001de000-5110-4000-8000-000000000000
resource_type = Silo
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
saga_name = project-create
saga_node = VpcCreateV4Route
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4012 | 2026-01-27T01:14:06.606Z | TRAC | test_vpcs (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
saga_name = project-create
saga_node = VpcCreateV4Route
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4013 | 2026-01-27T01:14:06.606Z | DEBG | test_vpcs (SagaExecutor): roles
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
saga_name = project-create
saga_node = VpcCreateV4Route
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4014 | 2026-01-27T01:14:06.607Z | DEBG | test_vpcs (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
result = Ok(())
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
saga_name = project-create
saga_node = VpcCreateV4Route
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4015 | 2026-01-27T01:14:06.613Z | TRAC | test_vpcs (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }
authenticated = true
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
saga_name = project-create
saga_node = VpcCreateV4Route
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4016 | 2026-01-27T01:14:06.614Z | TRAC | test_vpcs (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
saga_name = project-create
saga_node = VpcCreateV4Route
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4017 | 2026-01-27T01:14:06.614Z | DEBG | test_vpcs (SagaExecutor): roles
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
saga_name = project-create
saga_node = VpcCreateV4Route
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4018 | 2026-01-27T01:14:06.614Z | DEBG | test_vpcs (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
result = Ok(())
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
saga_name = project-create
saga_node = VpcCreateV4Route
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4019 | 2026-01-27T01:14:06.626Z | DEBG | test_vpcs (SagaExecutor): roles
authenticated = true
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} }
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
saga_name = project-create
saga_node = VpcCreateV4Route
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4020 | 2026-01-27T01:14:06.639Z | DEBG | test_vpcs (SagaExecutor): authorize result
action = CreateChild
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: a1a9a9c7-9e7e-48b3-8937-c3723503857b, lookup_type: ByName("springfield-squidport") }, key: 9702b4b6-b761-4a78-93c1-48a3b0004b27, lookup_type: ByName("default") }, key: 9b4d23dd-a0db-427f-957b-c661053a0cc4, lookup_type: ById(9b4d23dd-a0db-427f-957b-c661053a0cc4) }
result = Ok(())
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
saga_name = project-create
saga_node = VpcCreateV4Route
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4021 | 2026-01-27T01:14:06.640Z | TRAC | test_vpcs (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
saga_name = project-create
saga_node = VpcCreateV4Route
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4022 | 2026-01-27T01:14:06.640Z | DEBG | test_vpcs (SagaExecutor): roles
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
saga_name = project-create
saga_node = VpcCreateV4Route
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4023 | 2026-01-27T01:14:06.641Z | DEBG | test_vpcs (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
result = Ok(())
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
saga_name = project-create
saga_node = VpcCreateV4Route
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4024 | 2026-01-27T01:14:06.642Z | TRAC | test_vpcs (results-sink): batch interval expired, but no samples to insert
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
|
| 4025 | 2026-01-27T01:14:06.643Z | TRAC | test_vpcs (results-sink-cluster): batch interval expired, but no samples to insert
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
|
| 4026 | 2026-01-27T01:14:06.657Z | DEBG | test_vpcs (BackgroundTasks): activating
background_task = fm_sitrep_loader
iteration = 2
reason = Timeout
|
| 4027 | 2026-01-27T01:14:06.692Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = fm_sitrep_loader
resource = Fleet
|
| 4028 | 2026-01-27T01:14:06.692Z | TRAC | test_vpcs (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = fm_sitrep_loader
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 4029 | 2026-01-27T01:14:06.692Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = fm_sitrep_loader
resource = Database
|
| 4030 | 2026-01-27T01:14:06.692Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = fm_sitrep_loader
roles = RoleSet { roles: {} }
|
| 4031 | 2026-01-27T01:14:06.694Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = fm_sitrep_loader
resource = Database
result = Ok(())
|
| 4032 | 2026-01-27T01:14:06.700Z | DEBG | test_vpcs (BackgroundTasks): activating
background_task = fm_sitrep_gc
iteration = 2
reason = Timeout
|
| 4033 | 2026-01-27T01:14:06.703Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = fm_sitrep_gc
resource = Database
|
| 4034 | 2026-01-27T01:14:06.704Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = fm_sitrep_gc
roles = RoleSet { roles: {} }
|
| 4035 | 2026-01-27T01:14:06.705Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = fm_sitrep_gc
resource = Database
result = Ok(())
|
| 4036 | 2026-01-27T01:14:06.712Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Modify
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = fm_sitrep_gc
resource = Fleet
|
| 4037 | 2026-01-27T01:14:06.712Z | TRAC | test_vpcs (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = fm_sitrep_gc
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 4038 | 2026-01-27T01:14:06.712Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = fm_sitrep_gc
resource = Database
|
| 4039 | 2026-01-27T01:14:06.712Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = fm_sitrep_gc
roles = RoleSet { roles: {} }
|
| 4040 | 2026-01-27T01:14:06.713Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = fm_sitrep_gc
resource = Database
result = Ok(())
|
| 4041 | 2026-01-27T01:14:06.714Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = fm_sitrep_loader
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 4042 | 2026-01-27T01:14:06.721Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = fm_sitrep_loader
resource = Fleet
result = Ok(())
|
| 4043 | 2026-01-27T01:14:06.721Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = fm_sitrep_loader
resource = Database
|
| 4044 | 2026-01-27T01:14:06.721Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = fm_sitrep_loader
roles = RoleSet { roles: {} }
|
| 4045 | 2026-01-27T01:14:06.721Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = fm_sitrep_loader
resource = Database
result = Ok(())
|
| 4046 | 2026-01-27T01:14:06.727Z | TRAC | test_vpcs (BackgroundTasks): searching for multicast groups
background_task = multicast_reconciler
state = Active
|
| 4047 | 2026-01-27T01:14:06.728Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = multicast_reconciler
resource = Database
|
| 4048 | 2026-01-27T01:14:06.728Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = multicast_reconciler
roles = RoleSet { roles: {} }
|
| 4049 | 2026-01-27T01:14:06.729Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = multicast_reconciler
resource = Database
result = Ok(())
|
| 4050 | 2026-01-27T01:14:06.734Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = fm_sitrep_gc
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 4051 | 2026-01-27T01:14:06.738Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Modify
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = fm_sitrep_gc
resource = Fleet
result = Ok(())
|
| 4052 | 2026-01-27T01:14:06.742Z | DEBG | test_vpcs (BackgroundTasks): activation complete
background_task = fm_sitrep_loader
elapsed = 84.749731ms
iteration = 2
status = "NoSitrep"
|
| 4053 | 2026-01-27T01:14:06.742Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = fm_sitrep_gc
resource = Database
|
| 4054 | 2026-01-27T01:14:06.743Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = fm_sitrep_gc
roles = RoleSet { roles: {} }
|
| 4055 | 2026-01-27T01:14:06.743Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = fm_sitrep_gc
resource = Database
result = Ok(())
|
| 4056 | 2026-01-27T01:14:06.747Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Modify
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = fm_sitrep_gc
resource = Fleet
|
| 4057 | 2026-01-27T01:14:06.747Z | TRAC | test_vpcs (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = fm_sitrep_gc
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 4058 | 2026-01-27T01:14:06.747Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = fm_sitrep_gc
resource = Database
|
| 4059 | 2026-01-27T01:14:06.747Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = fm_sitrep_gc
roles = RoleSet { roles: {} }
|
| 4060 | 2026-01-27T01:14:06.748Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = fm_sitrep_gc
resource = Database
result = Ok(())
|
| 4061 | 2026-01-27T01:14:06.750Z | INFO | test_vpcs (oximeter-agent): refreshing list of producers from Nexus
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
file = oximeter/collector/src/agent.rs:557
|
| 4062 | 2026-01-27T01:14:06.750Z | DEBG | test_vpcs (oximeter): client request
body = None
method = GET
uri = http://127.0.0.1:46983/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
|
| 4063 | 2026-01-27T01:14:06.751Z | TRAC | test_vpcs (dropshot_internal): incoming request
local_addr = 127.0.0.1:46983
method = GET
remote_addr = 127.0.0.1:62470
req_id = c1ab1dc7-7db4-4740-a51b-41f0165b23c6
uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
|
| 4064 | 2026-01-27T01:14:06.751Z | DEBG | test_vpcs (dropshot_internal): determined request API version
local_addr = 127.0.0.1:46983
method = GET
remote_addr = 127.0.0.1:62470
req_id = c1ab1dc7-7db4-4740-a51b-41f0165b23c6
uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
version = 1.0.0
|
| 4065 | 2026-01-27T01:14:06.752Z | TRAC | test_vpcs (dropshot_internal): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
authenticated = true
local_addr = 127.0.0.1:46983
method = GET
remote_addr = 127.0.0.1:62470
req_id = c1ab1dc7-7db4-4740-a51b-41f0165b23c6
resource = Database
type = user_builtin
uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
user_builtin_id = 001de000-05e4-4000-8000-000000000002
|
| 4066 | 2026-01-27T01:14:06.752Z | DEBG | test_vpcs (dropshot_internal): roles
authenticated = true
local_addr = 127.0.0.1:46983
method = GET
remote_addr = 127.0.0.1:62470
req_id = c1ab1dc7-7db4-4740-a51b-41f0165b23c6
roles = RoleSet { roles: {} }
type = user_builtin
uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
user_builtin_id = 001de000-05e4-4000-8000-000000000002
|
| 4067 | 2026-01-27T01:14:06.753Z | DEBG | test_vpcs (dropshot_internal): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
authenticated = true
local_addr = 127.0.0.1:46983
method = GET
remote_addr = 127.0.0.1:62470
req_id = c1ab1dc7-7db4-4740-a51b-41f0165b23c6
resource = Database
result = Ok(())
type = user_builtin
uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
user_builtin_id = 001de000-05e4-4000-8000-000000000002
|
| 4068 | 2026-01-27T01:14:06.757Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = fm_sitrep_gc
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 4069 | 2026-01-27T01:14:06.761Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Modify
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = fm_sitrep_gc
resource = Fleet
result = Ok(())
|
| 4070 | 2026-01-27T01:14:06.766Z | DEBG | test_vpcs (SEC): saga log event
new_state = N012 succeeded
sec_id = 913233fe-92a8-4635-9572-183f495429c4
|
| 4071 | 2026-01-27T01:14:06.766Z | DEBG | test_vpcs (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 12
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
|
| 4072 | 2026-01-27T01:14:06.767Z | INFO | test_vpcs (dropshot_internal): request completed
latency_us = 16498
local_addr = 127.0.0.1:46983
method = GET
remote_addr = 127.0.0.1:62470
req_id = c1ab1dc7-7db4-4740-a51b-41f0165b23c6
response_code = 200
uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
|
| 4073 | 2026-01-27T01:14:06.769Z | DEBG | test_vpcs (oximeter): client response
result = Ok(Response { url: "http://127.0.0.1:46983/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending", status: 200, headers: {"content-type": "application/json", "x-request-id": "c1ab1dc7-7db4-4740-a51b-41f0165b23c6", "content-length": "405", "date": "Tue, 27 Jan 2026 01:14:06 GMT"} })
|
| 4074 | 2026-01-27T01:14:06.769Z | DEBG | test_vpcs (oximeter): client request
body = None
method = GET
uri = http://127.0.0.1:46983/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
|
| 4075 | 2026-01-27T01:14:06.770Z | TRAC | test_vpcs (dropshot_internal): incoming request
local_addr = 127.0.0.1:46983
method = GET
remote_addr = 127.0.0.1:62470
req_id = 32203cc2-a35d-4276-8eaf-9294f7d56e15
uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
|
| 4076 | 2026-01-27T01:14:06.770Z | DEBG | test_vpcs (dropshot_internal): determined request API version
local_addr = 127.0.0.1:46983
method = GET
remote_addr = 127.0.0.1:62470
req_id = 32203cc2-a35d-4276-8eaf-9294f7d56e15
uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
version = 1.0.0
|
| 4077 | 2026-01-27T01:14:06.770Z | TRAC | test_vpcs (dropshot_internal): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
authenticated = true
local_addr = 127.0.0.1:46983
method = GET
remote_addr = 127.0.0.1:62470
req_id = 32203cc2-a35d-4276-8eaf-9294f7d56e15
resource = Database
type = user_builtin
uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
user_builtin_id = 001de000-05e4-4000-8000-000000000002
|
| 4078 | 2026-01-27T01:14:06.770Z | DEBG | test_vpcs (dropshot_internal): roles
authenticated = true
local_addr = 127.0.0.1:46983
method = GET
remote_addr = 127.0.0.1:62470
req_id = 32203cc2-a35d-4276-8eaf-9294f7d56e15
roles = RoleSet { roles: {} }
type = user_builtin
uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
user_builtin_id = 001de000-05e4-4000-8000-000000000002
|
| 4079 | 2026-01-27T01:14:06.771Z | DEBG | test_vpcs (dropshot_internal): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
authenticated = true
local_addr = 127.0.0.1:46983
method = GET
remote_addr = 127.0.0.1:62470
req_id = 32203cc2-a35d-4276-8eaf-9294f7d56e15
resource = Database
result = Ok(())
type = user_builtin
uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
user_builtin_id = 001de000-05e4-4000-8000-000000000002
|
| 4080 | 2026-01-27T01:14:06.773Z | DEBG | test_vpcs (SEC): saga log event
new_state = N013 started
sec_id = 913233fe-92a8-4635-9572-183f495429c4
|
| 4081 | 2026-01-27T01:14:06.773Z | DEBG | test_vpcs (SecStore): recording saga event
event_type = Started
node_id = 13
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
|
| 4082 | 2026-01-27T01:14:06.778Z | INFO | test_vpcs (dropshot_internal): request completed
latency_us = 7947
local_addr = 127.0.0.1:46983
method = GET
remote_addr = 127.0.0.1:62470
req_id = 32203cc2-a35d-4276-8eaf-9294f7d56e15
response_code = 200
uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
|
| 4083 | 2026-01-27T01:14:06.779Z | TRAC | test_vpcs (SagaExecutor): authorize begin
action = CreateChild
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: a1a9a9c7-9e7e-48b3-8937-c3723503857b, lookup_type: ByName("springfield-squidport") }, key: 9702b4b6-b761-4a78-93c1-48a3b0004b27, lookup_type: ByName("default") }, key: 9b4d23dd-a0db-427f-957b-c661053a0cc4, lookup_type: ById(9b4d23dd-a0db-427f-957b-c661053a0cc4) }
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
saga_name = project-create
saga_node = VpcCreateV6Route
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4084 | 2026-01-27T01:14:06.779Z | TRAC | test_vpcs (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }
authenticated = true
resource_id = a1a9a9c7-9e7e-48b3-8937-c3723503857b
resource_type = Project
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
saga_name = project-create
saga_node = VpcCreateV6Route
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4085 | 2026-01-27T01:14:06.780Z | TRAC | test_vpcs (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
saga_name = project-create
saga_node = VpcCreateV6Route
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4086 | 2026-01-27T01:14:06.780Z | DEBG | test_vpcs (SagaExecutor): roles
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
saga_name = project-create
saga_node = VpcCreateV6Route
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4087 | 2026-01-27T01:14:06.781Z | DEBG | test_vpcs (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
result = Ok(())
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
saga_name = project-create
saga_node = VpcCreateV6Route
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4088 | 2026-01-27T01:14:06.783Z | DEBG | test_vpcs (oximeter): client response
result = Ok(Response { url: "http://127.0.0.1:46983/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D", status: 200, headers: {"content-type": "application/json", "x-request-id": "32203cc2-a35d-4276-8eaf-9294f7d56e15", "content-length": "29", "date": "Tue, 27 Jan 2026 01:14:06 GMT"} })
|
| 4089 | 2026-01-27T01:14:06.783Z | TRAC | test_vpcs (oximeter-agent): ignoring request to update existing metric producer, since the endpoint information is the same as the existing
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
producer_id = 913233fe-92a8-4635-9572-183f495429c4
|
| 4090 | 2026-01-27T01:14:06.783Z | DEBG | test_vpcs (oximeter-agent): registered new metric producer
address = [::1]:65095
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
producer_id = a6458b7d-87c3-4483-be96-854d814c20de
|
| 4091 | 2026-01-27T01:14:06.783Z | INFO | test_vpcs (oximeter-agent): refreshed list of producers from Nexus
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
file = oximeter/collector/src/agent.rs:632
n_current_tasks = 2
n_pruned_tasks = 0
|
| 4092 | 2026-01-27T01:14:06.856Z | TRAC | test_vpcs (collection-task): top of inner collection loop, waiting for next request
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
producer_id = a6458b7d-87c3-4483-be96-854d814c20de
producer_ip = ::1
producer_port = 65095
|
| 4093 | 2026-01-27T01:14:06.857Z | TRAC | test_vpcs (BackgroundTasks): found multicast groups
background_task = multicast_reconciler
count = 0
state = Active
|
| 4094 | 2026-01-27T01:14:06.857Z | TRAC | test_vpcs (BackgroundTasks): searching for multicast groups
background_task = multicast_reconciler
state = Deleting
|
| 4095 | 2026-01-27T01:14:06.857Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = multicast_reconciler
resource = Database
|
| 4096 | 2026-01-27T01:14:06.858Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = multicast_reconciler
roles = RoleSet { roles: {} }
|
| 4097 | 2026-01-27T01:14:06.859Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = multicast_reconciler
resource = Database
result = Ok(())
|
| 4098 | 2026-01-27T01:14:06.862Z | INFO | test_vpcs (BackgroundTasks): deleted 0 of 0 sitreps sitreps
background_task = fm_sitrep_gc
case_ereports_deleted = 0
cases_deleted = 0
ids = []
sitreps_deleted = 0
|
| 4099 | 2026-01-27T01:14:06.862Z | TRAC | test_vpcs (BackgroundTasks): all 0 orphaned sitreps in this batch have already been deleted
background_task = fm_sitrep_gc
|
| 4100 | 2026-01-27T01:14:06.862Z | INFO | test_vpcs (BackgroundTasks): sitrep garbage collection found 0 orphaned sitreps, deleted 0
background_task = fm_sitrep_gc
|
| 4101 | 2026-01-27T01:14:06.863Z | DEBG | test_vpcs (BackgroundTasks): activation complete
background_task = fm_sitrep_gc
elapsed = 162.736116ms
iteration = 2
status = {"errors":[],"orphaned_sitreps_deleted":0,"orphaned_sitreps_found":0}
|
| 4102 | 2026-01-27T01:14:06.864Z | TRAC | test_vpcs (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }
authenticated = true
resource_id = 001de000-5110-4000-8000-000000000000
resource_type = Silo
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
saga_name = project-create
saga_node = VpcCreateV6Route
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4103 | 2026-01-27T01:14:06.864Z | TRAC | test_vpcs (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
saga_name = project-create
saga_node = VpcCreateV6Route
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4104 | 2026-01-27T01:14:06.865Z | DEBG | test_vpcs (SagaExecutor): roles
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
saga_name = project-create
saga_node = VpcCreateV6Route
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4105 | 2026-01-27T01:14:06.866Z | DEBG | test_vpcs (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
result = Ok(())
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
saga_name = project-create
saga_node = VpcCreateV6Route
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4106 | 2026-01-27T01:14:06.872Z | DEBG | test_vpcs (collection-task): reporting oximeter self-collection statistics
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
producer_id = a6458b7d-87c3-4483-be96-854d814c20de
producer_ip = ::1
producer_port = 65095
|
| 4107 | 2026-01-27T01:14:06.874Z | DEBG | test_vpcs (collection-task): sent timer-based collection request to the collection task
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
producer_id = a6458b7d-87c3-4483-be96-854d814c20de
producer_ip = ::1
producer_port = 65095
|
| 4108 | 2026-01-27T01:14:06.874Z | DEBG | test_vpcs (collection-task): collecting from producer
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
producer_id = a6458b7d-87c3-4483-be96-854d814c20de
producer_ip = ::1
producer_port = 65095
|
| 4109 | 2026-01-27T01:14:06.877Z | TRAC | test_vpcs (collection-task): sent collection request to producer
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
producer_id = a6458b7d-87c3-4483-be96-854d814c20de
producer_ip = ::1
producer_port = 65095
|
| 4110 | 2026-01-27T01:14:06.882Z | DEBG | test_vpcs (collection-task): collected results from producer
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
n_results = 1
producer_id = a6458b7d-87c3-4483-be96-854d814c20de
producer_ip = ::1
producer_port = 65095
|
| 4111 | 2026-01-27T01:14:06.882Z | TRAC | test_vpcs (collection-task): forwarded results to main collection loop
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
producer_id = a6458b7d-87c3-4483-be96-854d814c20de
producer_ip = ::1
producer_port = 65095
|
| 4112 | 2026-01-27T01:14:06.882Z | TRAC | test_vpcs (collection-task): top of inner collection loop, waiting for next request
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
producer_id = a6458b7d-87c3-4483-be96-854d814c20de
producer_ip = ::1
producer_port = 65095
|
| 4113 | 2026-01-27T01:14:06.884Z | TRAC | test_vpcs (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }
authenticated = true
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
saga_name = project-create
saga_node = VpcCreateV6Route
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4114 | 2026-01-27T01:14:06.884Z | TRAC | test_vpcs (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
saga_name = project-create
saga_node = VpcCreateV6Route
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4115 | 2026-01-27T01:14:06.884Z | DEBG | test_vpcs (SagaExecutor): roles
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
saga_name = project-create
saga_node = VpcCreateV6Route
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4116 | 2026-01-27T01:14:06.885Z | DEBG | test_vpcs (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
result = Ok(())
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
saga_name = project-create
saga_node = VpcCreateV6Route
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4117 | 2026-01-27T01:14:06.905Z | DEBG | test_vpcs (SagaExecutor): roles
authenticated = true
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} }
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
saga_name = project-create
saga_node = VpcCreateV6Route
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4118 | 2026-01-27T01:14:06.920Z | DEBG | test_vpcs (SagaExecutor): authorize result
action = CreateChild
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: a1a9a9c7-9e7e-48b3-8937-c3723503857b, lookup_type: ByName("springfield-squidport") }, key: 9702b4b6-b761-4a78-93c1-48a3b0004b27, lookup_type: ByName("default") }, key: 9b4d23dd-a0db-427f-957b-c661053a0cc4, lookup_type: ById(9b4d23dd-a0db-427f-957b-c661053a0cc4) }
result = Ok(())
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
saga_name = project-create
saga_node = VpcCreateV6Route
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4119 | 2026-01-27T01:14:06.920Z | TRAC | test_vpcs (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
saga_name = project-create
saga_node = VpcCreateV6Route
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4120 | 2026-01-27T01:14:06.920Z | DEBG | test_vpcs (SagaExecutor): roles
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
saga_name = project-create
saga_node = VpcCreateV6Route
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4121 | 2026-01-27T01:14:06.920Z | DEBG | test_vpcs (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
result = Ok(())
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
saga_name = project-create
saga_node = VpcCreateV6Route
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4122 | 2026-01-27T01:14:06.967Z | TRAC | test_vpcs (BackgroundTasks): found multicast groups
background_task = multicast_reconciler
count = 0
state = Deleting
|
| 4123 | 2026-01-27T01:14:06.967Z | TRAC | test_vpcs (BackgroundTasks): multicast RPW reconciliation cycle completed
active_groups_verified = 0
background_task = multicast_reconciler
error_count = 0
external_groups_created = 0
external_groups_deleted = 0
member_lifecycle_transitions = 0
orphaned_member_cleanup = 0
total_dpd_operations = 0
|
| 4124 | 2026-01-27T01:14:06.968Z | TRAC | test_vpcs (BackgroundTasks): multicast RPW reconciliation pass completed - dataplane consistent
background_task = multicast_reconciler
|
| 4125 | 2026-01-27T01:14:06.970Z | DEBG | test_vpcs (BackgroundTasks): activation complete
background_task = multicast_reconciler
elapsed = 757.265068ms
iteration = 3
status = {"disabled":false,"empty_groups_marked":0,"errors":[],"groups_created":0,"groups_deleted":0,"groups_verified":0,"members_deleted":0,"members_processed":0}
|
| 4126 | 2026-01-27T01:14:07.019Z | DEBG | test_vpcs (SEC): saga log event
new_state = N013 succeeded
sec_id = 913233fe-92a8-4635-9572-183f495429c4
|
| 4127 | 2026-01-27T01:14:07.019Z | DEBG | test_vpcs (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 13
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
|
| 4128 | 2026-01-27T01:14:07.044Z | DEBG | test_vpcs (SEC): saga log event
new_state = N014 started
sec_id = 913233fe-92a8-4635-9572-183f495429c4
|
| 4129 | 2026-01-27T01:14:07.044Z | DEBG | test_vpcs (SecStore): recording saga event
event_type = Started
node_id = 14
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
|
| 4130 | 2026-01-27T01:14:07.056Z | TRAC | test_vpcs (SagaExecutor): authorize begin
action = CreateChild
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: a1a9a9c7-9e7e-48b3-8937-c3723503857b, lookup_type: ByName("springfield-squidport") }, key: 9702b4b6-b761-4a78-93c1-48a3b0004b27, lookup_type: ByName("default") }
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
saga_name = project-create
saga_node = VpcCreateSubnet
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4131 | 2026-01-27T01:14:07.057Z | TRAC | test_vpcs (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }
authenticated = true
resource_id = a1a9a9c7-9e7e-48b3-8937-c3723503857b
resource_type = Project
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
saga_name = project-create
saga_node = VpcCreateSubnet
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4132 | 2026-01-27T01:14:07.057Z | TRAC | test_vpcs (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
saga_name = project-create
saga_node = VpcCreateSubnet
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4133 | 2026-01-27T01:14:07.057Z | DEBG | test_vpcs (SagaExecutor): roles
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
saga_name = project-create
saga_node = VpcCreateSubnet
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4134 | 2026-01-27T01:14:07.057Z | DEBG | test_vpcs (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
result = Ok(())
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
saga_name = project-create
saga_node = VpcCreateSubnet
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4135 | 2026-01-27T01:14:07.064Z | TRAC | test_vpcs (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }
authenticated = true
resource_id = 001de000-5110-4000-8000-000000000000
resource_type = Silo
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
saga_name = project-create
saga_node = VpcCreateSubnet
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4136 | 2026-01-27T01:14:07.064Z | TRAC | test_vpcs (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
saga_name = project-create
saga_node = VpcCreateSubnet
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4137 | 2026-01-27T01:14:07.064Z | DEBG | test_vpcs (SagaExecutor): roles
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
saga_name = project-create
saga_node = VpcCreateSubnet
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4138 | 2026-01-27T01:14:07.067Z | DEBG | test_vpcs (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
result = Ok(())
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
saga_name = project-create
saga_node = VpcCreateSubnet
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4139 | 2026-01-27T01:14:07.073Z | TRAC | test_vpcs (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }
authenticated = true
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
saga_name = project-create
saga_node = VpcCreateSubnet
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4140 | 2026-01-27T01:14:07.074Z | TRAC | test_vpcs (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
saga_name = project-create
saga_node = VpcCreateSubnet
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4141 | 2026-01-27T01:14:07.074Z | DEBG | test_vpcs (SagaExecutor): roles
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
saga_name = project-create
saga_node = VpcCreateSubnet
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4142 | 2026-01-27T01:14:07.075Z | DEBG | test_vpcs (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
result = Ok(())
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
saga_name = project-create
saga_node = VpcCreateSubnet
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4143 | 2026-01-27T01:14:07.082Z | DEBG | test_vpcs (SagaExecutor): roles
authenticated = true
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} }
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
saga_name = project-create
saga_node = VpcCreateSubnet
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4144 | 2026-01-27T01:14:07.093Z | DEBG | test_vpcs (SagaExecutor): authorize result
action = CreateChild
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: a1a9a9c7-9e7e-48b3-8937-c3723503857b, lookup_type: ByName("springfield-squidport") }, key: 9702b4b6-b761-4a78-93c1-48a3b0004b27, lookup_type: ByName("default") }
result = Ok(())
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
saga_name = project-create
saga_node = VpcCreateSubnet
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4145 | 2026-01-27T01:14:07.101Z | DEBG | test_vpcs (SEC): saga log event
new_state = N014 succeeded
sec_id = 913233fe-92a8-4635-9572-183f495429c4
|
| 4146 | 2026-01-27T01:14:07.101Z | DEBG | test_vpcs (SecStore): recording saga event
event_type = Succeeded(Array [Object {"key": String("8876f6e2-bc47-4ea3-bd82-a5551e4427e8"), "lookup_type": Object {"ById": String("8876f6e2-bc47-4ea3-bd82-a5551e4427e8")}, "parent": Object {"key": String("9702b4b6-b761-4a78-93c1-48a3b0004b27"), "lookup_type": Object {"ByName": String("default")}, "parent": Object {"key": String("a1a9a9c7-9e7e-48b3-8937-c3723503857b"), "lookup_type": Object {"ByName": String("springfield-squidport")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}}}, Object {"custom_router_id": Null, "identity": Object {"description": String("The default subnet for default"), "id": String("8876f6e2-bc47-4ea3-bd82-a5551e4427e8"), "name": String("default"), "time_created": String("2026-01-27T01:14:07.056719Z"), "time_deleted": Null, "time_modified": String("2026-01-27T01:14:07.056719Z")}, "ipv4_block": String("172.30.0.0/22"), "ipv6_block": String("fd6f:1fa5:6c45::/64"), "rcgen": Number(1), "vpc_id": String("9702b4b6-b761-4a78-93c1-48a3b0004b27")}])
node_id = 14
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
|
| 4147 | 2026-01-27T01:14:07.107Z | DEBG | test_vpcs (SEC): saga log event
new_state = N015 started
sec_id = 913233fe-92a8-4635-9572-183f495429c4
|
| 4148 | 2026-01-27T01:14:07.108Z | DEBG | test_vpcs (SecStore): recording saga event
event_type = Started
node_id = 15
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
|
| 4149 | 2026-01-27T01:14:07.114Z | TRAC | test_vpcs (SagaExecutor): authorize begin
action = CreateChild
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: a1a9a9c7-9e7e-48b3-8937-c3723503857b, lookup_type: ByName("springfield-squidport") }, key: 9702b4b6-b761-4a78-93c1-48a3b0004b27, lookup_type: ByName("default") }, key: 9b4d23dd-a0db-427f-957b-c661053a0cc4, lookup_type: ById(9b4d23dd-a0db-427f-957b-c661053a0cc4) }
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
saga_name = project-create
saga_node = VpcCreateSubnetRoute
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4150 | 2026-01-27T01:14:07.115Z | TRAC | test_vpcs (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }
authenticated = true
resource_id = a1a9a9c7-9e7e-48b3-8937-c3723503857b
resource_type = Project
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
saga_name = project-create
saga_node = VpcCreateSubnetRoute
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4151 | 2026-01-27T01:14:07.115Z | TRAC | test_vpcs (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
saga_name = project-create
saga_node = VpcCreateSubnetRoute
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4152 | 2026-01-27T01:14:07.115Z | DEBG | test_vpcs (SagaExecutor): roles
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
saga_name = project-create
saga_node = VpcCreateSubnetRoute
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4153 | 2026-01-27T01:14:07.115Z | DEBG | test_vpcs (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
result = Ok(())
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
saga_name = project-create
saga_node = VpcCreateSubnetRoute
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4154 | 2026-01-27T01:14:07.122Z | TRAC | test_vpcs (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }
authenticated = true
resource_id = 001de000-5110-4000-8000-000000000000
resource_type = Silo
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
saga_name = project-create
saga_node = VpcCreateSubnetRoute
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4155 | 2026-01-27T01:14:07.122Z | TRAC | test_vpcs (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
saga_name = project-create
saga_node = VpcCreateSubnetRoute
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4156 | 2026-01-27T01:14:07.122Z | DEBG | test_vpcs (SagaExecutor): roles
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
saga_name = project-create
saga_node = VpcCreateSubnetRoute
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4157 | 2026-01-27T01:14:07.124Z | DEBG | test_vpcs (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
result = Ok(())
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
saga_name = project-create
saga_node = VpcCreateSubnetRoute
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4158 | 2026-01-27T01:14:07.130Z | TRAC | test_vpcs (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }
authenticated = true
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
saga_name = project-create
saga_node = VpcCreateSubnetRoute
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4159 | 2026-01-27T01:14:07.130Z | TRAC | test_vpcs (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
saga_name = project-create
saga_node = VpcCreateSubnetRoute
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4160 | 2026-01-27T01:14:07.130Z | DEBG | test_vpcs (SagaExecutor): roles
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
saga_name = project-create
saga_node = VpcCreateSubnetRoute
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4161 | 2026-01-27T01:14:07.131Z | DEBG | test_vpcs (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
result = Ok(())
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
saga_name = project-create
saga_node = VpcCreateSubnetRoute
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4162 | 2026-01-27T01:14:07.138Z | DEBG | test_vpcs (SagaExecutor): roles
authenticated = true
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} }
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
saga_name = project-create
saga_node = VpcCreateSubnetRoute
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4163 | 2026-01-27T01:14:07.148Z | DEBG | test_vpcs (SagaExecutor): authorize result
action = CreateChild
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: a1a9a9c7-9e7e-48b3-8937-c3723503857b, lookup_type: ByName("springfield-squidport") }, key: 9702b4b6-b761-4a78-93c1-48a3b0004b27, lookup_type: ByName("default") }, key: 9b4d23dd-a0db-427f-957b-c661053a0cc4, lookup_type: ById(9b4d23dd-a0db-427f-957b-c661053a0cc4) }
result = Ok(())
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
saga_name = project-create
saga_node = VpcCreateSubnetRoute
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4164 | 2026-01-27T01:14:07.148Z | TRAC | test_vpcs (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
saga_name = project-create
saga_node = VpcCreateSubnetRoute
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4165 | 2026-01-27T01:14:07.149Z | DEBG | test_vpcs (SagaExecutor): roles
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
saga_name = project-create
saga_node = VpcCreateSubnetRoute
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4166 | 2026-01-27T01:14:07.149Z | DEBG | test_vpcs (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
result = Ok(())
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
saga_name = project-create
saga_node = VpcCreateSubnetRoute
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4167 | 2026-01-27T01:14:07.158Z | DEBG | test_vpcs (SEC): saga log event
new_state = N015 succeeded
sec_id = 913233fe-92a8-4635-9572-183f495429c4
|
| 4168 | 2026-01-27T01:14:07.158Z | DEBG | test_vpcs (SecStore): recording saga event
event_type = Succeeded(Object {"key": String("70322159-3612-4366-a5c5-0de230edee74"), "lookup_type": Object {"ById": String("8876f6e2-bc47-4ea3-bd82-a5551e4427e8")}, "parent": Object {"key": String("9b4d23dd-a0db-427f-957b-c661053a0cc4"), "lookup_type": Object {"ById": String("9b4d23dd-a0db-427f-957b-c661053a0cc4")}, "parent": Object {"key": String("9702b4b6-b761-4a78-93c1-48a3b0004b27"), "lookup_type": Object {"ByName": String("default")}, "parent": Object {"key": String("a1a9a9c7-9e7e-48b3-8937-c3723503857b"), "lookup_type": Object {"ByName": String("springfield-squidport")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}}}})
node_id = 15
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
|
| 4169 | 2026-01-27T01:14:07.164Z | DEBG | test_vpcs (SEC): saga log event
new_state = N016 started
sec_id = 913233fe-92a8-4635-9572-183f495429c4
|
| 4170 | 2026-01-27T01:14:07.164Z | DEBG | test_vpcs (SecStore): recording saga event
event_type = Started
node_id = 16
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
|
| 4171 | 2026-01-27T01:14:07.169Z | DEBG | test_vpcs (nexus): default firewall rules for vpc default
rules = [VpcFirewallRule { identity: VpcFirewallRuleIdentity { id: d7390906-29d6-4f4b-9d97-88893a590dba, name: Name(Name("allow-internal-inbound")), description: "allow inbound traffic to all instances within the VPC if originated within the VPC", time_created: 2026-01-27T01:14:07.169050657Z, time_modified: 2026-01-27T01:14:07.169050657Z, time_deleted: None }, vpc_id: 9702b4b6-b761-4a78-93c1-48a3b0004b27, status: VpcFirewallRuleStatus(Enabled), direction: VpcFirewallRuleDirection(Inbound), targets: [VpcFirewallRuleTarget(Vpc(Name("default")))], filter_hosts: Some([VpcFirewallRuleHostFilter(Vpc(Name("default")))]), filter_ports: None, filter_protocols: None, action: VpcFirewallRuleAction(Allow), priority: VpcFirewallRulePriority(VpcFirewallRulePriority(65534)) }, VpcFirewallRule { identity: VpcFirewallRuleIdentity { id: 7f70193c-b41c-4531-bcda-b2a064abe782, name: Name(Name("allow-ssh")), description: "allow inbound TCP connections on port 22 from anywhere", time_created: 2026-01-27T01:14:07.169070015Z, time_modified: 2026-01-27T01:14:07.169070015Z, time_deleted: None }, vpc_id: 9702b4b6-b761-4a78-93c1-48a3b0004b27, status: VpcFirewallRuleStatus(Enabled), direction: VpcFirewallRuleDirection(Inbound), targets: [VpcFirewallRuleTarget(Vpc(Name("default")))], filter_hosts: None, filter_ports: Some([L4PortRange(L4PortRange { first: L4Port(22), last: L4Port(22) })]), filter_protocols: Some([VpcFirewallRuleProtocol(Tcp)]), action: VpcFirewallRuleAction(Allow), priority: VpcFirewallRulePriority(VpcFirewallRulePriority(65534)) }, VpcFirewallRule { identity: VpcFirewallRuleIdentity { id: f7debd9d-bf4f-4ca8-8c18-f9d78a7fd783, name: Name(Name("allow-icmp")), description: "allow inbound ICMP traffic from anywhere", time_created: 2026-01-27T01:14:07.169078853Z, time_modified: 2026-01-27T01:14:07.169078853Z, time_deleted: None }, vpc_id: 9702b4b6-b761-4a78-93c1-48a3b0004b27, status: VpcFirewallRuleStatus(Enabled), direction: VpcFirewallRuleDirection(Inbound), targets: [VpcFirewallRuleTarget(Vpc(Name("default")))], filter_hosts: None, filter_ports: None, filter_protocols: Some([VpcFirewallRuleProtocol(Icmp(None))]), action: VpcFirewallRuleAction(Allow), priority: VpcFirewallRulePriority(VpcFirewallRulePriority(65534)) }]
|
| 4172 | 2026-01-27T01:14:07.169Z | TRAC | test_vpcs (SagaExecutor): authorize begin
action = Modify
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: a1a9a9c7-9e7e-48b3-8937-c3723503857b, lookup_type: ByName("springfield-squidport") }, key: 9702b4b6-b761-4a78-93c1-48a3b0004b27, lookup_type: ByName("default") }
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
saga_name = project-create
saga_node = VpcUpdateFirewall
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4173 | 2026-01-27T01:14:07.169Z | TRAC | test_vpcs (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }
authenticated = true
resource_id = a1a9a9c7-9e7e-48b3-8937-c3723503857b
resource_type = Project
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
saga_name = project-create
saga_node = VpcUpdateFirewall
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4174 | 2026-01-27T01:14:07.169Z | TRAC | test_vpcs (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
saga_name = project-create
saga_node = VpcUpdateFirewall
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4175 | 2026-01-27T01:14:07.169Z | DEBG | test_vpcs (SagaExecutor): roles
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
saga_name = project-create
saga_node = VpcUpdateFirewall
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4176 | 2026-01-27T01:14:07.170Z | DEBG | test_vpcs (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
result = Ok(())
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
saga_name = project-create
saga_node = VpcUpdateFirewall
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4177 | 2026-01-27T01:14:07.175Z | TRAC | test_vpcs (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }
authenticated = true
resource_id = 001de000-5110-4000-8000-000000000000
resource_type = Silo
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
saga_name = project-create
saga_node = VpcUpdateFirewall
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4178 | 2026-01-27T01:14:07.175Z | TRAC | test_vpcs (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
saga_name = project-create
saga_node = VpcUpdateFirewall
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4179 | 2026-01-27T01:14:07.176Z | DEBG | test_vpcs (SagaExecutor): roles
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
saga_name = project-create
saga_node = VpcUpdateFirewall
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4180 | 2026-01-27T01:14:07.176Z | DEBG | test_vpcs (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
result = Ok(())
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
saga_name = project-create
saga_node = VpcUpdateFirewall
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4181 | 2026-01-27T01:14:07.182Z | TRAC | test_vpcs (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }
authenticated = true
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
saga_name = project-create
saga_node = VpcUpdateFirewall
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4182 | 2026-01-27T01:14:07.182Z | TRAC | test_vpcs (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
saga_name = project-create
saga_node = VpcUpdateFirewall
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4183 | 2026-01-27T01:14:07.182Z | DEBG | test_vpcs (SagaExecutor): roles
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
saga_name = project-create
saga_node = VpcUpdateFirewall
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4184 | 2026-01-27T01:14:07.183Z | DEBG | test_vpcs (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
result = Ok(())
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
saga_name = project-create
saga_node = VpcUpdateFirewall
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4185 | 2026-01-27T01:14:07.189Z | DEBG | test_vpcs (SagaExecutor): roles
authenticated = true
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} }
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
saga_name = project-create
saga_node = VpcUpdateFirewall
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4186 | 2026-01-27T01:14:07.197Z | DEBG | test_vpcs (SagaExecutor): authorize result
action = Modify
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: a1a9a9c7-9e7e-48b3-8937-c3723503857b, lookup_type: ByName("springfield-squidport") }, key: 9702b4b6-b761-4a78-93c1-48a3b0004b27, lookup_type: ByName("default") }
result = Ok(())
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
saga_name = project-create
saga_node = VpcUpdateFirewall
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4187 | 2026-01-27T01:14:07.197Z | TRAC | test_vpcs (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
saga_name = project-create
saga_node = VpcUpdateFirewall
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4188 | 2026-01-27T01:14:07.197Z | DEBG | test_vpcs (SagaExecutor): roles
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
saga_name = project-create
saga_node = VpcUpdateFirewall
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4189 | 2026-01-27T01:14:07.197Z | DEBG | test_vpcs (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
result = Ok(())
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
saga_name = project-create
saga_node = VpcUpdateFirewall
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4190 | 2026-01-27T01:14:07.334Z | DEBG | test_vpcs (SEC): saga log event
new_state = N016 succeeded
sec_id = 913233fe-92a8-4635-9572-183f495429c4
|
| 4191 | 2026-01-27T01:14:07.335Z | DEBG | test_vpcs (SecStore): recording saga event
event_type = Succeeded(Array [Object {"action": String("allow"), "direction": String("inbound"), "filter_hosts": Array [Object {"type": String("vpc"), "value": String("default")}], "filter_ports": Null, "filter_protocols": Null, "identity": Object {"description": String("allow inbound traffic to all instances within the VPC if originated within the VPC"), "id": String("d7390906-29d6-4f4b-9d97-88893a590dba"), "name": String("allow-internal-inbound"), "time_created": String("2026-01-27T01:14:07.169050657Z"), "time_deleted": Null, "time_modified": String("2026-01-27T01:14:07.169050657Z")}, "priority": Number(65534), "status": String("enabled"), "targets": Array [Object {"type": String("vpc"), "value": String("default")}], "vpc_id": String("9702b4b6-b761-4a78-93c1-48a3b0004b27")}, Object {"action": String("allow"), "direction": String("inbound"), "filter_hosts": Null, "filter_ports": Array [String("22")], "filter_protocols": Array [Object {"type": String("tcp")}], "identity": Object {"description": String("allow inbound TCP connections on port 22 from anywhere"), "id": String("7f70193c-b41c-4531-bcda-b2a064abe782"), "name": String("allow-ssh"), "time_created": String("2026-01-27T01:14:07.169070015Z"), "time_deleted": Null, "time_modified": String("2026-01-27T01:14:07.169070015Z")}, "priority": Number(65534), "status": String("enabled"), "targets": Array [Object {"type": String("vpc"), "value": String("default")}], "vpc_id": String("9702b4b6-b761-4a78-93c1-48a3b0004b27")}, Object {"action": String("allow"), "direction": String("inbound"), "filter_hosts": Null, "filter_ports": Null, "filter_protocols": Array [Object {"type": String("icmp"), "value": Null}], "identity": Object {"description": String("allow inbound ICMP traffic from anywhere"), "id": String("f7debd9d-bf4f-4ca8-8c18-f9d78a7fd783"), "name": String("allow-icmp"), "time_created": String("2026-01-27T01:14:07.169078853Z"), "time_deleted": Null, "time_modified": String("2026-01-27T01:14:07.169078853Z")}, "priority": Number(65534), "status": String("enabled"), "targets": Array [Object {"type": String("vpc"), "value": String("default")}], "vpc_id": String("9702b4b6-b761-4a78-93c1-48a3b0004b27")}])
node_id = 16
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
|
| 4192 | 2026-01-27T01:14:07.341Z | DEBG | test_vpcs (SEC): saga log event
new_state = N017 started
sec_id = 913233fe-92a8-4635-9572-183f495429c4
|
| 4193 | 2026-01-27T01:14:07.341Z | DEBG | test_vpcs (SecStore): recording saga event
event_type = Started
node_id = 17
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
|
| 4194 | 2026-01-27T01:14:07.348Z | TRAC | test_vpcs (SagaExecutor): authorize begin
action = CreateChild
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: a1a9a9c7-9e7e-48b3-8937-c3723503857b, lookup_type: ByName("springfield-squidport") }, key: 9702b4b6-b761-4a78-93c1-48a3b0004b27, lookup_type: ByName("default") }
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
saga_name = project-create
saga_node = VpcCreateGateway
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4195 | 2026-01-27T01:14:07.349Z | TRAC | test_vpcs (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }
authenticated = true
resource_id = a1a9a9c7-9e7e-48b3-8937-c3723503857b
resource_type = Project
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
saga_name = project-create
saga_node = VpcCreateGateway
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4196 | 2026-01-27T01:14:07.349Z | TRAC | test_vpcs (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
saga_name = project-create
saga_node = VpcCreateGateway
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4197 | 2026-01-27T01:14:07.349Z | DEBG | test_vpcs (SagaExecutor): roles
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
saga_name = project-create
saga_node = VpcCreateGateway
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4198 | 2026-01-27T01:14:07.350Z | DEBG | test_vpcs (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
result = Ok(())
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
saga_name = project-create
saga_node = VpcCreateGateway
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4199 | 2026-01-27T01:14:07.359Z | TRAC | test_vpcs (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }
authenticated = true
resource_id = 001de000-5110-4000-8000-000000000000
resource_type = Silo
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
saga_name = project-create
saga_node = VpcCreateGateway
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4200 | 2026-01-27T01:14:07.359Z | TRAC | test_vpcs (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
saga_name = project-create
saga_node = VpcCreateGateway
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4201 | 2026-01-27T01:14:07.360Z | DEBG | test_vpcs (SagaExecutor): roles
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
saga_name = project-create
saga_node = VpcCreateGateway
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4202 | 2026-01-27T01:14:07.361Z | DEBG | test_vpcs (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
result = Ok(())
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
saga_name = project-create
saga_node = VpcCreateGateway
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4203 | 2026-01-27T01:14:07.370Z | TRAC | test_vpcs (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }
authenticated = true
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
saga_name = project-create
saga_node = VpcCreateGateway
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4204 | 2026-01-27T01:14:07.370Z | TRAC | test_vpcs (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
saga_name = project-create
saga_node = VpcCreateGateway
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4205 | 2026-01-27T01:14:07.370Z | DEBG | test_vpcs (SagaExecutor): roles
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
saga_name = project-create
saga_node = VpcCreateGateway
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4206 | 2026-01-27T01:14:07.371Z | DEBG | test_vpcs (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
result = Ok(())
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
saga_name = project-create
saga_node = VpcCreateGateway
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4207 | 2026-01-27T01:14:07.379Z | DEBG | test_vpcs (SagaExecutor): roles
authenticated = true
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} }
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
saga_name = project-create
saga_node = VpcCreateGateway
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4208 | 2026-01-27T01:14:07.397Z | DEBG | test_vpcs (SagaExecutor): authorize result
action = CreateChild
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: a1a9a9c7-9e7e-48b3-8937-c3723503857b, lookup_type: ByName("springfield-squidport") }, key: 9702b4b6-b761-4a78-93c1-48a3b0004b27, lookup_type: ByName("default") }
result = Ok(())
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
saga_name = project-create
saga_node = VpcCreateGateway
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4209 | 2026-01-27T01:14:07.397Z | TRAC | test_vpcs (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
saga_name = project-create
saga_node = VpcCreateGateway
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4210 | 2026-01-27T01:14:07.397Z | DEBG | test_vpcs (SagaExecutor): roles
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
saga_name = project-create
saga_node = VpcCreateGateway
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4211 | 2026-01-27T01:14:07.399Z | DEBG | test_vpcs (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
result = Ok(())
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
saga_name = project-create
saga_node = VpcCreateGateway
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4212 | 2026-01-27T01:14:07.405Z | TRAC | test_vpcs (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
saga_name = project-create
saga_node = VpcCreateGateway
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4213 | 2026-01-27T01:14:07.405Z | DEBG | test_vpcs (SagaExecutor): roles
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
saga_name = project-create
saga_node = VpcCreateGateway
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4214 | 2026-01-27T01:14:07.407Z | DEBG | test_vpcs (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
result = Ok(())
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
saga_name = project-create
saga_node = VpcCreateGateway
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4215 | 2026-01-27T01:14:07.414Z | TRAC | test_vpcs (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
saga_name = project-create
saga_node = VpcCreateGateway
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4216 | 2026-01-27T01:14:07.414Z | DEBG | test_vpcs (SagaExecutor): roles
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
saga_name = project-create
saga_node = VpcCreateGateway
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4217 | 2026-01-27T01:14:07.415Z | DEBG | test_vpcs (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
result = Ok(())
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
saga_name = project-create
saga_node = VpcCreateGateway
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4218 | 2026-01-27T01:14:07.474Z | DEBG | test_vpcs (BackgroundTasks): activating
background_task = reconfigurator_config_watcher
iteration = 4
reason = Timeout
|
| 4219 | 2026-01-27T01:14:07.474Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = reconfigurator_config_watcher
resource = BlueprintConfig
|
| 4220 | 2026-01-27T01:14:07.474Z | TRAC | test_vpcs (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = reconfigurator_config_watcher
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 4221 | 2026-01-27T01:14:07.474Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = reconfigurator_config_watcher
resource = Database
|
| 4222 | 2026-01-27T01:14:07.474Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = reconfigurator_config_watcher
roles = RoleSet { roles: {} }
|
| 4223 | 2026-01-27T01:14:07.475Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = reconfigurator_config_watcher
resource = Database
result = Ok(())
|
| 4224 | 2026-01-27T01:14:07.479Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = reconfigurator_config_watcher
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 4225 | 2026-01-27T01:14:07.487Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = reconfigurator_config_watcher
resource = BlueprintConfig
result = Ok(())
|
| 4226 | 2026-01-27T01:14:07.487Z | TRAC | test_vpcs (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = reconfigurator_config_watcher
resource = Database
|
| 4227 | 2026-01-27T01:14:07.487Z | DEBG | test_vpcs (BackgroundTasks): roles
background_task = reconfigurator_config_watcher
roles = RoleSet { roles: {} }
|
| 4228 | 2026-01-27T01:14:07.488Z | DEBG | test_vpcs (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = reconfigurator_config_watcher
resource = Database
result = Ok(())
|
| 4229 | 2026-01-27T01:14:07.493Z | DEBG | test_vpcs (BackgroundTasks): reconfigurator config load complete
background_task = reconfigurator_config_watcher
switches = Loaded(ReconfiguratorConfigView { version: 1, config: ReconfiguratorConfig { planner_enabled: false, planner_config: PlannerConfig { add_zones_with_mupdate_override: false }, tuf_repo_pruner_enabled: true }, time_modified: 2026-01-27T01:13:51.285464Z })
|
| 4230 | 2026-01-27T01:14:07.493Z | DEBG | test_vpcs (BackgroundTasks): activation complete
background_task = reconfigurator_config_watcher
elapsed = 19.429377ms
iteration = 4
status = {"config_updated":false}
|
| 4231 | 2026-01-27T01:14:07.568Z | WARN | test_vpcs (SagaExecutor): Default ip pool lookup failed: Object (of type ByOther("default unicast IP pool for current silo")) not found: ip-pool. Default gateway has no ip pool association
authenticated = true
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
saga_name = project-create
saga_node = VpcCreateGateway
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4232 | 2026-01-27T01:14:07.568Z | DEBG | test_vpcs (SEC): saga log event
new_state = N017 succeeded
sec_id = 913233fe-92a8-4635-9572-183f495429c4
|
| 4233 | 2026-01-27T01:14:07.568Z | DEBG | test_vpcs (SecStore): recording saga event
event_type = Succeeded(Object {"key": String("3b9499d6-e746-4ec4-846d-b9447f3c858f"), "lookup_type": Object {"ById": String("3b9499d6-e746-4ec4-846d-b9447f3c858f")}, "parent": Object {"key": String("9702b4b6-b761-4a78-93c1-48a3b0004b27"), "lookup_type": Object {"ByName": String("default")}, "parent": Object {"key": String("a1a9a9c7-9e7e-48b3-8937-c3723503857b"), "lookup_type": Object {"ByName": String("springfield-squidport")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}}})
node_id = 17
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
|
| 4234 | 2026-01-27T01:14:07.576Z | DEBG | test_vpcs (SEC): saga log event
new_state = N018 started
sec_id = 913233fe-92a8-4635-9572-183f495429c4
|
| 4235 | 2026-01-27T01:14:07.577Z | DEBG | test_vpcs (SecStore): recording saga event
event_type = Started
node_id = 18
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
|
| 4236 | 2026-01-27T01:14:07.584Z | TRAC | test_vpcs (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
saga_name = project-create
saga_node = VpcNotifySleds
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4237 | 2026-01-27T01:14:07.584Z | DEBG | test_vpcs (SagaExecutor): roles
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
saga_name = project-create
saga_node = VpcNotifySleds
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4238 | 2026-01-27T01:14:07.586Z | DEBG | test_vpcs (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
result = Ok(())
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
saga_name = project-create
saga_node = VpcNotifySleds
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4239 | 2026-01-27T01:14:07.590Z | TRAC | test_vpcs (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
saga_name = project-create
saga_node = VpcNotifySleds
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4240 | 2026-01-27T01:14:07.590Z | DEBG | test_vpcs (SagaExecutor): roles
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
saga_name = project-create
saga_node = VpcNotifySleds
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4241 | 2026-01-27T01:14:07.591Z | DEBG | test_vpcs (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
result = Ok(())
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
saga_name = project-create
saga_node = VpcNotifySleds
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4242 | 2026-01-27T01:14:07.595Z | TRAC | test_vpcs (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
saga_name = project-create
saga_node = VpcNotifySleds
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4243 | 2026-01-27T01:14:07.595Z | DEBG | test_vpcs (SagaExecutor): roles
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
saga_name = project-create
saga_node = VpcNotifySleds
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4244 | 2026-01-27T01:14:07.596Z | DEBG | test_vpcs (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
result = Ok(())
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
saga_name = project-create
saga_node = VpcNotifySleds
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4245 | 2026-01-27T01:14:07.601Z | TRAC | test_vpcs (SagaExecutor): authorize begin
action = ListChildren
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: a1a9a9c7-9e7e-48b3-8937-c3723503857b, lookup_type: ById(a1a9a9c7-9e7e-48b3-8937-c3723503857b) }, key: 9702b4b6-b761-4a78-93c1-48a3b0004b27, lookup_type: ByName("default") }
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
saga_name = project-create
saga_node = VpcNotifySleds
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4246 | 2026-01-27T01:14:07.602Z | TRAC | test_vpcs (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }
authenticated = true
resource_id = a1a9a9c7-9e7e-48b3-8937-c3723503857b
resource_type = Project
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
saga_name = project-create
saga_node = VpcNotifySleds
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4247 | 2026-01-27T01:14:07.602Z | TRAC | test_vpcs (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
saga_name = project-create
saga_node = VpcNotifySleds
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4248 | 2026-01-27T01:14:07.602Z | DEBG | test_vpcs (SagaExecutor): roles
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
saga_name = project-create
saga_node = VpcNotifySleds
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4249 | 2026-01-27T01:14:07.603Z | DEBG | test_vpcs (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
result = Ok(())
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
saga_name = project-create
saga_node = VpcNotifySleds
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4250 | 2026-01-27T01:14:07.609Z | TRAC | test_vpcs (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }
authenticated = true
resource_id = 001de000-5110-4000-8000-000000000000
resource_type = Silo
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
saga_name = project-create
saga_node = VpcNotifySleds
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4251 | 2026-01-27T01:14:07.609Z | TRAC | test_vpcs (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
saga_name = project-create
saga_node = VpcNotifySleds
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4252 | 2026-01-27T01:14:07.609Z | DEBG | test_vpcs (SagaExecutor): roles
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
saga_name = project-create
saga_node = VpcNotifySleds
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4253 | 2026-01-27T01:14:07.610Z | DEBG | test_vpcs (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
result = Ok(())
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
saga_name = project-create
saga_node = VpcNotifySleds
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4254 | 2026-01-27T01:14:07.617Z | TRAC | test_vpcs (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }
authenticated = true
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
saga_name = project-create
saga_node = VpcNotifySleds
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4255 | 2026-01-27T01:14:07.617Z | TRAC | test_vpcs (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
saga_name = project-create
saga_node = VpcNotifySleds
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4256 | 2026-01-27T01:14:07.617Z | DEBG | test_vpcs (SagaExecutor): roles
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
saga_name = project-create
saga_node = VpcNotifySleds
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4257 | 2026-01-27T01:14:07.618Z | DEBG | test_vpcs (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
result = Ok(())
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
saga_name = project-create
saga_node = VpcNotifySleds
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4258 | 2026-01-27T01:14:07.625Z | DEBG | test_vpcs (SagaExecutor): roles
authenticated = true
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} }
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
saga_name = project-create
saga_node = VpcNotifySleds
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4259 | 2026-01-27T01:14:07.638Z | DEBG | test_vpcs (SagaExecutor): authorize result
action = ListChildren
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: a1a9a9c7-9e7e-48b3-8937-c3723503857b, lookup_type: ById(a1a9a9c7-9e7e-48b3-8937-c3723503857b) }, key: 9702b4b6-b761-4a78-93c1-48a3b0004b27, lookup_type: ByName("default") }
result = Ok(())
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
saga_name = project-create
saga_node = VpcNotifySleds
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4260 | 2026-01-27T01:14:07.638Z | TRAC | test_vpcs (SagaExecutor): authorize begin
action = ListChildren
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: a1a9a9c7-9e7e-48b3-8937-c3723503857b, lookup_type: ById(a1a9a9c7-9e7e-48b3-8937-c3723503857b) }, key: 9702b4b6-b761-4a78-93c1-48a3b0004b27, lookup_type: ByName("default") }
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
saga_name = project-create
saga_node = VpcNotifySleds
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4261 | 2026-01-27T01:14:07.638Z | TRAC | test_vpcs (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }
authenticated = true
resource_id = a1a9a9c7-9e7e-48b3-8937-c3723503857b
resource_type = Project
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
saga_name = project-create
saga_node = VpcNotifySleds
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4262 | 2026-01-27T01:14:07.638Z | TRAC | test_vpcs (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
saga_name = project-create
saga_node = VpcNotifySleds
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4263 | 2026-01-27T01:14:07.638Z | DEBG | test_vpcs (SagaExecutor): roles
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
saga_name = project-create
saga_node = VpcNotifySleds
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4264 | 2026-01-27T01:14:07.639Z | DEBG | test_vpcs (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
result = Ok(())
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
saga_name = project-create
saga_node = VpcNotifySleds
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4265 | 2026-01-27T01:14:07.640Z | DEBG | test_vpcs (results-sink): inserting 2 samples into database
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
|
| 4266 | 2026-01-27T01:14:07.640Z | DEBG | test_vpcs (results-sink-cluster): inserting 2 samples into database
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
|
| 4267 | 2026-01-27T01:14:07.641Z | DEBG | test_vpcs (clickhouse-client): unrolling 2 total samples
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 719060a6-12ac-470c-bb91-e566c7f997b2
|
| 4268 | 2026-01-27T01:14:07.644Z | DEBG | test_vpcs (clickhouse-client): retrieving timeseries schema from database
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 719060a6-12ac-470c-bb91-e566c7f997b2
|
| 4269 | 2026-01-27T01:14:07.644Z | TRAC | test_vpcs (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 719060a6-12ac-470c-bb91-e566c7f997b2
sql = SELECT * FROM oximeter.timeseries_schema WHERE timeseries_name NOT IN ('collection_target:cpus_provisioned', 'collection_target:ram_provisioned', 'collection_target:virtual_disk_space_provisioned', 'http_service:request_latency_histogram', 'oximeter_collector:collections') FORMAT Native;
|
| 4270 | 2026-01-27T01:14:07.649Z | TRAC | test_vpcs (clickhouse-client): no new timeseries schema in database
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 719060a6-12ac-470c-bb91-e566c7f997b2
|
| 4271 | 2026-01-27T01:14:07.649Z | DEBG | test_vpcs (clickhouse-client): new timeseries schema
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 719060a6-12ac-470c-bb91-e566c7f997b2
schema = TimeseriesSchema { timeseries_name: TimeseriesName("integration_target:integration_metric"), description: TimeseriesDescription { target: "", metric: "" }, field_schema: {FieldSchema { name: "metric_name", field_type: String, source: Metric, description: "" }, FieldSchema { name: "target_name", field_type: String, source: Target, description: "" }}, datum_type: I64, version: 1, authz_scope: Fleet, units: Count, created: 2026-01-27T01:14:07.643957757Z }
timeseries_name = integration_target:integration_metric
|
| 4272 | 2026-01-27T01:14:07.649Z | DEBG | test_vpcs (clickhouse-client): inserting 1 new timeseries schema
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 719060a6-12ac-470c-bb91-e566c7f997b2
|
| 4273 | 2026-01-27T01:14:07.649Z | TRAC | test_vpcs (clickhouse-client): inserting data
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 719060a6-12ac-470c-bb91-e566c7f997b2
n_columns = 6
n_rows = 1
sql = INSERT INTO oximeter.timeseries_schema FORMAT Native
|
| 4274 | 2026-01-27T01:14:07.650Z | TRAC | test_vpcs (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }
authenticated = true
resource_id = 001de000-5110-4000-8000-000000000000
resource_type = Silo
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
saga_name = project-create
saga_node = VpcNotifySleds
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4275 | 2026-01-27T01:14:07.650Z | TRAC | test_vpcs (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
saga_name = project-create
saga_node = VpcNotifySleds
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4276 | 2026-01-27T01:14:07.650Z | DEBG | test_vpcs (SagaExecutor): roles
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
saga_name = project-create
saga_node = VpcNotifySleds
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4277 | 2026-01-27T01:14:07.651Z | DEBG | test_vpcs (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
result = Ok(())
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
saga_name = project-create
saga_node = VpcNotifySleds
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4278 | 2026-01-27T01:14:07.656Z | TRAC | test_vpcs (clickhouse-client): inserting data
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 719060a6-12ac-470c-bb91-e566c7f997b2
n_columns = 4
n_rows = 2
sql = INSERT INTO oximeter.fields_ipaddr FORMAT Native
|
| 4279 | 2026-01-27T01:14:07.659Z | TRAC | test_vpcs (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }
authenticated = true
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
saga_name = project-create
saga_node = VpcNotifySleds
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4280 | 2026-01-27T01:14:07.659Z | TRAC | test_vpcs (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
saga_name = project-create
saga_node = VpcNotifySleds
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4281 | 2026-01-27T01:14:07.659Z | DEBG | test_vpcs (SagaExecutor): roles
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
saga_name = project-create
saga_node = VpcNotifySleds
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4282 | 2026-01-27T01:14:07.661Z | DEBG | test_vpcs (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
result = Ok(())
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
saga_name = project-create
saga_node = VpcNotifySleds
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4283 | 2026-01-27T01:14:07.671Z | DEBG | test_vpcs (clickhouse-client): inserted rows into table
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 719060a6-12ac-470c-bb91-e566c7f997b2
n_rows = 2
table_name = fields_ipaddr
|
| 4284 | 2026-01-27T01:14:07.672Z | TRAC | test_vpcs (clickhouse-client): inserting data
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 719060a6-12ac-470c-bb91-e566c7f997b2
n_columns = 4
n_rows = 3
sql = INSERT INTO oximeter.fields_string FORMAT Native
|
| 4285 | 2026-01-27T01:14:07.676Z | DEBG | test_vpcs (clickhouse-client): inserted rows into table
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 719060a6-12ac-470c-bb91-e566c7f997b2
n_rows = 3
table_name = fields_string
|
| 4286 | 2026-01-27T01:14:07.676Z | TRAC | test_vpcs (clickhouse-client): inserting data
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 719060a6-12ac-470c-bb91-e566c7f997b2
n_columns = 4
n_rows = 2
sql = INSERT INTO oximeter.fields_u16 FORMAT Native
|
| 4287 | 2026-01-27T01:14:07.679Z | DEBG | test_vpcs (SagaExecutor): roles
authenticated = true
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} }
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
saga_name = project-create
saga_node = VpcNotifySleds
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4288 | 2026-01-27T01:14:07.692Z | DEBG | test_vpcs (SagaExecutor): authorize result
action = ListChildren
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: a1a9a9c7-9e7e-48b3-8937-c3723503857b, lookup_type: ById(a1a9a9c7-9e7e-48b3-8937-c3723503857b) }, key: 9702b4b6-b761-4a78-93c1-48a3b0004b27, lookup_type: ByName("default") }
result = Ok(())
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
saga_name = project-create
saga_node = VpcNotifySleds
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4289 | 2026-01-27T01:14:07.692Z | TRAC | test_vpcs (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
saga_name = project-create
saga_node = VpcNotifySleds
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4290 | 2026-01-27T01:14:07.692Z | DEBG | test_vpcs (SagaExecutor): roles
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
saga_name = project-create
saga_node = VpcNotifySleds
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4291 | 2026-01-27T01:14:07.693Z | DEBG | test_vpcs (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
result = Ok(())
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
saga_name = project-create
saga_node = VpcNotifySleds
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4292 | 2026-01-27T01:14:07.695Z | DEBG | test_vpcs (clickhouse-client): inserted rows into table
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 719060a6-12ac-470c-bb91-e566c7f997b2
n_rows = 2
table_name = fields_u16
|
| 4293 | 2026-01-27T01:14:07.695Z | TRAC | test_vpcs (clickhouse-client): inserting data
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 719060a6-12ac-470c-bb91-e566c7f997b2
n_columns = 4
n_rows = 2
sql = INSERT INTO oximeter.fields_uuid FORMAT Native
|
| 4294 | 2026-01-27T01:14:07.699Z | DEBG | test_vpcs (clickhouse-client): inserted rows into table
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 719060a6-12ac-470c-bb91-e566c7f997b2
n_rows = 2
table_name = fields_uuid
|
| 4295 | 2026-01-27T01:14:07.699Z | TRAC | test_vpcs (clickhouse-client): inserting data
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 719060a6-12ac-470c-bb91-e566c7f997b2
n_columns = 5
n_rows = 1
sql = INSERT INTO oximeter.measurements_cumulativeu64 FORMAT Native
|
| 4296 | 2026-01-27T01:14:07.702Z | DEBG | test_vpcs (clickhouse-client): inserted rows into table
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 719060a6-12ac-470c-bb91-e566c7f997b2
n_rows = 1
table_name = measurements_cumulativeu64
|
| 4297 | 2026-01-27T01:14:07.702Z | TRAC | test_vpcs (clickhouse-client): inserting data
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 719060a6-12ac-470c-bb91-e566c7f997b2
n_columns = 4
n_rows = 1
sql = INSERT INTO oximeter.measurements_i64 FORMAT Native
|
| 4298 | 2026-01-27T01:14:07.706Z | DEBG | test_vpcs (clickhouse-client): inserted rows into table
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 719060a6-12ac-470c-bb91-e566c7f997b2
n_rows = 1
table_name = measurements_i64
|
| 4299 | 2026-01-27T01:14:07.707Z | TRAC | test_vpcs (results-sink): successfully inserted samples
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
|
| 4300 | 2026-01-27T01:14:07.709Z | DEBG | test_vpcs (nexus): resolved names for firewall rules
instance_interfaces = {}
subnet_interfaces = {}
subnet_networks = {}
vpc_interfaces = {}
|
| 4301 | 2026-01-27T01:14:07.709Z | DEBG | test_vpcs (nexus): resolved firewall rules for sled agents
sled_agent_rules = []
|
| 4302 | 2026-01-27T01:14:07.709Z | DEBG | test_vpcs (nexus): resolved 0 rules for sleds
|
| 4303 | 2026-01-27T01:14:07.738Z | DEBG | test_vpcs (nexus): resolved sleds for vpc default
vpc_to_sled = []
|
| 4304 | 2026-01-27T01:14:07.739Z | DEBG | test_vpcs (nexus): sending firewall rules to sled agents
|
| 4305 | 2026-01-27T01:14:07.739Z | INFO | test_vpcs (nexus): updated firewall rules on 0 sleds
|
| 4306 | 2026-01-27T01:14:07.739Z | TRAC | test_vpcs (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
saga_name = project-create
saga_node = VpcNotifySleds
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4307 | 2026-01-27T01:14:07.739Z | DEBG | test_vpcs (SagaExecutor): roles
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
saga_name = project-create
saga_node = VpcNotifySleds
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4308 | 2026-01-27T01:14:07.739Z | DEBG | test_vpcs (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
result = Ok(())
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
saga_name = project-create
saga_node = VpcNotifySleds
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4309 | 2026-01-27T01:14:07.742Z | WARN | test_vpcs (results-sink-cluster): failed to insert some results into metric DB
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
error = Failed to check out connection to database: No backends found for this service
file = oximeter/collector/src/results_sink.rs:92
|
| 4310 | 2026-01-27T01:14:07.746Z | DEBG | test_vpcs (SEC): saga log event
new_state = N018 succeeded
sec_id = 913233fe-92a8-4635-9572-183f495429c4
|
| 4311 | 2026-01-27T01:14:07.746Z | DEBG | test_vpcs (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 18
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
|
| 4312 | 2026-01-27T01:14:07.753Z | DEBG | test_vpcs (SEC): saga log event
new_state = N019 started
sec_id = 913233fe-92a8-4635-9572-183f495429c4
|
| 4313 | 2026-01-27T01:14:07.753Z | DEBG | test_vpcs (SecStore): recording saga event
event_type = Started
node_id = 19
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
|
| 4314 | 2026-01-27T01:14:07.759Z | DEBG | test_vpcs (SEC): saga log event
new_state = N019 succeeded
sec_id = 913233fe-92a8-4635-9572-183f495429c4
|
| 4315 | 2026-01-27T01:14:07.759Z | DEBG | test_vpcs (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 19
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
|
| 4316 | 2026-01-27T01:14:07.765Z | DEBG | test_vpcs (SEC): saga log event
new_state = N021 started
sec_id = 913233fe-92a8-4635-9572-183f495429c4
|
| 4317 | 2026-01-27T01:14:07.766Z | DEBG | test_vpcs (SecStore): recording saga event
event_type = Started
node_id = 21
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
|
| 4318 | 2026-01-27T01:14:07.772Z | DEBG | test_vpcs (SEC): saga log event
new_state = N021 succeeded
sec_id = 913233fe-92a8-4635-9572-183f495429c4
|
| 4319 | 2026-01-27T01:14:07.772Z | DEBG | test_vpcs (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 21
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
|
| 4320 | 2026-01-27T01:14:07.778Z | INFO | test_vpcs (SEC): update for saga cached state
new_state = Done
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
sec_id = 913233fe-92a8-4635-9572-183f495429c4
|
| 4321 | 2026-01-27T01:14:07.779Z | INFO | test_vpcs (SecStore): updating state
new_state = done
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
|
| 4322 | 2026-01-27T01:14:07.785Z | DEBG | test_vpcs (collection-task): sent timer-based collection request to the collection task
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
producer_id = a6458b7d-87c3-4483-be96-854d814c20de
producer_ip = ::1
producer_port = 65095
|
| 4323 | 2026-01-27T01:14:07.786Z | DEBG | test_vpcs (collection-task): collecting from producer
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
producer_id = a6458b7d-87c3-4483-be96-854d814c20de
producer_ip = ::1
producer_port = 65095
|
| 4324 | 2026-01-27T01:14:07.788Z | INFO | test_vpcs (SEC): saga finished
result = success
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
saga_name = project-create
sec_id = 913233fe-92a8-4635-9572-183f495429c4
|
| 4325 | 2026-01-27T01:14:07.789Z | INFO | test_vpcs (SagaQuiesceHandle): tracked saga has finished
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
|
| 4326 | 2026-01-27T01:14:07.790Z | INFO | test_vpcs (SagaExecutor): saga finished
saga_id = 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57
saga_name = project-create
saga_result = SagaResult { saga_id: 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57, saga_log: SagaLog { saga_id: 152db8c8-a5cc-493d-bc43-6f2d6fdd8e57, unwinding: false, events: [N020 started, N020 succeeded, N000 started, N000 succeeded, N001 started, N001 succeeded, N002 started, N002 succeeded, N003 started, N003 succeeded, N004 started, N004 succeeded, N005 started, N005 succeeded, N006 started, N006 succeeded, N007 started, N007 succeeded, N008 started, N008 succeeded, N009 started, N009 succeeded, N010 started, N010 succeeded, N011 started, N011 succeeded, N012 started, N012 succeeded, N013 started, N013 succeeded, N014 started, N014 succeeded, N015 started, N015 succeeded, N016 started, N016 succeeded, N017 started, N017 succeeded, N018 started, N018 succeeded, N019 started, N019 succeeded, N021 started, N021 succeeded], node_status: {0: Succeeded(Array [Object {"key": String("a1a9a9c7-9e7e-48b3-8937-c3723503857b"), "lookup_type": Object {"ByName": String("springfield-squidport")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}, Object {"identity": Object {"description": String("a pier"), "id": String("a1a9a9c7-9e7e-48b3-8937-c3723503857b"), "name": String("springfield-squidport"), "time_created": String("2026-01-27T01:14:05.528374Z"), "time_deleted": Null, "time_modified": String("2026-01-27T01:14:05.528374Z")}, "rcgen": Number(1), "silo_id": String("001de000-5110-4000-8000-000000000000")}]), 1: Succeeded(Object {"authz_project": Object {"key": String("a1a9a9c7-9e7e-48b3-8937-c3723503857b"), "lookup_type": Object {"ByName": String("springfield-squidport")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}, "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}, "credential_id": Null, "device_token_expiration": Null}, Object {"mapped_fleet_roles": Object {}}]}}, "vpc_create": Object {"description": String("Default VPC"), "dns_name": String("default"), "ipv6_prefix": String("fd6f:1fa5:6c45::/48"), "name": String("default")}}), 2: Succeeded(Null), 3: Succeeded(String("9702b4b6-b761-4a78-93c1-48a3b0004b27")), 4: Succeeded(String("9b4d23dd-a0db-427f-957b-c661053a0cc4")), 5: Succeeded(String("02ab13cb-7e3c-4290-85f5-7c4e1cfdbc3f")), 6: Succeeded(String("9b7b7a26-0077-4905-8449-e7599aee34cf")), 7: Succeeded(String("70322159-3612-4366-a5c5-0de230edee74")), 8: Succeeded(String("8876f6e2-bc47-4ea3-bd82-a5551e4427e8")), 9: Succeeded(String("3b9499d6-e746-4ec4-846d-b9447f3c858f")), 10: Succeeded(Array [Object {"key": String("9702b4b6-b761-4a78-93c1-48a3b0004b27"), "lookup_type": Object {"ByName": String("default")}, "parent": Object {"key": String("a1a9a9c7-9e7e-48b3-8937-c3723503857b"), "lookup_type": Object {"ByName": String("springfield-squidport")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}}, Object {"dns_name": String("default"), "firewall_gen": Number(1), "identity": Object {"description": String("Default VPC"), "id": String("9702b4b6-b761-4a78-93c1-48a3b0004b27"), "name": String("default"), "time_created": String("2026-01-27T01:14:06.121281Z"), "time_deleted": Null, "time_modified": String("2026-01-27T01:14:06.121281Z")}, "ipv6_prefix": String("fd6f:1fa5:6c45::/48"), "project_id": String("a1a9a9c7-9e7e-48b3-8937-c3723503857b"), "subnet_gen": Number(1), "system_router_id": String("9b4d23dd-a0db-427f-957b-c661053a0cc4"), "vni": Number(16560289)}]), 11: Succeeded(Object {"key": String("9b4d23dd-a0db-427f-957b-c661053a0cc4"), "lookup_type": Object {"ById": String("9b4d23dd-a0db-427f-957b-c661053a0cc4")}, "parent": Object {"key": String("9702b4b6-b761-4a78-93c1-48a3b0004b27"), "lookup_type": Object {"ByName": String("default")}, "parent": Object {"key": String("a1a9a9c7-9e7e-48b3-8937-c3723503857b"), "lookup_type": Object {"ByName": String("springfield-squidport")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}}}), 12: Succeeded(Null), 13: Succeeded(Null), 14: Succeeded(Array [Object {"key": String("8876f6e2-bc47-4ea3-bd82-a5551e4427e8"), "lookup_type": Object {"ById": String("8876f6e2-bc47-4ea3-bd82-a5551e4427e8")}, "parent": Object {"key": String("9702b4b6-b761-4a78-93c1-48a3b0004b27"), "lookup_type": Object {"ByName": String("default")}, "parent": Object {"key": String("a1a9a9c7-9e7e-48b3-8937-c3723503857b"), "lookup_type": Object {"ByName": String("springfield-squidport")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}}}, Object {"custom_router_id": Null, "identity": Object {"description": String("The default subnet for default"), "id": String("8876f6e2-bc47-4ea3-bd82-a5551e4427e8"), "name": String("default"), "time_created": String("2026-01-27T01:14:07.056719Z"), "time_deleted": Null, "time_modified": String("2026-01-27T01:14:07.056719Z")}, "ipv4_block": String("172.30.0.0/22"), "ipv6_block": String("fd6f:1fa5:6c45::/64"), "rcgen": Number(1), "vpc_id": String("9702b4b6-b761-4a78-93c1-48a3b0004b27")}]), 15: Succeeded(Object {"key": String("70322159-3612-4366-a5c5-0de230edee74"), "lookup_type": Object {"ById": String("8876f6e2-bc47-4ea3-bd82-a5551e4427e8")}, "parent": Object {"key": String("9b4d23dd-a0db-427f-957b-c661053a0cc4"), "lookup_type": Object {"ById": String("9b4d23dd-a0db-427f-957b-c661053a0cc4")}, "parent": Object {"key": String("9702b4b6-b761-4a78-93c1-48a3b0004b27"), "lookup_type": Object {"ByName": String("default")}, "parent": Object {"key": String("a1a9a9c7-9e7e-48b3-8937-c3723503857b"), "lookup_type": Object {"ByName": String("springfield-squidport")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}}}}), 16: Succeeded(Array [Object {"action": String("allow"), "direction": String("inbound"), "filter_hosts": Array [Object {"type": String("vpc"), "value": String("default")}], "filter_ports": Null, "filter_protocols": Null, "identity": Object {"description": String("allow inbound traffic to all instances within the VPC if originated within the VPC"), "id": String("d7390906-29d6-4f4b-9d97-88893a590dba"), "name": String("allow-internal-inbound"), "time_created": String("2026-01-27T01:14:07.169050657Z"), "time_deleted": Null, "time_modified": String("2026-01-27T01:14:07.169050657Z")}, "priority": Number(65534), "status": String("enabled"), "targets": Array [Object {"type": String("vpc"), "value": String("default")}], "vpc_id": String("9702b4b6-b761-4a78-93c1-48a3b0004b27")}, Object {"action": String("allow"), "direction": String("inbound"), "filter_hosts": Null, "filter_ports": Array [String("22")], "filter_protocols": Array [Object {"type": String("tcp")}], "identity": Object {"description": String("allow inbound TCP connections on port 22 from anywhere"), "id": String("7f70193c-b41c-4531-bcda-b2a064abe782"), "name": String("allow-ssh"), "time_created": String("2026-01-27T01:14:07.169070015Z"), "time_deleted": Null, "time_modified": String("2026-01-27T01:14:07.169070015Z")}, "priority": Number(65534), "status": String("enabled"), "targets": Array [Object {"type": String("vpc"), "value": String("default")}], "vpc_id": String("9702b4b6-b761-4a78-93c1-48a3b0004b27")}, Object {"action": String("allow"), "direction": String("inbound"), "filter_hosts": Null, "filter_ports": Null, "filter_protocols": Array [Object {"type": String("icmp"), "value": Null}], "identity": Object {"description": String("allow inbound ICMP traffic from anywhere"), "id": String("f7debd9d-bf4f-4ca8-8c18-f9d78a7fd783"), "name": String("allow-icmp"), "time_created": String("2026-01-27T01:14:07.169078853Z"), "time_deleted": Null, "time_modified": String("2026-01-27T01:14:07.169078853Z")}, "priority": Number(65534), "status": String("enabled"), "targets": Array [Object {"type": String("vpc"), "value": String("default")}], "vpc_id": String("9702b4b6-b761-4a78-93c1-48a3b0004b27")}]), 17: Succeeded(Object {"key": String("3b9499d6-e746-4ec4-846d-b9447f3c858f"), "lookup_type": Object {"ById": String("3b9499d6-e746-4ec4-846d-b9447f3c858f")}, "parent": Object {"key": String("9702b4b6-b761-4a78-93c1-48a3b0004b27"), "lookup_type": Object {"ByName": String("default")}, "parent": Object {"key": String("a1a9a9c7-9e7e-48b3-8937-c3723503857b"), "lookup_type": Object {"ByName": String("springfield-squidport")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}}}), 18: Succeeded(Null), 19: Succeeded(Null), 20: Succeeded(Null), 21: Succeeded(Null)} }, kind: Ok(SagaResultOk { saga_output: Null, node_outputs: {"default_internet_gateway_id": String("3b9499d6-e746-4ec4-846d-b9447f3c858f"), "default_subnet_id": String("8876f6e2-bc47-4ea3-bd82-a5551e4427e8"), "default_v4_route_id": String("02ab13cb-7e3c-4290-85f5-7c4e1cfdbc3f"), "default_v6_route_id": String("9b7b7a26-0077-4905-8449-e7599aee34cf"), "firewall": Array [Object {"action": String("allow"), "direction": String("inbound"), "filter_hosts": Array [Object {"type": String("vpc"), "value": String("default")}], "filter_ports": Null, "filter_protocols": Null, "identity": Object {"description": String("allow inbound traffic to all instances within the VPC if originated within the VPC"), "id": String("d7390906-29d6-4f4b-9d97-88893a590dba"), "name": String("allow-internal-inbound"), "time_created": String("2026-01-27T01:14:07.169050657Z"), "time_deleted": Null, "time_modified": String("2026-01-27T01:14:07.169050657Z")}, "priority": Number(65534), "status": String("enabled"), "targets": Array [Object {"type": String("vpc"), "value": String("default")}], "vpc_id": String("9702b4b6-b761-4a78-93c1-48a3b0004b27")}, Object {"action": String("allow"), "direction": String("inbound"), "filter_hosts": Null, "filter_ports": Array [String("22")], "filter_protocols": Array [Object {"type": String("tcp")}], "identity": Object {"description": String("allow inbound TCP connections on port 22 from anywhere"), "id": String("7f70193c-b41c-4531-bcda-b2a064abe782"), "name": String("allow-ssh"), "time_created": String("2026-01-27T01:14:07.169070015Z"), "time_deleted": Null, "time_modified": String("2026-01-27T01:14:07.169070015Z")}, "priority": Number(65534), "status": String("enabled"), "targets": Array [Object {"type": String("vpc"), "value": String("default")}], "vpc_id": String("9702b4b6-b761-4a78-93c1-48a3b0004b27")}, Object {"action": String("allow"), "direction": String("inbound"), "filter_hosts": Null, "filter_ports": Null, "filter_protocols": Array [Object {"type": String("icmp"), "value": Null}], "identity": Object {"description": String("allow inbound ICMP traffic from anywhere"), "id": String("f7debd9d-bf4f-4ca8-8c18-f9d78a7fd783"), "name": String("allow-icmp"), "time_created": String("2026-01-27T01:14:07.169078853Z"), "time_deleted": Null, "time_modified": String("2026-01-27T01:14:07.169078853Z")}, "priority": Number(65534), "status": String("enabled"), "targets": Array [Object {"type": String("vpc"), "value": String("default")}], "vpc_id": String("9702b4b6-b761-4a78-93c1-48a3b0004b27")}], "gateway": Object {"key": String("3b9499d6-e746-4ec4-846d-b9447f3c858f"), "lookup_type": Object {"ById": String("3b9499d6-e746-4ec4-846d-b9447f3c858f")}, "parent": Object {"key": String("9702b4b6-b761-4a78-93c1-48a3b0004b27"), "lookup_type": Object {"ByName": String("default")}, "parent": Object {"key": String("a1a9a9c7-9e7e-48b3-8937-c3723503857b"), "lookup_type": Object {"ByName": String("springfield-squidport")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}}}, "no_result": Null, "project": Array [Object {"key": String("a1a9a9c7-9e7e-48b3-8937-c3723503857b"), "lookup_type": Object {"ByName": String("springfield-squidport")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}, Object {"identity": Object {"description": String("a pier"), "id": String("a1a9a9c7-9e7e-48b3-8937-c3723503857b"), "name": String("springfield-squidport"), "time_created": String("2026-01-27T01:14:05.528374Z"), "time_deleted": Null, "time_modified": String("2026-01-27T01:14:05.528374Z")}, "rcgen": Number(1), "silo_id": String("001de000-5110-4000-8000-000000000000")}], "route": Object {"key": String("70322159-3612-4366-a5c5-0de230edee74"), "lookup_type": Object {"ById": String("8876f6e2-bc47-4ea3-bd82-a5551e4427e8")}, "parent": Object {"key": String("9b4d23dd-a0db-427f-957b-c661053a0cc4"), "lookup_type": Object {"ById": String("9b4d23dd-a0db-427f-957b-c661053a0cc4")}, "parent": Object {"key": String("9702b4b6-b761-4a78-93c1-48a3b0004b27"), "lookup_type": Object {"ByName": String("default")}, "parent": Object {"key": String("a1a9a9c7-9e7e-48b3-8937-c3723503857b"), "lookup_type": Object {"ByName": String("springfield-squidport")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}}}}, "route4": Null, "route6": Null, "router": Object {"key": String("9b4d23dd-a0db-427f-957b-c661053a0cc4"), "lookup_type": Object {"ById": String("9b4d23dd-a0db-427f-957b-c661053a0cc4")}, "parent": Object {"key": String("9702b4b6-b761-4a78-93c1-48a3b0004b27"), "lookup_type": Object {"ByName": String("default")}, "parent": Object {"key": String("a1a9a9c7-9e7e-48b3-8937-c3723503857b"), "lookup_type": Object {"ByName": String("springfield-squidport")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}}}, "subnet": Array [Object {"key": String("8876f6e2-bc47-4ea3-bd82-a5551e4427e8"), "lookup_type": Object {"ById": String("8876f6e2-bc47-4ea3-bd82-a5551e4427e8")}, "parent": Object {"key": String("9702b4b6-b761-4a78-93c1-48a3b0004b27"), "lookup_type": Object {"ByName": String("default")}, "parent": Object {"key": String("a1a9a9c7-9e7e-48b3-8937-c3723503857b"), "lookup_type": Object {"ByName": String("springfield-squidport")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}}}, Object {"custom_router_id": Null, "identity": Object {"description": String("The default subnet for default"), "id": String("8876f6e2-bc47-4ea3-bd82-a5551e4427e8"), "name": String("default"), "time_created": String("2026-01-27T01:14:07.056719Z"), "time_deleted": Null, "time_modified": String("2026-01-27T01:14:07.056719Z")}, "ipv4_block": String("172.30.0.0/22"), "ipv6_block": String("fd6f:1fa5:6c45::/64"), "rcgen": Number(1), "vpc_id": String("9702b4b6-b761-4a78-93c1-48a3b0004b27")}], "subnet_route_id": String("70322159-3612-4366-a5c5-0de230edee74"), "system_router_id": String("9b4d23dd-a0db-427f-957b-c661053a0cc4"), "vpc": Null, "vpc_create_params": Object {"authz_project": Object {"key": String("a1a9a9c7-9e7e-48b3-8937-c3723503857b"), "lookup_type": Object {"ByName": String("springfield-squidport")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}, "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}, "credential_id": Null, "device_token_expiration": Null}, Object {"mapped_fleet_roles": Object {}}]}}, "vpc_create": Object {"description": String("Default VPC"), "dns_name": String("default"), "ipv6_prefix": String("fd6f:1fa5:6c45::/48"), "name": String("default")}}, "vpc_id": String("9702b4b6-b761-4a78-93c1-48a3b0004b27")} }) }
|
| 4327 | 2026-01-27T01:14:07.791Z | TRAC | test_vpcs (dropshot_external): authorize begin
action = CreateChild
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
local_addr = 127.0.0.1:50372
method = POST
remote_addr = 127.0.0.1:38658
req_id = 080f25fb-73f3-4a96-a048-da3d85194d7a
resource = AuditLog
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
uri = /v1/projects
|
| 4328 | 2026-01-27T01:14:07.791Z | TRAC | test_vpcs (dropshot_external): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }
authenticated = true
local_addr = 127.0.0.1:50372
method = POST
remote_addr = 127.0.0.1:38658
req_id = 080f25fb-73f3-4a96-a048-da3d85194d7a
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
uri = /v1/projects
|
| 4329 | 2026-01-27T01:14:07.792Z | TRAC | test_vpcs (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
local_addr = 127.0.0.1:50372
method = POST
remote_addr = 127.0.0.1:38658
req_id = 080f25fb-73f3-4a96-a048-da3d85194d7a
resource = Database
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
uri = /v1/projects
|
| 4330 | 2026-01-27T01:14:07.792Z | DEBG | test_vpcs (dropshot_external): roles
authenticated = true
local_addr = 127.0.0.1:50372
method = POST
remote_addr = 127.0.0.1:38658
req_id = 080f25fb-73f3-4a96-a048-da3d85194d7a
roles = RoleSet { roles: {} }
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
uri = /v1/projects
|
| 4331 | 2026-01-27T01:14:07.792Z | DEBG | test_vpcs (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
local_addr = 127.0.0.1:50372
method = POST
remote_addr = 127.0.0.1:38658
req_id = 080f25fb-73f3-4a96-a048-da3d85194d7a
resource = Database
result = Ok(())
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
uri = /v1/projects
|
| 4332 | 2026-01-27T01:14:07.794Z | TRAC | test_vpcs (collection-task): sent collection request to producer
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
producer_id = a6458b7d-87c3-4483-be96-854d814c20de
producer_ip = ::1
producer_port = 65095
|
| 4333 | 2026-01-27T01:14:07.795Z | DEBG | test_vpcs (collection-task): collected results from producer
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
n_results = 1
producer_id = a6458b7d-87c3-4483-be96-854d814c20de
producer_ip = ::1
producer_port = 65095
|
| 4334 | 2026-01-27T01:14:07.795Z | TRAC | test_vpcs (collection-task): forwarded results to main collection loop
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
producer_id = a6458b7d-87c3-4483-be96-854d814c20de
producer_ip = ::1
producer_port = 65095
|
| 4335 | 2026-01-27T01:14:07.795Z | TRAC | test_vpcs (collection-task): top of inner collection loop, waiting for next request
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
producer_id = a6458b7d-87c3-4483-be96-854d814c20de
producer_ip = ::1
producer_port = 65095
|
| 4336 | 2026-01-27T01:14:07.801Z | DEBG | test_vpcs (dropshot_external): roles
authenticated = true
local_addr = 127.0.0.1:50372
method = POST
remote_addr = 127.0.0.1:38658
req_id = 080f25fb-73f3-4a96-a048-da3d85194d7a
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
uri = /v1/projects
|
| 4337 | 2026-01-27T01:14:07.804Z | DEBG | test_vpcs (dropshot_external): authorize result
action = CreateChild
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
local_addr = 127.0.0.1:50372
method = POST
remote_addr = 127.0.0.1:38658
req_id = 080f25fb-73f3-4a96-a048-da3d85194d7a
resource = AuditLog
result = Ok(())
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
uri = /v1/projects
|
| 4338 | 2026-01-27T01:14:07.804Z | TRAC | test_vpcs (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
local_addr = 127.0.0.1:50372
method = POST
remote_addr = 127.0.0.1:38658
req_id = 080f25fb-73f3-4a96-a048-da3d85194d7a
resource = Database
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
uri = /v1/projects
|
| 4339 | 2026-01-27T01:14:07.804Z | DEBG | test_vpcs (dropshot_external): roles
authenticated = true
local_addr = 127.0.0.1:50372
method = POST
remote_addr = 127.0.0.1:38658
req_id = 080f25fb-73f3-4a96-a048-da3d85194d7a
roles = RoleSet { roles: {} }
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
uri = /v1/projects
|
| 4340 | 2026-01-27T01:14:07.805Z | DEBG | test_vpcs (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
local_addr = 127.0.0.1:50372
method = POST
remote_addr = 127.0.0.1:38658
req_id = 080f25fb-73f3-4a96-a048-da3d85194d7a
resource = Database
result = Ok(())
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
uri = /v1/projects
|
| 4341 | 2026-01-27T01:14:07.885Z | INFO | test_vpcs (dropshot_external): request completed
latency_us = 3027490
local_addr = 127.0.0.1:50372
method = POST
remote_addr = 127.0.0.1:38658
req_id = 080f25fb-73f3-4a96-a048-da3d85194d7a
response_code = 201
uri = /v1/projects
|
| 4342 | 2026-01-27T01:14:07.886Z | INFO | test_vpcs (external client test context): client received response
status = 201
|
| 4343 | 2026-01-27T01:14:07.886Z | INFO | test_vpcs (external client test context): client request
body = Body { inner: BoxBody }
method = POST
uri = http://127.0.0.1:50372/v1/projects
|
| 4344 | 2026-01-27T01:14:07.886Z | TRAC | test_vpcs (dropshot_external): incoming request
local_addr = 127.0.0.1:50372
method = POST
remote_addr = 127.0.0.1:38658
req_id = 2c4023ef-c6a2-448b-9a04-47ec3b9e1661
uri = /v1/projects
|
| 4345 | 2026-01-27T01:14:07.887Z | DEBG | test_vpcs (dropshot_external): determined request API version
local_addr = 127.0.0.1:50372
method = POST
remote_addr = 127.0.0.1:38658
req_id = 2c4023ef-c6a2-448b-9a04-47ec3b9e1661
uri = /v1/projects
version = 2026012300.0.0
|
| 4346 | 2026-01-27T01:14:07.887Z | TRAC | test_vpcs (dropshot_external): authn: trying Spoof
local_addr = 127.0.0.1:50372
method = POST
remote_addr = 127.0.0.1:38658
req_id = 2c4023ef-c6a2-448b-9a04-47ec3b9e1661
uri = /v1/projects
|
| 4347 | 2026-01-27T01:14:07.887Z | DEBG | test_vpcs (dropshot_external): looking up silo for user
local_addr = 127.0.0.1:50372
method = POST
remote_addr = 127.0.0.1:38658
req_id = 2c4023ef-c6a2-448b-9a04-47ec3b9e1661
silo_user_id = 001de000-05e4-4000-8000-000000004007
uri = /v1/projects
|
| 4348 | 2026-01-27T01:14:07.888Z | TRAC | test_vpcs (ExternalAuthn): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. })
resource = Database
|
| 4349 | 2026-01-27T01:14:07.888Z | DEBG | test_vpcs (ExternalAuthn): roles
roles = RoleSet { roles: {} }
|
| 4350 | 2026-01-27T01:14:07.889Z | DEBG | test_vpcs (ExternalAuthn): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 4351 | 2026-01-27T01:14:07.897Z | TRAC | test_vpcs (ExternalAuthn): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. })
resource = Database
|
| 4352 | 2026-01-27T01:14:07.897Z | DEBG | test_vpcs (ExternalAuthn): roles
roles = RoleSet { roles: {} }
|
| 4353 | 2026-01-27T01:14:07.898Z | DEBG | test_vpcs (ExternalAuthn): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 4354 | 2026-01-27T01:14:07.905Z | TRAC | test_vpcs (ExternalAuthn): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. })
resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007 (silo_user), lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
|
| 4355 | 2026-01-27T01:14:07.905Z | TRAC | test_vpcs (ExternalAuthn): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. }
resource_id = 001de000-5110-4000-8000-000000000000
resource_type = Silo
|
| 4356 | 2026-01-27T01:14:07.905Z | TRAC | test_vpcs (ExternalAuthn): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. })
resource = Database
|
| 4357 | 2026-01-27T01:14:07.905Z | DEBG | test_vpcs (ExternalAuthn): roles
roles = RoleSet { roles: {} }
|
| 4358 | 2026-01-27T01:14:07.906Z | DEBG | test_vpcs (ExternalAuthn): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 4359 | 2026-01-27T01:14:07.910Z | TRAC | test_vpcs (ExternalAuthn): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 4360 | 2026-01-27T01:14:07.911Z | TRAC | test_vpcs (ExternalAuthn): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. })
resource = Database
|
| 4361 | 2026-01-27T01:14:07.911Z | DEBG | test_vpcs (ExternalAuthn): roles
roles = RoleSet { roles: {} }
|
| 4362 | 2026-01-27T01:14:07.912Z | DEBG | test_vpcs (ExternalAuthn): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 4363 | 2026-01-27T01:14:07.917Z | DEBG | test_vpcs (ExternalAuthn): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
|
| 4364 | 2026-01-27T01:14:07.922Z | DEBG | test_vpcs (ExternalAuthn): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. })
resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007 (silo_user), lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
result = Ok(())
|
| 4365 | 2026-01-27T01:14:07.922Z | TRAC | test_vpcs (ExternalAuthn): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. })
resource = Database
|
| 4366 | 2026-01-27T01:14:07.923Z | DEBG | test_vpcs (ExternalAuthn): roles
roles = RoleSet { roles: {} }
|
| 4367 | 2026-01-27T01:14:07.923Z | DEBG | test_vpcs (ExternalAuthn): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 4368 | 2026-01-27T01:14:07.929Z | TRAC | test_vpcs (ExternalAuthn): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. })
resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
|
| 4369 | 2026-01-27T01:14:07.930Z | TRAC | test_vpcs (ExternalAuthn): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. }
resource_id = 001de000-5110-4000-8000-000000000000
resource_type = Silo
|
| 4370 | 2026-01-27T01:14:07.930Z | TRAC | test_vpcs (ExternalAuthn): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. })
resource = Database
|
| 4371 | 2026-01-27T01:14:07.930Z | DEBG | test_vpcs (ExternalAuthn): roles
roles = RoleSet { roles: {} }
|
| 4372 | 2026-01-27T01:14:07.931Z | DEBG | test_vpcs (ExternalAuthn): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 4373 | 2026-01-27T01:14:07.936Z | TRAC | test_vpcs (ExternalAuthn): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 4374 | 2026-01-27T01:14:07.937Z | TRAC | test_vpcs (ExternalAuthn): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. })
resource = Database
|
| 4375 | 2026-01-27T01:14:07.937Z | DEBG | test_vpcs (ExternalAuthn): roles
roles = RoleSet { roles: {} }
|
| 4376 | 2026-01-27T01:14:07.937Z | DEBG | test_vpcs (ExternalAuthn): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 4377 | 2026-01-27T01:14:07.943Z | DEBG | test_vpcs (ExternalAuthn): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
|
| 4378 | 2026-01-27T01:14:07.949Z | DEBG | test_vpcs (ExternalAuthn): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. })
resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
result = Ok(())
|
| 4379 | 2026-01-27T01:14:07.950Z | TRAC | test_vpcs (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }, device_token_expiration: None, credential_id: None }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [Spoof] })
local_addr = 127.0.0.1:50372
method = POST
remote_addr = 127.0.0.1:38658
req_id = 2c4023ef-c6a2-448b-9a04-47ec3b9e1661
uri = /v1/projects
|
| 4380 | 2026-01-27T01:14:07.950Z | TRAC | test_vpcs (dropshot_external): authorize begin
action = CreateChild
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
local_addr = 127.0.0.1:50372
method = POST
remote_addr = 127.0.0.1:38658
req_id = 2c4023ef-c6a2-448b-9a04-47ec3b9e1661
resource = AuditLog
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
uri = /v1/projects
|
| 4381 | 2026-01-27T01:14:07.951Z | TRAC | test_vpcs (dropshot_external): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }
authenticated = true
local_addr = 127.0.0.1:50372
method = POST
remote_addr = 127.0.0.1:38658
req_id = 2c4023ef-c6a2-448b-9a04-47ec3b9e1661
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
uri = /v1/projects
|
| 4382 | 2026-01-27T01:14:07.951Z | TRAC | test_vpcs (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
local_addr = 127.0.0.1:50372
method = POST
remote_addr = 127.0.0.1:38658
req_id = 2c4023ef-c6a2-448b-9a04-47ec3b9e1661
resource = Database
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
uri = /v1/projects
|
| 4383 | 2026-01-27T01:14:07.951Z | DEBG | test_vpcs (dropshot_external): roles
authenticated = true
local_addr = 127.0.0.1:50372
method = POST
remote_addr = 127.0.0.1:38658
req_id = 2c4023ef-c6a2-448b-9a04-47ec3b9e1661
roles = RoleSet { roles: {} }
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
uri = /v1/projects
|
| 4384 | 2026-01-27T01:14:07.952Z | DEBG | test_vpcs (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
local_addr = 127.0.0.1:50372
method = POST
remote_addr = 127.0.0.1:38658
req_id = 2c4023ef-c6a2-448b-9a04-47ec3b9e1661
resource = Database
result = Ok(())
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
uri = /v1/projects
|
| 4385 | 2026-01-27T01:14:07.960Z | DEBG | test_vpcs (dropshot_external): roles
authenticated = true
local_addr = 127.0.0.1:50372
method = POST
remote_addr = 127.0.0.1:38658
req_id = 2c4023ef-c6a2-448b-9a04-47ec3b9e1661
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
uri = /v1/projects
|
| 4386 | 2026-01-27T01:14:07.963Z | DEBG | test_vpcs (dropshot_external): authorize result
action = CreateChild
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
local_addr = 127.0.0.1:50372
method = POST
remote_addr = 127.0.0.1:38658
req_id = 2c4023ef-c6a2-448b-9a04-47ec3b9e1661
resource = AuditLog
result = Ok(())
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
uri = /v1/projects
|
| 4387 | 2026-01-27T01:14:07.963Z | TRAC | test_vpcs (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
local_addr = 127.0.0.1:50372
method = POST
remote_addr = 127.0.0.1:38658
req_id = 2c4023ef-c6a2-448b-9a04-47ec3b9e1661
resource = Database
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
uri = /v1/projects
|
| 4388 | 2026-01-27T01:14:07.963Z | DEBG | test_vpcs (dropshot_external): roles
authenticated = true
local_addr = 127.0.0.1:50372
method = POST
remote_addr = 127.0.0.1:38658
req_id = 2c4023ef-c6a2-448b-9a04-47ec3b9e1661
roles = RoleSet { roles: {} }
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
uri = /v1/projects
|
| 4389 | 2026-01-27T01:14:07.964Z | DEBG | test_vpcs (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
local_addr = 127.0.0.1:50372
method = POST
remote_addr = 127.0.0.1:38658
req_id = 2c4023ef-c6a2-448b-9a04-47ec3b9e1661
resource = Database
result = Ok(())
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
uri = /v1/projects
|
| 4390 | 2026-01-27T01:14:07.969Z | TRAC | test_vpcs (dropshot_external): authorize begin
action = CreateChild
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
local_addr = 127.0.0.1:50372
method = POST
remote_addr = 127.0.0.1:38658
req_id = 2c4023ef-c6a2-448b-9a04-47ec3b9e1661
resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
uri = /v1/projects
|
| 4391 | 2026-01-27T01:14:07.969Z | TRAC | test_vpcs (dropshot_external): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }
authenticated = true
local_addr = 127.0.0.1:50372
method = POST
remote_addr = 127.0.0.1:38658
req_id = 2c4023ef-c6a2-448b-9a04-47ec3b9e1661
resource_id = 001de000-5110-4000-8000-000000000000
resource_type = Silo
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
uri = /v1/projects
|
| 4392 | 2026-01-27T01:14:07.969Z | TRAC | test_vpcs (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
local_addr = 127.0.0.1:50372
method = POST
remote_addr = 127.0.0.1:38658
req_id = 2c4023ef-c6a2-448b-9a04-47ec3b9e1661
resource = Database
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
uri = /v1/projects
|
| 4393 | 2026-01-27T01:14:07.969Z | DEBG | test_vpcs (dropshot_external): roles
authenticated = true
local_addr = 127.0.0.1:50372
method = POST
remote_addr = 127.0.0.1:38658
req_id = 2c4023ef-c6a2-448b-9a04-47ec3b9e1661
roles = RoleSet { roles: {} }
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
uri = /v1/projects
|
| 4394 | 2026-01-27T01:14:07.970Z | DEBG | test_vpcs (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
local_addr = 127.0.0.1:50372
method = POST
remote_addr = 127.0.0.1:38658
req_id = 2c4023ef-c6a2-448b-9a04-47ec3b9e1661
resource = Database
result = Ok(())
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
uri = /v1/projects
|
| 4395 | 2026-01-27T01:14:07.976Z | TRAC | test_vpcs (dropshot_external): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }
authenticated = true
local_addr = 127.0.0.1:50372
method = POST
remote_addr = 127.0.0.1:38658
req_id = 2c4023ef-c6a2-448b-9a04-47ec3b9e1661
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
uri = /v1/projects
|
| 4396 | 2026-01-27T01:14:07.976Z | TRAC | test_vpcs (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
local_addr = 127.0.0.1:50372
method = POST
remote_addr = 127.0.0.1:38658
req_id = 2c4023ef-c6a2-448b-9a04-47ec3b9e1661
resource = Database
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
uri = /v1/projects
|
| 4397 | 2026-01-27T01:14:07.976Z | DEBG | test_vpcs (dropshot_external): roles
authenticated = true
local_addr = 127.0.0.1:50372
method = POST
remote_addr = 127.0.0.1:38658
req_id = 2c4023ef-c6a2-448b-9a04-47ec3b9e1661
roles = RoleSet { roles: {} }
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
uri = /v1/projects
|
| 4398 | 2026-01-27T01:14:07.977Z | DEBG | test_vpcs (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
local_addr = 127.0.0.1:50372
method = POST
remote_addr = 127.0.0.1:38658
req_id = 2c4023ef-c6a2-448b-9a04-47ec3b9e1661
resource = Database
result = Ok(())
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
uri = /v1/projects
|
| 4399 | 2026-01-27T01:14:07.982Z | DEBG | test_vpcs (dropshot_external): roles
authenticated = true
local_addr = 127.0.0.1:50372
method = POST
remote_addr = 127.0.0.1:38658
req_id = 2c4023ef-c6a2-448b-9a04-47ec3b9e1661
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} }
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
uri = /v1/projects
|
| 4400 | 2026-01-27T01:14:07.987Z | DEBG | test_vpcs (dropshot_external): authorize result
action = CreateChild
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
local_addr = 127.0.0.1:50372
method = POST
remote_addr = 127.0.0.1:38658
req_id = 2c4023ef-c6a2-448b-9a04-47ec3b9e1661
resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
result = Ok(())
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
uri = /v1/projects
|
| 4401 | 2026-01-27T01:14:07.988Z | INFO | test_vpcs (SagaQuiesceHandle): tracking newly created saga
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
|
| 4402 | 2026-01-27T01:14:07.988Z | INFO | test_vpcs (SagaExecutor): preparing saga
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
saga_name = project-create
|
| 4403 | 2026-01-27T01:14:07.988Z | INFO | test_vpcs (SEC): saga create
dag = {"end_node":21,"graph":{"edge_property":"directed","edges":[[0,1,null],[1,2,null],[3,4,null],[4,5,null],[5,6,null],[6,7,null],[7,8,null],[8,9,null],[9,10,null],[10,11,null],[11,12,null],[12,13,null],[13,14,null],[14,15,null],[15,16,null],[16,17,null],[17,18,null],[2,3,null],[18,19,null],[20,0,null],[19,21,null]],"node_holes":[],"nodes":[{"Action":{"action_name":"project_create.project_create_record","label":"ProjectCreateRecord","name":"project"}},{"Action":{"action_name":"project_create.project_create_vpc_params","label":"ProjectCreateVpcParams","name":"vpc_create_params"}},{"SubsagaStart":{"params_node_name":"vpc_create_params","saga_name":"vpc-create"}},{"Action":{"action_name":"common.uuid_generate","label":"GenerateVpcId","name":"vpc_id"}},{"Action":{"action_name":"common.uuid_generate","label":"GenerateSystemRouterId","name":"system_router_id"}},{"Action":{"action_name":"common.uuid_generate","label":"GenerateDefaultV4RouteId","name":"default_v4_route_id"}},{"Action":{"action_name":"common.uuid_generate","label":"GenerateDefaultV6RouteId","name":"default_v6_route_id"}},{"Action":{"action_name":"common.uuid_generate","label":"GenerateSubnetRouteId","name":"subnet_route_id"}},{"Action":{"action_name":"common.uuid_generate","label":"GenerateDefaultSubnetId","name":"default_subnet_id"}},{"Action":{"action_name":"common.uuid_generate","label":"GenerateDefaultInternetGatewayId","name":"default_internet_gateway_id"}},{"Action":{"action_name":"vpc_create.vpc_create_vpc","label":"VpcCreateVpc","name":"vpc"}},{"Action":{"action_name":"vpc_create.vpc_create_router","label":"VpcCreateRouter","name":"router"}},{"Action":{"action_name":"vpc_create.vpc_create_v4_route","label":"VpcCreateV4Route","name":"route4"}},{"Action":{"action_name":"vpc_create.vpc_create_v6_route","label":"VpcCreateV6Route","name":"route6"}},{"Action":{"action_name":"vpc_create.vpc_create_subnet","label":"VpcCreateSubnet","name":"subnet"}},{"Action":{"action_name":"vpc_create.vpc_create_subnet_route","label":"VpcCreateSubnetRoute","name":"route"}},{"Action":{"action_name":"vpc_create.vpc_update_firewall","label":"VpcUpdateFirewall","name":"firewall"}},{"Action":{"action_name":"vpc_create.vpc_create_gateway","label":"VpcCreateGateway","name":"gateway"}},{"Action":{"action_name":"vpc_create.vpc_notify_sleds","label":"VpcNotifySleds","name":"no_result"}},{"SubsagaEnd":{"name":"vpc"}},{"Start":{"params":{"authz_silo":{"key":"001de000-5110-4000-8000-000000000000","lookup_type":{"ById":"001de000-5110-4000-8000-000000000000"},"parent":null},"project_create":{"description":"a pier","name":"peeky-park"},"serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}},"credential_id":null,"device_token_expiration":null},{"mapped_fleet_roles":{}}]}}}}},"End"]},"saga_name":"project-create","start_node":20}
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
saga_name = project-create
sec_id = 913233fe-92a8-4635-9572-183f495429c4
|
| 4404 | 2026-01-27T01:14:07.988Z | INFO | test_vpcs (SecStore): creating saga
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
saga_name = project-create
|
| 4405 | 2026-01-27T01:14:07.994Z | INFO | test_vpcs (SagaExecutor): starting saga
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
saga_name = project-create
|
| 4406 | 2026-01-27T01:14:07.994Z | INFO | test_vpcs (SEC): saga start
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
saga_name = project-create
sec_id = 913233fe-92a8-4635-9572-183f495429c4
|
| 4407 | 2026-01-27T01:14:07.994Z | DEBG | test_vpcs (SEC): saga log event
new_state = N020 started
sec_id = 913233fe-92a8-4635-9572-183f495429c4
|
| 4408 | 2026-01-27T01:14:07.994Z | DEBG | test_vpcs (SecStore): recording saga event
event_type = Started
node_id = 20
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
|
| 4409 | 2026-01-27T01:14:07.999Z | DEBG | test_vpcs (SEC): saga log event
new_state = N020 succeeded
sec_id = 913233fe-92a8-4635-9572-183f495429c4
|
| 4410 | 2026-01-27T01:14:07.999Z | DEBG | test_vpcs (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 20
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
|
| 4411 | 2026-01-27T01:14:08.005Z | DEBG | test_vpcs (SEC): saga log event
new_state = N000 started
sec_id = 913233fe-92a8-4635-9572-183f495429c4
|
| 4412 | 2026-01-27T01:14:08.005Z | DEBG | test_vpcs (SecStore): recording saga event
event_type = Started
node_id = 0
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
|
| 4413 | 2026-01-27T01:14:08.010Z | TRAC | test_vpcs (SagaExecutor): authorize begin
action = CreateChild
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
saga_name = project-create
saga_node = ProjectCreateRecord
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4414 | 2026-01-27T01:14:08.010Z | TRAC | test_vpcs (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }
authenticated = true
resource_id = 001de000-5110-4000-8000-000000000000
resource_type = Silo
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
saga_name = project-create
saga_node = ProjectCreateRecord
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4415 | 2026-01-27T01:14:08.010Z | TRAC | test_vpcs (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
saga_name = project-create
saga_node = ProjectCreateRecord
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4416 | 2026-01-27T01:14:08.010Z | DEBG | test_vpcs (SagaExecutor): roles
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
saga_name = project-create
saga_node = ProjectCreateRecord
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4417 | 2026-01-27T01:14:08.011Z | DEBG | test_vpcs (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
result = Ok(())
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
saga_name = project-create
saga_node = ProjectCreateRecord
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4418 | 2026-01-27T01:14:08.017Z | TRAC | test_vpcs (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }
authenticated = true
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
saga_name = project-create
saga_node = ProjectCreateRecord
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4419 | 2026-01-27T01:14:08.017Z | TRAC | test_vpcs (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
saga_name = project-create
saga_node = ProjectCreateRecord
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4420 | 2026-01-27T01:14:08.017Z | DEBG | test_vpcs (SagaExecutor): roles
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
saga_name = project-create
saga_node = ProjectCreateRecord
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4421 | 2026-01-27T01:14:08.018Z | DEBG | test_vpcs (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
result = Ok(())
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
saga_name = project-create
saga_node = ProjectCreateRecord
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4422 | 2026-01-27T01:14:08.023Z | DEBG | test_vpcs (SagaExecutor): roles
authenticated = true
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} }
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
saga_name = project-create
saga_node = ProjectCreateRecord
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4423 | 2026-01-27T01:14:08.029Z | DEBG | test_vpcs (SagaExecutor): authorize result
action = CreateChild
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
result = Ok(())
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
saga_name = project-create
saga_node = ProjectCreateRecord
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4424 | 2026-01-27T01:14:08.029Z | TRAC | test_vpcs (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
saga_name = project-create
saga_node = ProjectCreateRecord
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4425 | 2026-01-27T01:14:08.030Z | DEBG | test_vpcs (SagaExecutor): roles
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
saga_name = project-create
saga_node = ProjectCreateRecord
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4426 | 2026-01-27T01:14:08.030Z | DEBG | test_vpcs (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
result = Ok(())
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
saga_name = project-create
saga_node = ProjectCreateRecord
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4427 | 2026-01-27T01:14:08.048Z | DEBG | test_vpcs (SEC): saga log event
new_state = N000 succeeded
sec_id = 913233fe-92a8-4635-9572-183f495429c4
|
| 4428 | 2026-01-27T01:14:08.048Z | DEBG | test_vpcs (SecStore): recording saga event
event_type = Succeeded(Array [Object {"key": String("87aaa4f1-0672-47bd-b399-8861de8da8e7"), "lookup_type": Object {"ByName": String("peeky-park")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}, Object {"identity": Object {"description": String("a pier"), "id": String("87aaa4f1-0672-47bd-b399-8861de8da8e7"), "name": String("peeky-park"), "time_created": String("2026-01-27T01:14:08.010405Z"), "time_deleted": Null, "time_modified": String("2026-01-27T01:14:08.010405Z")}, "rcgen": Number(1), "silo_id": String("001de000-5110-4000-8000-000000000000")}])
node_id = 0
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
|
| 4429 | 2026-01-27T01:14:08.054Z | DEBG | test_vpcs (SEC): saga log event
new_state = N001 started
sec_id = 913233fe-92a8-4635-9572-183f495429c4
|
| 4430 | 2026-01-27T01:14:08.054Z | DEBG | test_vpcs (SecStore): recording saga event
event_type = Started
node_id = 1
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
|
| 4431 | 2026-01-27T01:14:08.060Z | DEBG | test_vpcs (SEC): saga log event
new_state = N001 succeeded
sec_id = 913233fe-92a8-4635-9572-183f495429c4
|
| 4432 | 2026-01-27T01:14:08.060Z | DEBG | test_vpcs (SecStore): recording saga event
event_type = Succeeded(Object {"authz_project": Object {"key": String("87aaa4f1-0672-47bd-b399-8861de8da8e7"), "lookup_type": Object {"ByName": String("peeky-park")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}, "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}, "credential_id": Null, "device_token_expiration": Null}, Object {"mapped_fleet_roles": Object {}}]}}, "vpc_create": Object {"description": String("Default VPC"), "dns_name": String("default"), "ipv6_prefix": String("fd4f:f905:66ff::/48"), "name": String("default")}})
node_id = 1
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
|
| 4433 | 2026-01-27T01:14:08.065Z | DEBG | test_vpcs (SEC): saga log event
new_state = N002 started
sec_id = 913233fe-92a8-4635-9572-183f495429c4
|
| 4434 | 2026-01-27T01:14:08.065Z | DEBG | test_vpcs (SecStore): recording saga event
event_type = Started
node_id = 2
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
|
| 4435 | 2026-01-27T01:14:08.072Z | DEBG | test_vpcs (SEC): saga log event
new_state = N002 succeeded
sec_id = 913233fe-92a8-4635-9572-183f495429c4
|
| 4436 | 2026-01-27T01:14:08.072Z | DEBG | test_vpcs (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 2
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
|
| 4437 | 2026-01-27T01:14:08.078Z | DEBG | test_vpcs (SEC): saga log event
new_state = N003 started
sec_id = 913233fe-92a8-4635-9572-183f495429c4
|
| 4438 | 2026-01-27T01:14:08.078Z | DEBG | test_vpcs (SecStore): recording saga event
event_type = Started
node_id = 3
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
|
| 4439 | 2026-01-27T01:14:08.084Z | DEBG | test_vpcs (SEC): saga log event
new_state = N003 succeeded
sec_id = 913233fe-92a8-4635-9572-183f495429c4
|
| 4440 | 2026-01-27T01:14:08.084Z | DEBG | test_vpcs (SecStore): recording saga event
event_type = Succeeded(String("f8e83d21-ccf9-418f-8d28-ef8fd953b403"))
node_id = 3
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
|
| 4441 | 2026-01-27T01:14:08.089Z | DEBG | test_vpcs (SEC): saga log event
new_state = N004 started
sec_id = 913233fe-92a8-4635-9572-183f495429c4
|
| 4442 | 2026-01-27T01:14:08.089Z | DEBG | test_vpcs (SecStore): recording saga event
event_type = Started
node_id = 4
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
|
| 4443 | 2026-01-27T01:14:08.095Z | DEBG | test_vpcs (SEC): saga log event
new_state = N004 succeeded
sec_id = 913233fe-92a8-4635-9572-183f495429c4
|
| 4444 | 2026-01-27T01:14:08.095Z | DEBG | test_vpcs (SecStore): recording saga event
event_type = Succeeded(String("6f241441-d4fd-4437-8ab8-d9c03a5832e5"))
node_id = 4
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
|
| 4445 | 2026-01-27T01:14:08.100Z | DEBG | test_vpcs (SEC): saga log event
new_state = N005 started
sec_id = 913233fe-92a8-4635-9572-183f495429c4
|
| 4446 | 2026-01-27T01:14:08.100Z | DEBG | test_vpcs (SecStore): recording saga event
event_type = Started
node_id = 5
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
|
| 4447 | 2026-01-27T01:14:08.116Z | DEBG | test_vpcs (SEC): saga log event
new_state = N005 succeeded
sec_id = 913233fe-92a8-4635-9572-183f495429c4
|
| 4448 | 2026-01-27T01:14:08.116Z | DEBG | test_vpcs (SecStore): recording saga event
event_type = Succeeded(String("a5817081-3c59-4ea3-bdad-a2d0ab0a5ba8"))
node_id = 5
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
|
| 4449 | 2026-01-27T01:14:08.122Z | DEBG | test_vpcs (SEC): saga log event
new_state = N006 started
sec_id = 913233fe-92a8-4635-9572-183f495429c4
|
| 4450 | 2026-01-27T01:14:08.122Z | DEBG | test_vpcs (SecStore): recording saga event
event_type = Started
node_id = 6
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
|
| 4451 | 2026-01-27T01:14:08.127Z | DEBG | test_vpcs (SEC): saga log event
new_state = N006 succeeded
sec_id = 913233fe-92a8-4635-9572-183f495429c4
|
| 4452 | 2026-01-27T01:14:08.127Z | DEBG | test_vpcs (SecStore): recording saga event
event_type = Succeeded(String("658602dc-bb9c-41aa-a110-25ca7f2e4f51"))
node_id = 6
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
|
| 4453 | 2026-01-27T01:14:08.132Z | DEBG | test_vpcs (SEC): saga log event
new_state = N007 started
sec_id = 913233fe-92a8-4635-9572-183f495429c4
|
| 4454 | 2026-01-27T01:14:08.132Z | DEBG | test_vpcs (SecStore): recording saga event
event_type = Started
node_id = 7
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
|
| 4455 | 2026-01-27T01:14:08.137Z | DEBG | test_vpcs (SEC): saga log event
new_state = N007 succeeded
sec_id = 913233fe-92a8-4635-9572-183f495429c4
|
| 4456 | 2026-01-27T01:14:08.137Z | DEBG | test_vpcs (SecStore): recording saga event
event_type = Succeeded(String("1a75a3ca-5545-42be-b4cb-8883d818a039"))
node_id = 7
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
|
| 4457 | 2026-01-27T01:14:08.142Z | DEBG | test_vpcs (SEC): saga log event
new_state = N008 started
sec_id = 913233fe-92a8-4635-9572-183f495429c4
|
| 4458 | 2026-01-27T01:14:08.143Z | DEBG | test_vpcs (SecStore): recording saga event
event_type = Started
node_id = 8
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
|
| 4459 | 2026-01-27T01:14:08.147Z | DEBG | test_vpcs (SEC): saga log event
new_state = N008 succeeded
sec_id = 913233fe-92a8-4635-9572-183f495429c4
|
| 4460 | 2026-01-27T01:14:08.147Z | DEBG | test_vpcs (SecStore): recording saga event
event_type = Succeeded(String("0d13bfa0-224d-4f5f-872e-6bda5c7f29ea"))
node_id = 8
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
|
| 4461 | 2026-01-27T01:14:08.153Z | DEBG | test_vpcs (SEC): saga log event
new_state = N009 started
sec_id = 913233fe-92a8-4635-9572-183f495429c4
|
| 4462 | 2026-01-27T01:14:08.153Z | DEBG | test_vpcs (SecStore): recording saga event
event_type = Started
node_id = 9
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
|
| 4463 | 2026-01-27T01:14:08.159Z | DEBG | test_vpcs (SEC): saga log event
new_state = N009 succeeded
sec_id = 913233fe-92a8-4635-9572-183f495429c4
|
| 4464 | 2026-01-27T01:14:08.159Z | DEBG | test_vpcs (SecStore): recording saga event
event_type = Succeeded(String("1579c14d-e5cd-40f7-a168-ce2924cd16a7"))
node_id = 9
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
|
| 4465 | 2026-01-27T01:14:08.165Z | DEBG | test_vpcs (SEC): saga log event
new_state = N010 started
sec_id = 913233fe-92a8-4635-9572-183f495429c4
|
| 4466 | 2026-01-27T01:14:08.165Z | DEBG | test_vpcs (SecStore): recording saga event
event_type = Started
node_id = 10
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
|
| 4467 | 2026-01-27T01:14:08.171Z | TRAC | test_vpcs (SagaExecutor): authorize begin
action = CreateChild
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 87aaa4f1-0672-47bd-b399-8861de8da8e7, lookup_type: ByName("peeky-park") }
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
saga_name = project-create
saga_node = VpcCreateVpc
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4468 | 2026-01-27T01:14:08.171Z | TRAC | test_vpcs (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }
authenticated = true
resource_id = 87aaa4f1-0672-47bd-b399-8861de8da8e7
resource_type = Project
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
saga_name = project-create
saga_node = VpcCreateVpc
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4469 | 2026-01-27T01:14:08.171Z | TRAC | test_vpcs (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
saga_name = project-create
saga_node = VpcCreateVpc
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4470 | 2026-01-27T01:14:08.171Z | DEBG | test_vpcs (SagaExecutor): roles
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
saga_name = project-create
saga_node = VpcCreateVpc
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4471 | 2026-01-27T01:14:08.172Z | DEBG | test_vpcs (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
result = Ok(())
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
saga_name = project-create
saga_node = VpcCreateVpc
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4472 | 2026-01-27T01:14:08.177Z | TRAC | test_vpcs (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }
authenticated = true
resource_id = 001de000-5110-4000-8000-000000000000
resource_type = Silo
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
saga_name = project-create
saga_node = VpcCreateVpc
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4473 | 2026-01-27T01:14:08.178Z | TRAC | test_vpcs (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
saga_name = project-create
saga_node = VpcCreateVpc
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4474 | 2026-01-27T01:14:08.178Z | DEBG | test_vpcs (SagaExecutor): roles
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
saga_name = project-create
saga_node = VpcCreateVpc
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4475 | 2026-01-27T01:14:08.179Z | DEBG | test_vpcs (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
result = Ok(())
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
saga_name = project-create
saga_node = VpcCreateVpc
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4476 | 2026-01-27T01:14:08.185Z | TRAC | test_vpcs (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }
authenticated = true
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
saga_name = project-create
saga_node = VpcCreateVpc
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4477 | 2026-01-27T01:14:08.185Z | TRAC | test_vpcs (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
saga_name = project-create
saga_node = VpcCreateVpc
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4478 | 2026-01-27T01:14:08.185Z | DEBG | test_vpcs (SagaExecutor): roles
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
saga_name = project-create
saga_node = VpcCreateVpc
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4479 | 2026-01-27T01:14:08.187Z | DEBG | test_vpcs (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
result = Ok(())
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
saga_name = project-create
saga_node = VpcCreateVpc
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4480 | 2026-01-27T01:14:08.193Z | DEBG | test_vpcs (SagaExecutor): roles
authenticated = true
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} }
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
saga_name = project-create
saga_node = VpcCreateVpc
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4481 | 2026-01-27T01:14:08.202Z | DEBG | test_vpcs (SagaExecutor): authorize result
action = CreateChild
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 87aaa4f1-0672-47bd-b399-8861de8da8e7, lookup_type: ByName("peeky-park") }
result = Ok(())
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
saga_name = project-create
saga_node = VpcCreateVpc
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4482 | 2026-01-27T01:14:08.202Z | TRAC | test_vpcs (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
saga_name = project-create
saga_node = VpcCreateVpc
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4483 | 2026-01-27T01:14:08.202Z | DEBG | test_vpcs (SagaExecutor): roles
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
saga_name = project-create
saga_node = VpcCreateVpc
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4484 | 2026-01-27T01:14:08.202Z | DEBG | test_vpcs (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
result = Ok(())
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
saga_name = project-create
saga_node = VpcCreateVpc
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4485 | 2026-01-27T01:14:08.215Z | DEBG | test_vpcs (SEC): saga log event
new_state = N010 succeeded
sec_id = 913233fe-92a8-4635-9572-183f495429c4
|
| 4486 | 2026-01-27T01:14:08.215Z | DEBG | test_vpcs (SecStore): recording saga event
event_type = Succeeded(Array [Object {"key": String("f8e83d21-ccf9-418f-8d28-ef8fd953b403"), "lookup_type": Object {"ByName": String("default")}, "parent": Object {"key": String("87aaa4f1-0672-47bd-b399-8861de8da8e7"), "lookup_type": Object {"ByName": String("peeky-park")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}}, Object {"dns_name": String("default"), "firewall_gen": Number(1), "identity": Object {"description": String("Default VPC"), "id": String("f8e83d21-ccf9-418f-8d28-ef8fd953b403"), "name": String("default"), "time_created": String("2026-01-27T01:14:08.171344Z"), "time_deleted": Null, "time_modified": String("2026-01-27T01:14:08.171344Z")}, "ipv6_prefix": String("fd4f:f905:66ff::/48"), "project_id": String("87aaa4f1-0672-47bd-b399-8861de8da8e7"), "subnet_gen": Number(1), "system_router_id": String("6f241441-d4fd-4437-8ab8-d9c03a5832e5"), "vni": Number(9338389)}])
node_id = 10
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
|
| 4487 | 2026-01-27T01:14:08.223Z | DEBG | test_vpcs (SEC): saga log event
new_state = N011 started
sec_id = 913233fe-92a8-4635-9572-183f495429c4
|
| 4488 | 2026-01-27T01:14:08.223Z | DEBG | test_vpcs (SecStore): recording saga event
event_type = Started
node_id = 11
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
|
| 4489 | 2026-01-27T01:14:08.230Z | TRAC | test_vpcs (SagaExecutor): authorize begin
action = CreateChild
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 87aaa4f1-0672-47bd-b399-8861de8da8e7, lookup_type: ByName("peeky-park") }, key: f8e83d21-ccf9-418f-8d28-ef8fd953b403, lookup_type: ByName("default") }
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
saga_name = project-create
saga_node = VpcCreateRouter
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4490 | 2026-01-27T01:14:08.231Z | TRAC | test_vpcs (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }
authenticated = true
resource_id = 87aaa4f1-0672-47bd-b399-8861de8da8e7
resource_type = Project
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
saga_name = project-create
saga_node = VpcCreateRouter
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4491 | 2026-01-27T01:14:08.231Z | TRAC | test_vpcs (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
saga_name = project-create
saga_node = VpcCreateRouter
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4492 | 2026-01-27T01:14:08.231Z | DEBG | test_vpcs (SagaExecutor): roles
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
saga_name = project-create
saga_node = VpcCreateRouter
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4493 | 2026-01-27T01:14:08.233Z | DEBG | test_vpcs (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
result = Ok(())
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
saga_name = project-create
saga_node = VpcCreateRouter
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4494 | 2026-01-27T01:14:08.239Z | TRAC | test_vpcs (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }
authenticated = true
resource_id = 001de000-5110-4000-8000-000000000000
resource_type = Silo
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
saga_name = project-create
saga_node = VpcCreateRouter
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4495 | 2026-01-27T01:14:08.239Z | TRAC | test_vpcs (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
saga_name = project-create
saga_node = VpcCreateRouter
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4496 | 2026-01-27T01:14:08.239Z | DEBG | test_vpcs (SagaExecutor): roles
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
saga_name = project-create
saga_node = VpcCreateRouter
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4497 | 2026-01-27T01:14:08.240Z | DEBG | test_vpcs (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
result = Ok(())
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
saga_name = project-create
saga_node = VpcCreateRouter
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4498 | 2026-01-27T01:14:08.250Z | TRAC | test_vpcs (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }
authenticated = true
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
saga_name = project-create
saga_node = VpcCreateRouter
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4499 | 2026-01-27T01:14:08.250Z | TRAC | test_vpcs (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
saga_name = project-create
saga_node = VpcCreateRouter
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4500 | 2026-01-27T01:14:08.250Z | DEBG | test_vpcs (SagaExecutor): roles
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
saga_name = project-create
saga_node = VpcCreateRouter
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4501 | 2026-01-27T01:14:08.251Z | DEBG | test_vpcs (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
result = Ok(())
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
saga_name = project-create
saga_node = VpcCreateRouter
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4502 | 2026-01-27T01:14:08.257Z | DEBG | test_vpcs (SagaExecutor): roles
authenticated = true
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} }
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
saga_name = project-create
saga_node = VpcCreateRouter
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4503 | 2026-01-27T01:14:08.267Z | DEBG | test_vpcs (SagaExecutor): authorize result
action = CreateChild
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 87aaa4f1-0672-47bd-b399-8861de8da8e7, lookup_type: ByName("peeky-park") }, key: f8e83d21-ccf9-418f-8d28-ef8fd953b403, lookup_type: ByName("default") }
result = Ok(())
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
saga_name = project-create
saga_node = VpcCreateRouter
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4504 | 2026-01-27T01:14:08.267Z | TRAC | test_vpcs (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
saga_name = project-create
saga_node = VpcCreateRouter
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4505 | 2026-01-27T01:14:08.267Z | DEBG | test_vpcs (SagaExecutor): roles
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
saga_name = project-create
saga_node = VpcCreateRouter
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4506 | 2026-01-27T01:14:08.268Z | DEBG | test_vpcs (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
result = Ok(())
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
saga_name = project-create
saga_node = VpcCreateRouter
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4507 | 2026-01-27T01:14:08.338Z | DEBG | test_vpcs (SEC): saga log event
new_state = N011 succeeded
sec_id = 913233fe-92a8-4635-9572-183f495429c4
|
| 4508 | 2026-01-27T01:14:08.338Z | DEBG | test_vpcs (SecStore): recording saga event
event_type = Succeeded(Object {"key": String("6f241441-d4fd-4437-8ab8-d9c03a5832e5"), "lookup_type": Object {"ById": String("6f241441-d4fd-4437-8ab8-d9c03a5832e5")}, "parent": Object {"key": String("f8e83d21-ccf9-418f-8d28-ef8fd953b403"), "lookup_type": Object {"ByName": String("default")}, "parent": Object {"key": String("87aaa4f1-0672-47bd-b399-8861de8da8e7"), "lookup_type": Object {"ByName": String("peeky-park")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}}})
node_id = 11
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
|
| 4509 | 2026-01-27T01:14:08.355Z | DEBG | test_vpcs (SEC): saga log event
new_state = N012 started
sec_id = 913233fe-92a8-4635-9572-183f495429c4
|
| 4510 | 2026-01-27T01:14:08.356Z | DEBG | test_vpcs (SecStore): recording saga event
event_type = Started
node_id = 12
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
|
| 4511 | 2026-01-27T01:14:08.362Z | TRAC | test_vpcs (SagaExecutor): authorize begin
action = CreateChild
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 87aaa4f1-0672-47bd-b399-8861de8da8e7, lookup_type: ByName("peeky-park") }, key: f8e83d21-ccf9-418f-8d28-ef8fd953b403, lookup_type: ByName("default") }, key: 6f241441-d4fd-4437-8ab8-d9c03a5832e5, lookup_type: ById(6f241441-d4fd-4437-8ab8-d9c03a5832e5) }
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
saga_name = project-create
saga_node = VpcCreateV4Route
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4512 | 2026-01-27T01:14:08.362Z | TRAC | test_vpcs (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }
authenticated = true
resource_id = 87aaa4f1-0672-47bd-b399-8861de8da8e7
resource_type = Project
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
saga_name = project-create
saga_node = VpcCreateV4Route
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4513 | 2026-01-27T01:14:08.362Z | TRAC | test_vpcs (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
saga_name = project-create
saga_node = VpcCreateV4Route
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4514 | 2026-01-27T01:14:08.362Z | DEBG | test_vpcs (SagaExecutor): roles
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
saga_name = project-create
saga_node = VpcCreateV4Route
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4515 | 2026-01-27T01:14:08.363Z | DEBG | test_vpcs (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
result = Ok(())
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
saga_name = project-create
saga_node = VpcCreateV4Route
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4516 | 2026-01-27T01:14:08.369Z | TRAC | test_vpcs (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }
authenticated = true
resource_id = 001de000-5110-4000-8000-000000000000
resource_type = Silo
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
saga_name = project-create
saga_node = VpcCreateV4Route
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4517 | 2026-01-27T01:14:08.369Z | TRAC | test_vpcs (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
saga_name = project-create
saga_node = VpcCreateV4Route
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4518 | 2026-01-27T01:14:08.369Z | DEBG | test_vpcs (SagaExecutor): roles
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
saga_name = project-create
saga_node = VpcCreateV4Route
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4519 | 2026-01-27T01:14:08.370Z | DEBG | test_vpcs (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
result = Ok(())
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
saga_name = project-create
saga_node = VpcCreateV4Route
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4520 | 2026-01-27T01:14:08.376Z | TRAC | test_vpcs (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }
authenticated = true
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
saga_name = project-create
saga_node = VpcCreateV4Route
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4521 | 2026-01-27T01:14:08.376Z | TRAC | test_vpcs (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
saga_name = project-create
saga_node = VpcCreateV4Route
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4522 | 2026-01-27T01:14:08.376Z | DEBG | test_vpcs (SagaExecutor): roles
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
saga_name = project-create
saga_node = VpcCreateV4Route
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4523 | 2026-01-27T01:14:08.377Z | DEBG | test_vpcs (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
result = Ok(())
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
saga_name = project-create
saga_node = VpcCreateV4Route
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4524 | 2026-01-27T01:14:08.382Z | DEBG | test_vpcs (SagaExecutor): roles
authenticated = true
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} }
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
saga_name = project-create
saga_node = VpcCreateV4Route
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4525 | 2026-01-27T01:14:08.394Z | DEBG | test_vpcs (SagaExecutor): authorize result
action = CreateChild
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 87aaa4f1-0672-47bd-b399-8861de8da8e7, lookup_type: ByName("peeky-park") }, key: f8e83d21-ccf9-418f-8d28-ef8fd953b403, lookup_type: ByName("default") }, key: 6f241441-d4fd-4437-8ab8-d9c03a5832e5, lookup_type: ById(6f241441-d4fd-4437-8ab8-d9c03a5832e5) }
result = Ok(())
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
saga_name = project-create
saga_node = VpcCreateV4Route
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4526 | 2026-01-27T01:14:08.394Z | TRAC | test_vpcs (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
saga_name = project-create
saga_node = VpcCreateV4Route
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4527 | 2026-01-27T01:14:08.394Z | DEBG | test_vpcs (SagaExecutor): roles
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
saga_name = project-create
saga_node = VpcCreateV4Route
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4528 | 2026-01-27T01:14:08.394Z | DEBG | test_vpcs (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
result = Ok(())
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
saga_name = project-create
saga_node = VpcCreateV4Route
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4529 | 2026-01-27T01:14:08.403Z | DEBG | test_vpcs (SEC): saga log event
new_state = N012 succeeded
sec_id = 913233fe-92a8-4635-9572-183f495429c4
|
| 4530 | 2026-01-27T01:14:08.403Z | DEBG | test_vpcs (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 12
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
|
| 4531 | 2026-01-27T01:14:08.409Z | DEBG | test_vpcs (SEC): saga log event
new_state = N013 started
sec_id = 913233fe-92a8-4635-9572-183f495429c4
|
| 4532 | 2026-01-27T01:14:08.410Z | DEBG | test_vpcs (SecStore): recording saga event
event_type = Started
node_id = 13
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
|
| 4533 | 2026-01-27T01:14:08.414Z | TRAC | test_vpcs (SagaExecutor): authorize begin
action = CreateChild
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 87aaa4f1-0672-47bd-b399-8861de8da8e7, lookup_type: ByName("peeky-park") }, key: f8e83d21-ccf9-418f-8d28-ef8fd953b403, lookup_type: ByName("default") }, key: 6f241441-d4fd-4437-8ab8-d9c03a5832e5, lookup_type: ById(6f241441-d4fd-4437-8ab8-d9c03a5832e5) }
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
saga_name = project-create
saga_node = VpcCreateV6Route
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4534 | 2026-01-27T01:14:08.415Z | TRAC | test_vpcs (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }
authenticated = true
resource_id = 87aaa4f1-0672-47bd-b399-8861de8da8e7
resource_type = Project
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
saga_name = project-create
saga_node = VpcCreateV6Route
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4535 | 2026-01-27T01:14:08.415Z | TRAC | test_vpcs (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
saga_name = project-create
saga_node = VpcCreateV6Route
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4536 | 2026-01-27T01:14:08.416Z | DEBG | test_vpcs (SagaExecutor): roles
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
saga_name = project-create
saga_node = VpcCreateV6Route
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4537 | 2026-01-27T01:14:08.417Z | DEBG | test_vpcs (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
result = Ok(())
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
saga_name = project-create
saga_node = VpcCreateV6Route
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4538 | 2026-01-27T01:14:08.423Z | TRAC | test_vpcs (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }
authenticated = true
resource_id = 001de000-5110-4000-8000-000000000000
resource_type = Silo
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
saga_name = project-create
saga_node = VpcCreateV6Route
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4539 | 2026-01-27T01:14:08.423Z | TRAC | test_vpcs (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
saga_name = project-create
saga_node = VpcCreateV6Route
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4540 | 2026-01-27T01:14:08.423Z | DEBG | test_vpcs (SagaExecutor): roles
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
saga_name = project-create
saga_node = VpcCreateV6Route
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4541 | 2026-01-27T01:14:08.425Z | DEBG | test_vpcs (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
result = Ok(())
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
saga_name = project-create
saga_node = VpcCreateV6Route
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4542 | 2026-01-27T01:14:08.432Z | TRAC | test_vpcs (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }
authenticated = true
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
saga_name = project-create
saga_node = VpcCreateV6Route
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4543 | 2026-01-27T01:14:08.432Z | TRAC | test_vpcs (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
saga_name = project-create
saga_node = VpcCreateV6Route
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4544 | 2026-01-27T01:14:08.432Z | DEBG | test_vpcs (SagaExecutor): roles
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
saga_name = project-create
saga_node = VpcCreateV6Route
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4545 | 2026-01-27T01:14:08.433Z | DEBG | test_vpcs (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
result = Ok(())
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
saga_name = project-create
saga_node = VpcCreateV6Route
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4546 | 2026-01-27T01:14:08.439Z | DEBG | test_vpcs (SagaExecutor): roles
authenticated = true
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} }
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
saga_name = project-create
saga_node = VpcCreateV6Route
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4547 | 2026-01-27T01:14:08.449Z | DEBG | test_vpcs (SagaExecutor): authorize result
action = CreateChild
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 87aaa4f1-0672-47bd-b399-8861de8da8e7, lookup_type: ByName("peeky-park") }, key: f8e83d21-ccf9-418f-8d28-ef8fd953b403, lookup_type: ByName("default") }, key: 6f241441-d4fd-4437-8ab8-d9c03a5832e5, lookup_type: ById(6f241441-d4fd-4437-8ab8-d9c03a5832e5) }
result = Ok(())
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
saga_name = project-create
saga_node = VpcCreateV6Route
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4548 | 2026-01-27T01:14:08.449Z | TRAC | test_vpcs (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
saga_name = project-create
saga_node = VpcCreateV6Route
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4549 | 2026-01-27T01:14:08.449Z | DEBG | test_vpcs (SagaExecutor): roles
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
saga_name = project-create
saga_node = VpcCreateV6Route
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4550 | 2026-01-27T01:14:08.450Z | DEBG | test_vpcs (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
result = Ok(())
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
saga_name = project-create
saga_node = VpcCreateV6Route
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4551 | 2026-01-27T01:14:08.459Z | DEBG | test_vpcs (SEC): saga log event
new_state = N013 succeeded
sec_id = 913233fe-92a8-4635-9572-183f495429c4
|
| 4552 | 2026-01-27T01:14:08.460Z | DEBG | test_vpcs (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 13
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
|
| 4553 | 2026-01-27T01:14:08.466Z | DEBG | test_vpcs (SEC): saga log event
new_state = N014 started
sec_id = 913233fe-92a8-4635-9572-183f495429c4
|
| 4554 | 2026-01-27T01:14:08.466Z | DEBG | test_vpcs (SecStore): recording saga event
event_type = Started
node_id = 14
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
|
| 4555 | 2026-01-27T01:14:08.483Z | TRAC | test_vpcs (SagaExecutor): authorize begin
action = CreateChild
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 87aaa4f1-0672-47bd-b399-8861de8da8e7, lookup_type: ByName("peeky-park") }, key: f8e83d21-ccf9-418f-8d28-ef8fd953b403, lookup_type: ByName("default") }
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
saga_name = project-create
saga_node = VpcCreateSubnet
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4556 | 2026-01-27T01:14:08.483Z | TRAC | test_vpcs (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }
authenticated = true
resource_id = 87aaa4f1-0672-47bd-b399-8861de8da8e7
resource_type = Project
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
saga_name = project-create
saga_node = VpcCreateSubnet
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4557 | 2026-01-27T01:14:08.483Z | TRAC | test_vpcs (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
saga_name = project-create
saga_node = VpcCreateSubnet
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4558 | 2026-01-27T01:14:08.483Z | DEBG | test_vpcs (SagaExecutor): roles
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
saga_name = project-create
saga_node = VpcCreateSubnet
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4559 | 2026-01-27T01:14:08.484Z | DEBG | test_vpcs (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
result = Ok(())
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
saga_name = project-create
saga_node = VpcCreateSubnet
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4560 | 2026-01-27T01:14:08.490Z | TRAC | test_vpcs (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }
authenticated = true
resource_id = 001de000-5110-4000-8000-000000000000
resource_type = Silo
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
saga_name = project-create
saga_node = VpcCreateSubnet
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4561 | 2026-01-27T01:14:08.490Z | TRAC | test_vpcs (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
saga_name = project-create
saga_node = VpcCreateSubnet
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4562 | 2026-01-27T01:14:08.491Z | DEBG | test_vpcs (SagaExecutor): roles
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
saga_name = project-create
saga_node = VpcCreateSubnet
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4563 | 2026-01-27T01:14:08.491Z | DEBG | test_vpcs (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
result = Ok(())
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
saga_name = project-create
saga_node = VpcCreateSubnet
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4564 | 2026-01-27T01:14:08.497Z | TRAC | test_vpcs (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }
authenticated = true
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
saga_name = project-create
saga_node = VpcCreateSubnet
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4565 | 2026-01-27T01:14:08.497Z | TRAC | test_vpcs (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
saga_name = project-create
saga_node = VpcCreateSubnet
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4566 | 2026-01-27T01:14:08.498Z | DEBG | test_vpcs (SagaExecutor): roles
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
saga_name = project-create
saga_node = VpcCreateSubnet
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4567 | 2026-01-27T01:14:08.499Z | DEBG | test_vpcs (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
result = Ok(())
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
saga_name = project-create
saga_node = VpcCreateSubnet
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4568 | 2026-01-27T01:14:08.504Z | DEBG | test_vpcs (SagaExecutor): roles
authenticated = true
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} }
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
saga_name = project-create
saga_node = VpcCreateSubnet
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4569 | 2026-01-27T01:14:08.513Z | DEBG | test_vpcs (SagaExecutor): authorize result
action = CreateChild
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 87aaa4f1-0672-47bd-b399-8861de8da8e7, lookup_type: ByName("peeky-park") }, key: f8e83d21-ccf9-418f-8d28-ef8fd953b403, lookup_type: ByName("default") }
result = Ok(())
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
saga_name = project-create
saga_node = VpcCreateSubnet
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4570 | 2026-01-27T01:14:08.523Z | DEBG | test_vpcs (SEC): saga log event
new_state = N014 succeeded
sec_id = 913233fe-92a8-4635-9572-183f495429c4
|
| 4571 | 2026-01-27T01:14:08.524Z | DEBG | test_vpcs (SecStore): recording saga event
event_type = Succeeded(Array [Object {"key": String("0d13bfa0-224d-4f5f-872e-6bda5c7f29ea"), "lookup_type": Object {"ById": String("0d13bfa0-224d-4f5f-872e-6bda5c7f29ea")}, "parent": Object {"key": String("f8e83d21-ccf9-418f-8d28-ef8fd953b403"), "lookup_type": Object {"ByName": String("default")}, "parent": Object {"key": String("87aaa4f1-0672-47bd-b399-8861de8da8e7"), "lookup_type": Object {"ByName": String("peeky-park")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}}}, Object {"custom_router_id": Null, "identity": Object {"description": String("The default subnet for default"), "id": String("0d13bfa0-224d-4f5f-872e-6bda5c7f29ea"), "name": String("default"), "time_created": String("2026-01-27T01:14:08.483094Z"), "time_deleted": Null, "time_modified": String("2026-01-27T01:14:08.483094Z")}, "ipv4_block": String("172.30.0.0/22"), "ipv6_block": String("fd4f:f905:66ff::/64"), "rcgen": Number(1), "vpc_id": String("f8e83d21-ccf9-418f-8d28-ef8fd953b403")}])
node_id = 14
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
|
| 4572 | 2026-01-27T01:14:08.538Z | DEBG | test_vpcs (SEC): saga log event
new_state = N015 started
sec_id = 913233fe-92a8-4635-9572-183f495429c4
|
| 4573 | 2026-01-27T01:14:08.538Z | DEBG | test_vpcs (SecStore): recording saga event
event_type = Started
node_id = 15
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
|
| 4574 | 2026-01-27T01:14:08.546Z | TRAC | test_vpcs (SagaExecutor): authorize begin
action = CreateChild
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 87aaa4f1-0672-47bd-b399-8861de8da8e7, lookup_type: ByName("peeky-park") }, key: f8e83d21-ccf9-418f-8d28-ef8fd953b403, lookup_type: ByName("default") }, key: 6f241441-d4fd-4437-8ab8-d9c03a5832e5, lookup_type: ById(6f241441-d4fd-4437-8ab8-d9c03a5832e5) }
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
saga_name = project-create
saga_node = VpcCreateSubnetRoute
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4575 | 2026-01-27T01:14:08.546Z | TRAC | test_vpcs (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }
authenticated = true
resource_id = 87aaa4f1-0672-47bd-b399-8861de8da8e7
resource_type = Project
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
saga_name = project-create
saga_node = VpcCreateSubnetRoute
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4576 | 2026-01-27T01:14:08.546Z | TRAC | test_vpcs (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
saga_name = project-create
saga_node = VpcCreateSubnetRoute
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4577 | 2026-01-27T01:14:08.546Z | DEBG | test_vpcs (SagaExecutor): roles
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
saga_name = project-create
saga_node = VpcCreateSubnetRoute
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4578 | 2026-01-27T01:14:08.547Z | DEBG | test_vpcs (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
result = Ok(())
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
saga_name = project-create
saga_node = VpcCreateSubnetRoute
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4579 | 2026-01-27T01:14:08.556Z | TRAC | test_vpcs (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }
authenticated = true
resource_id = 001de000-5110-4000-8000-000000000000
resource_type = Silo
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
saga_name = project-create
saga_node = VpcCreateSubnetRoute
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4580 | 2026-01-27T01:14:08.556Z | TRAC | test_vpcs (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
saga_name = project-create
saga_node = VpcCreateSubnetRoute
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4581 | 2026-01-27T01:14:08.556Z | DEBG | test_vpcs (SagaExecutor): roles
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
saga_name = project-create
saga_node = VpcCreateSubnetRoute
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4582 | 2026-01-27T01:14:08.558Z | DEBG | test_vpcs (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
result = Ok(())
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
saga_name = project-create
saga_node = VpcCreateSubnetRoute
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4583 | 2026-01-27T01:14:08.564Z | TRAC | test_vpcs (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }
authenticated = true
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
saga_name = project-create
saga_node = VpcCreateSubnetRoute
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4584 | 2026-01-27T01:14:08.564Z | TRAC | test_vpcs (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
saga_name = project-create
saga_node = VpcCreateSubnetRoute
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4585 | 2026-01-27T01:14:08.565Z | DEBG | test_vpcs (SagaExecutor): roles
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
saga_name = project-create
saga_node = VpcCreateSubnetRoute
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4586 | 2026-01-27T01:14:08.566Z | DEBG | test_vpcs (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
result = Ok(())
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
saga_name = project-create
saga_node = VpcCreateSubnetRoute
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4587 | 2026-01-27T01:14:08.573Z | DEBG | test_vpcs (SagaExecutor): roles
authenticated = true
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} }
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
saga_name = project-create
saga_node = VpcCreateSubnetRoute
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4588 | 2026-01-27T01:14:08.592Z | DEBG | test_vpcs (SagaExecutor): authorize result
action = CreateChild
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 87aaa4f1-0672-47bd-b399-8861de8da8e7, lookup_type: ByName("peeky-park") }, key: f8e83d21-ccf9-418f-8d28-ef8fd953b403, lookup_type: ByName("default") }, key: 6f241441-d4fd-4437-8ab8-d9c03a5832e5, lookup_type: ById(6f241441-d4fd-4437-8ab8-d9c03a5832e5) }
result = Ok(())
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
saga_name = project-create
saga_node = VpcCreateSubnetRoute
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4589 | 2026-01-27T01:14:08.592Z | TRAC | test_vpcs (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
saga_name = project-create
saga_node = VpcCreateSubnetRoute
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4590 | 2026-01-27T01:14:08.593Z | DEBG | test_vpcs (SagaExecutor): roles
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
saga_name = project-create
saga_node = VpcCreateSubnetRoute
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4591 | 2026-01-27T01:14:08.593Z | DEBG | test_vpcs (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
result = Ok(())
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
saga_name = project-create
saga_node = VpcCreateSubnetRoute
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4592 | 2026-01-27T01:14:08.604Z | DEBG | test_vpcs (SEC): saga log event
new_state = N015 succeeded
sec_id = 913233fe-92a8-4635-9572-183f495429c4
|
| 4593 | 2026-01-27T01:14:08.604Z | DEBG | test_vpcs (SecStore): recording saga event
event_type = Succeeded(Object {"key": String("1a75a3ca-5545-42be-b4cb-8883d818a039"), "lookup_type": Object {"ById": String("0d13bfa0-224d-4f5f-872e-6bda5c7f29ea")}, "parent": Object {"key": String("6f241441-d4fd-4437-8ab8-d9c03a5832e5"), "lookup_type": Object {"ById": String("6f241441-d4fd-4437-8ab8-d9c03a5832e5")}, "parent": Object {"key": String("f8e83d21-ccf9-418f-8d28-ef8fd953b403"), "lookup_type": Object {"ByName": String("default")}, "parent": Object {"key": String("87aaa4f1-0672-47bd-b399-8861de8da8e7"), "lookup_type": Object {"ByName": String("peeky-park")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}}}})
node_id = 15
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
|
| 4594 | 2026-01-27T01:14:08.618Z | DEBG | test_vpcs (SEC): saga log event
new_state = N016 started
sec_id = 913233fe-92a8-4635-9572-183f495429c4
|
| 4595 | 2026-01-27T01:14:08.618Z | DEBG | test_vpcs (SecStore): recording saga event
event_type = Started
node_id = 16
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
|
| 4596 | 2026-01-27T01:14:08.624Z | DEBG | test_vpcs (nexus): default firewall rules for vpc default
rules = [VpcFirewallRule { identity: VpcFirewallRuleIdentity { id: 61c988ec-e614-458f-b8c9-b414ea5e7d95, name: Name(Name("allow-internal-inbound")), description: "allow inbound traffic to all instances within the VPC if originated within the VPC", time_created: 2026-01-27T01:14:08.624749938Z, time_modified: 2026-01-27T01:14:08.624749938Z, time_deleted: None }, vpc_id: f8e83d21-ccf9-418f-8d28-ef8fd953b403, status: VpcFirewallRuleStatus(Enabled), direction: VpcFirewallRuleDirection(Inbound), targets: [VpcFirewallRuleTarget(Vpc(Name("default")))], filter_hosts: Some([VpcFirewallRuleHostFilter(Vpc(Name("default")))]), filter_ports: None, filter_protocols: None, action: VpcFirewallRuleAction(Allow), priority: VpcFirewallRulePriority(VpcFirewallRulePriority(65534)) }, VpcFirewallRule { identity: VpcFirewallRuleIdentity { id: c3f303dc-fa4a-477e-98e8-64a99e1f0334, name: Name(Name("allow-ssh")), description: "allow inbound TCP connections on port 22 from anywhere", time_created: 2026-01-27T01:14:08.624770028Z, time_modified: 2026-01-27T01:14:08.624770028Z, time_deleted: None }, vpc_id: f8e83d21-ccf9-418f-8d28-ef8fd953b403, status: VpcFirewallRuleStatus(Enabled), direction: VpcFirewallRuleDirection(Inbound), targets: [VpcFirewallRuleTarget(Vpc(Name("default")))], filter_hosts: None, filter_ports: Some([L4PortRange(L4PortRange { first: L4Port(22), last: L4Port(22) })]), filter_protocols: Some([VpcFirewallRuleProtocol(Tcp)]), action: VpcFirewallRuleAction(Allow), priority: VpcFirewallRulePriority(VpcFirewallRulePriority(65534)) }, VpcFirewallRule { identity: VpcFirewallRuleIdentity { id: dad3dac5-1bed-4e55-80df-82cd8ea2d7b7, name: Name(Name("allow-icmp")), description: "allow inbound ICMP traffic from anywhere", time_created: 2026-01-27T01:14:08.624778214Z, time_modified: 2026-01-27T01:14:08.624778214Z, time_deleted: None }, vpc_id: f8e83d21-ccf9-418f-8d28-ef8fd953b403, status: VpcFirewallRuleStatus(Enabled), direction: VpcFirewallRuleDirection(Inbound), targets: [VpcFirewallRuleTarget(Vpc(Name("default")))], filter_hosts: None, filter_ports: None, filter_protocols: Some([VpcFirewallRuleProtocol(Icmp(None))]), action: VpcFirewallRuleAction(Allow), priority: VpcFirewallRulePriority(VpcFirewallRulePriority(65534)) }]
|
| 4597 | 2026-01-27T01:14:08.625Z | TRAC | test_vpcs (SagaExecutor): authorize begin
action = Modify
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 87aaa4f1-0672-47bd-b399-8861de8da8e7, lookup_type: ByName("peeky-park") }, key: f8e83d21-ccf9-418f-8d28-ef8fd953b403, lookup_type: ByName("default") }
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
saga_name = project-create
saga_node = VpcUpdateFirewall
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4598 | 2026-01-27T01:14:08.625Z | TRAC | test_vpcs (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }
authenticated = true
resource_id = 87aaa4f1-0672-47bd-b399-8861de8da8e7
resource_type = Project
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
saga_name = project-create
saga_node = VpcUpdateFirewall
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4599 | 2026-01-27T01:14:08.625Z | TRAC | test_vpcs (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
saga_name = project-create
saga_node = VpcUpdateFirewall
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4600 | 2026-01-27T01:14:08.625Z | DEBG | test_vpcs (SagaExecutor): roles
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
saga_name = project-create
saga_node = VpcUpdateFirewall
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4601 | 2026-01-27T01:14:08.626Z | DEBG | test_vpcs (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
result = Ok(())
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
saga_name = project-create
saga_node = VpcUpdateFirewall
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4602 | 2026-01-27T01:14:08.631Z | DEBG | test_vpcs (results-sink): inserting 1 samples into database
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
|
| 4603 | 2026-01-27T01:14:08.631Z | DEBG | test_vpcs (results-sink-cluster): inserting 1 samples into database
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
|
| 4604 | 2026-01-27T01:14:08.632Z | DEBG | test_vpcs (clickhouse-client): unrolling 1 total samples
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 719060a6-12ac-470c-bb91-e566c7f997b2
|
| 4605 | 2026-01-27T01:14:08.634Z | TRAC | test_vpcs (clickhouse-client): inserting data
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 719060a6-12ac-470c-bb91-e566c7f997b2
n_columns = 4
n_rows = 2
sql = INSERT INTO oximeter.fields_string FORMAT Native
|
| 4606 | 2026-01-27T01:14:08.634Z | TRAC | test_vpcs (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }
authenticated = true
resource_id = 001de000-5110-4000-8000-000000000000
resource_type = Silo
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
saga_name = project-create
saga_node = VpcUpdateFirewall
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4607 | 2026-01-27T01:14:08.634Z | TRAC | test_vpcs (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
saga_name = project-create
saga_node = VpcUpdateFirewall
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4608 | 2026-01-27T01:14:08.635Z | DEBG | test_vpcs (SagaExecutor): roles
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
saga_name = project-create
saga_node = VpcUpdateFirewall
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4609 | 2026-01-27T01:14:08.635Z | DEBG | test_vpcs (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
result = Ok(())
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
saga_name = project-create
saga_node = VpcUpdateFirewall
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4610 | 2026-01-27T01:14:08.641Z | DEBG | test_vpcs (clickhouse-client): inserted rows into table
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 719060a6-12ac-470c-bb91-e566c7f997b2
n_rows = 2
table_name = fields_string
|
| 4611 | 2026-01-27T01:14:08.641Z | TRAC | test_vpcs (clickhouse-client): inserting data
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 719060a6-12ac-470c-bb91-e566c7f997b2
n_columns = 4
n_rows = 1
sql = INSERT INTO oximeter.measurements_i64 FORMAT Native
|
| 4612 | 2026-01-27T01:14:08.644Z | TRAC | test_vpcs (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }
authenticated = true
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
saga_name = project-create
saga_node = VpcUpdateFirewall
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4613 | 2026-01-27T01:14:08.644Z | TRAC | test_vpcs (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
saga_name = project-create
saga_node = VpcUpdateFirewall
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4614 | 2026-01-27T01:14:08.644Z | DEBG | test_vpcs (SagaExecutor): roles
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
saga_name = project-create
saga_node = VpcUpdateFirewall
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4615 | 2026-01-27T01:14:08.646Z | DEBG | test_vpcs (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
result = Ok(())
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
saga_name = project-create
saga_node = VpcUpdateFirewall
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4616 | 2026-01-27T01:14:08.648Z | DEBG | test_vpcs (clickhouse-client): inserted rows into table
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 719060a6-12ac-470c-bb91-e566c7f997b2
n_rows = 1
table_name = measurements_i64
|
| 4617 | 2026-01-27T01:14:08.648Z | TRAC | test_vpcs (results-sink): successfully inserted samples
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
|
| 4618 | 2026-01-27T01:14:08.653Z | DEBG | test_vpcs (SagaExecutor): roles
authenticated = true
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} }
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
saga_name = project-create
saga_node = VpcUpdateFirewall
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4619 | 2026-01-27T01:14:08.662Z | DEBG | test_vpcs (SagaExecutor): authorize result
action = Modify
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 87aaa4f1-0672-47bd-b399-8861de8da8e7, lookup_type: ByName("peeky-park") }, key: f8e83d21-ccf9-418f-8d28-ef8fd953b403, lookup_type: ByName("default") }
result = Ok(())
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
saga_name = project-create
saga_node = VpcUpdateFirewall
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4620 | 2026-01-27T01:14:08.662Z | TRAC | test_vpcs (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
saga_name = project-create
saga_node = VpcUpdateFirewall
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4621 | 2026-01-27T01:14:08.662Z | DEBG | test_vpcs (SagaExecutor): roles
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
saga_name = project-create
saga_node = VpcUpdateFirewall
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4622 | 2026-01-27T01:14:08.663Z | DEBG | test_vpcs (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
result = Ok(())
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
saga_name = project-create
saga_node = VpcUpdateFirewall
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4623 | 2026-01-27T01:14:08.737Z | WARN | test_vpcs (results-sink-cluster): failed to insert some results into metric DB
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
error = Failed to check out connection to database: No backends found for this service
file = oximeter/collector/src/results_sink.rs:92
|
| 4624 | 2026-01-27T01:14:08.750Z | INFO | test_vpcs (oximeter-agent): refreshing list of producers from Nexus
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
file = oximeter/collector/src/agent.rs:557
|
| 4625 | 2026-01-27T01:14:08.751Z | DEBG | test_vpcs (oximeter): client request
body = None
method = GET
uri = http://127.0.0.1:46983/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
|
| 4626 | 2026-01-27T01:14:08.751Z | TRAC | test_vpcs (dropshot_internal): incoming request
local_addr = 127.0.0.1:46983
method = GET
remote_addr = 127.0.0.1:62470
req_id = 97fbd5b1-e9c2-41b7-9fa9-7fbb36b07183
uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
|
| 4627 | 2026-01-27T01:14:08.751Z | DEBG | test_vpcs (dropshot_internal): determined request API version
local_addr = 127.0.0.1:46983
method = GET
remote_addr = 127.0.0.1:62470
req_id = 97fbd5b1-e9c2-41b7-9fa9-7fbb36b07183
uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
version = 1.0.0
|
| 4628 | 2026-01-27T01:14:08.752Z | TRAC | test_vpcs (dropshot_internal): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
authenticated = true
local_addr = 127.0.0.1:46983
method = GET
remote_addr = 127.0.0.1:62470
req_id = 97fbd5b1-e9c2-41b7-9fa9-7fbb36b07183
resource = Database
type = user_builtin
uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
user_builtin_id = 001de000-05e4-4000-8000-000000000002
|
| 4629 | 2026-01-27T01:14:08.752Z | DEBG | test_vpcs (dropshot_internal): roles
authenticated = true
local_addr = 127.0.0.1:46983
method = GET
remote_addr = 127.0.0.1:62470
req_id = 97fbd5b1-e9c2-41b7-9fa9-7fbb36b07183
roles = RoleSet { roles: {} }
type = user_builtin
uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
user_builtin_id = 001de000-05e4-4000-8000-000000000002
|
| 4630 | 2026-01-27T01:14:08.754Z | DEBG | test_vpcs (dropshot_internal): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
authenticated = true
local_addr = 127.0.0.1:46983
method = GET
remote_addr = 127.0.0.1:62470
req_id = 97fbd5b1-e9c2-41b7-9fa9-7fbb36b07183
resource = Database
result = Ok(())
type = user_builtin
uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
user_builtin_id = 001de000-05e4-4000-8000-000000000002
|
| 4631 | 2026-01-27T01:14:08.758Z | INFO | test_vpcs (dropshot_internal): request completed
latency_us = 6875
local_addr = 127.0.0.1:46983
method = GET
remote_addr = 127.0.0.1:62470
req_id = 97fbd5b1-e9c2-41b7-9fa9-7fbb36b07183
response_code = 200
uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
|
| 4632 | 2026-01-27T01:14:08.759Z | DEBG | test_vpcs (oximeter): client response
result = Ok(Response { url: "http://127.0.0.1:46983/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending", status: 200, headers: {"content-type": "application/json", "x-request-id": "97fbd5b1-e9c2-41b7-9fa9-7fbb36b07183", "content-length": "405", "date": "Tue, 27 Jan 2026 01:14:08 GMT"} })
|
| 4633 | 2026-01-27T01:14:08.760Z | DEBG | test_vpcs (oximeter): client request
body = None
method = GET
uri = http://127.0.0.1:46983/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
|
| 4634 | 2026-01-27T01:14:08.761Z | TRAC | test_vpcs (dropshot_internal): incoming request
local_addr = 127.0.0.1:46983
method = GET
remote_addr = 127.0.0.1:62470
req_id = d1090cdc-60bf-46e8-b166-62cae4ce6c0f
uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
|
| 4635 | 2026-01-27T01:14:08.761Z | DEBG | test_vpcs (dropshot_internal): determined request API version
local_addr = 127.0.0.1:46983
method = GET
remote_addr = 127.0.0.1:62470
req_id = d1090cdc-60bf-46e8-b166-62cae4ce6c0f
uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
version = 1.0.0
|
| 4636 | 2026-01-27T01:14:08.761Z | TRAC | test_vpcs (dropshot_internal): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
authenticated = true
local_addr = 127.0.0.1:46983
method = GET
remote_addr = 127.0.0.1:62470
req_id = d1090cdc-60bf-46e8-b166-62cae4ce6c0f
resource = Database
type = user_builtin
uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
user_builtin_id = 001de000-05e4-4000-8000-000000000002
|
| 4637 | 2026-01-27T01:14:08.761Z | DEBG | test_vpcs (dropshot_internal): roles
authenticated = true
local_addr = 127.0.0.1:46983
method = GET
remote_addr = 127.0.0.1:62470
req_id = d1090cdc-60bf-46e8-b166-62cae4ce6c0f
roles = RoleSet { roles: {} }
type = user_builtin
uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
user_builtin_id = 001de000-05e4-4000-8000-000000000002
|
| 4638 | 2026-01-27T01:14:08.761Z | DEBG | test_vpcs (dropshot_internal): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
authenticated = true
local_addr = 127.0.0.1:46983
method = GET
remote_addr = 127.0.0.1:62470
req_id = d1090cdc-60bf-46e8-b166-62cae4ce6c0f
resource = Database
result = Ok(())
type = user_builtin
uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
user_builtin_id = 001de000-05e4-4000-8000-000000000002
|
| 4639 | 2026-01-27T01:14:08.786Z | INFO | test_vpcs (dropshot_internal): request completed
latency_us = 25809
local_addr = 127.0.0.1:46983
method = GET
remote_addr = 127.0.0.1:62470
req_id = d1090cdc-60bf-46e8-b166-62cae4ce6c0f
response_code = 200
uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
|
| 4640 | 2026-01-27T01:14:08.786Z | DEBG | test_vpcs (collection-task): sent timer-based collection request to the collection task
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
producer_id = a6458b7d-87c3-4483-be96-854d814c20de
producer_ip = ::1
producer_port = 65095
|
| 4641 | 2026-01-27T01:14:08.786Z | DEBG | test_vpcs (oximeter): client response
result = Ok(Response { url: "http://127.0.0.1:46983/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D", status: 200, headers: {"content-type": "application/json", "x-request-id": "d1090cdc-60bf-46e8-b166-62cae4ce6c0f", "content-length": "29", "date": "Tue, 27 Jan 2026 01:14:08 GMT"} })
|
| 4642 | 2026-01-27T01:14:08.786Z | TRAC | test_vpcs (oximeter-agent): ignoring request to update existing metric producer, since the endpoint information is the same as the existing
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
producer_id = 913233fe-92a8-4635-9572-183f495429c4
|
| 4643 | 2026-01-27T01:14:08.787Z | TRAC | test_vpcs (oximeter-agent): ignoring request to update existing metric producer, since the endpoint information is the same as the existing
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
producer_id = a6458b7d-87c3-4483-be96-854d814c20de
|
| 4644 | 2026-01-27T01:14:08.787Z | INFO | test_vpcs (oximeter-agent): refreshed list of producers from Nexus
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
file = oximeter/collector/src/agent.rs:632
n_current_tasks = 2
n_pruned_tasks = 0
|
| 4645 | 2026-01-27T01:14:08.787Z | DEBG | test_vpcs (collection-task): collecting from producer
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
producer_id = a6458b7d-87c3-4483-be96-854d814c20de
producer_ip = ::1
producer_port = 65095
|
| 4646 | 2026-01-27T01:14:08.792Z | TRAC | test_vpcs (collection-task): sent collection request to producer
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
producer_id = a6458b7d-87c3-4483-be96-854d814c20de
producer_ip = ::1
producer_port = 65095
|
| 4647 | 2026-01-27T01:14:08.794Z | DEBG | test_vpcs (collection-task): collected results from producer
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
n_results = 1
producer_id = a6458b7d-87c3-4483-be96-854d814c20de
producer_ip = ::1
producer_port = 65095
|
| 4648 | 2026-01-27T01:14:08.794Z | TRAC | test_vpcs (collection-task): forwarded results to main collection loop
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
producer_id = a6458b7d-87c3-4483-be96-854d814c20de
producer_ip = ::1
producer_port = 65095
|
| 4649 | 2026-01-27T01:14:08.794Z | TRAC | test_vpcs (collection-task): top of inner collection loop, waiting for next request
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
producer_id = a6458b7d-87c3-4483-be96-854d814c20de
producer_ip = ::1
producer_port = 65095
|
| 4650 | 2026-01-27T01:14:08.797Z | DEBG | test_vpcs (SEC): saga log event
new_state = N016 succeeded
sec_id = 913233fe-92a8-4635-9572-183f495429c4
|
| 4651 | 2026-01-27T01:14:08.797Z | DEBG | test_vpcs (SecStore): recording saga event
event_type = Succeeded(Array [Object {"action": String("allow"), "direction": String("inbound"), "filter_hosts": Array [Object {"type": String("vpc"), "value": String("default")}], "filter_ports": Null, "filter_protocols": Null, "identity": Object {"description": String("allow inbound traffic to all instances within the VPC if originated within the VPC"), "id": String("61c988ec-e614-458f-b8c9-b414ea5e7d95"), "name": String("allow-internal-inbound"), "time_created": String("2026-01-27T01:14:08.624749938Z"), "time_deleted": Null, "time_modified": String("2026-01-27T01:14:08.624749938Z")}, "priority": Number(65534), "status": String("enabled"), "targets": Array [Object {"type": String("vpc"), "value": String("default")}], "vpc_id": String("f8e83d21-ccf9-418f-8d28-ef8fd953b403")}, Object {"action": String("allow"), "direction": String("inbound"), "filter_hosts": Null, "filter_ports": Array [String("22")], "filter_protocols": Array [Object {"type": String("tcp")}], "identity": Object {"description": String("allow inbound TCP connections on port 22 from anywhere"), "id": String("c3f303dc-fa4a-477e-98e8-64a99e1f0334"), "name": String("allow-ssh"), "time_created": String("2026-01-27T01:14:08.624770028Z"), "time_deleted": Null, "time_modified": String("2026-01-27T01:14:08.624770028Z")}, "priority": Number(65534), "status": String("enabled"), "targets": Array [Object {"type": String("vpc"), "value": String("default")}], "vpc_id": String("f8e83d21-ccf9-418f-8d28-ef8fd953b403")}, Object {"action": String("allow"), "direction": String("inbound"), "filter_hosts": Null, "filter_ports": Null, "filter_protocols": Array [Object {"type": String("icmp"), "value": Null}], "identity": Object {"description": String("allow inbound ICMP traffic from anywhere"), "id": String("dad3dac5-1bed-4e55-80df-82cd8ea2d7b7"), "name": String("allow-icmp"), "time_created": String("2026-01-27T01:14:08.624778214Z"), "time_deleted": Null, "time_modified": String("2026-01-27T01:14:08.624778214Z")}, "priority": Number(65534), "status": String("enabled"), "targets": Array [Object {"type": String("vpc"), "value": String("default")}], "vpc_id": String("f8e83d21-ccf9-418f-8d28-ef8fd953b403")}])
node_id = 16
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
|
| 4652 | 2026-01-27T01:14:08.805Z | DEBG | test_vpcs (SEC): saga log event
new_state = N017 started
sec_id = 913233fe-92a8-4635-9572-183f495429c4
|
| 4653 | 2026-01-27T01:14:08.806Z | DEBG | test_vpcs (SecStore): recording saga event
event_type = Started
node_id = 17
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
|
| 4654 | 2026-01-27T01:14:08.814Z | TRAC | test_vpcs (SagaExecutor): authorize begin
action = CreateChild
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 87aaa4f1-0672-47bd-b399-8861de8da8e7, lookup_type: ByName("peeky-park") }, key: f8e83d21-ccf9-418f-8d28-ef8fd953b403, lookup_type: ByName("default") }
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
saga_name = project-create
saga_node = VpcCreateGateway
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4655 | 2026-01-27T01:14:08.814Z | TRAC | test_vpcs (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }
authenticated = true
resource_id = 87aaa4f1-0672-47bd-b399-8861de8da8e7
resource_type = Project
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
saga_name = project-create
saga_node = VpcCreateGateway
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4656 | 2026-01-27T01:14:08.814Z | TRAC | test_vpcs (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
saga_name = project-create
saga_node = VpcCreateGateway
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4657 | 2026-01-27T01:14:08.814Z | DEBG | test_vpcs (SagaExecutor): roles
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
saga_name = project-create
saga_node = VpcCreateGateway
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4658 | 2026-01-27T01:14:08.816Z | DEBG | test_vpcs (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
result = Ok(())
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
saga_name = project-create
saga_node = VpcCreateGateway
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4659 | 2026-01-27T01:14:08.839Z | TRAC | test_vpcs (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }
authenticated = true
resource_id = 001de000-5110-4000-8000-000000000000
resource_type = Silo
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
saga_name = project-create
saga_node = VpcCreateGateway
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4660 | 2026-01-27T01:14:08.839Z | TRAC | test_vpcs (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
saga_name = project-create
saga_node = VpcCreateGateway
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4661 | 2026-01-27T01:14:08.839Z | DEBG | test_vpcs (SagaExecutor): roles
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
saga_name = project-create
saga_node = VpcCreateGateway
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4662 | 2026-01-27T01:14:08.842Z | DEBG | test_vpcs (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
result = Ok(())
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
saga_name = project-create
saga_node = VpcCreateGateway
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4663 | 2026-01-27T01:14:08.849Z | TRAC | test_vpcs (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }
authenticated = true
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
saga_name = project-create
saga_node = VpcCreateGateway
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4664 | 2026-01-27T01:14:08.849Z | TRAC | test_vpcs (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
saga_name = project-create
saga_node = VpcCreateGateway
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4665 | 2026-01-27T01:14:08.849Z | DEBG | test_vpcs (SagaExecutor): roles
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
saga_name = project-create
saga_node = VpcCreateGateway
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4666 | 2026-01-27T01:14:08.850Z | DEBG | test_vpcs (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
result = Ok(())
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
saga_name = project-create
saga_node = VpcCreateGateway
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4667 | 2026-01-27T01:14:08.858Z | DEBG | test_vpcs (SagaExecutor): roles
authenticated = true
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} }
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
saga_name = project-create
saga_node = VpcCreateGateway
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4668 | 2026-01-27T01:14:08.871Z | DEBG | test_vpcs (SagaExecutor): authorize result
action = CreateChild
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 87aaa4f1-0672-47bd-b399-8861de8da8e7, lookup_type: ByName("peeky-park") }, key: f8e83d21-ccf9-418f-8d28-ef8fd953b403, lookup_type: ByName("default") }
result = Ok(())
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
saga_name = project-create
saga_node = VpcCreateGateway
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4669 | 2026-01-27T01:14:08.871Z | TRAC | test_vpcs (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
saga_name = project-create
saga_node = VpcCreateGateway
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4670 | 2026-01-27T01:14:08.871Z | DEBG | test_vpcs (SagaExecutor): roles
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
saga_name = project-create
saga_node = VpcCreateGateway
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4671 | 2026-01-27T01:14:08.872Z | DEBG | test_vpcs (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
result = Ok(())
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
saga_name = project-create
saga_node = VpcCreateGateway
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4672 | 2026-01-27T01:14:08.878Z | TRAC | test_vpcs (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
saga_name = project-create
saga_node = VpcCreateGateway
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4673 | 2026-01-27T01:14:08.878Z | DEBG | test_vpcs (SagaExecutor): roles
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
saga_name = project-create
saga_node = VpcCreateGateway
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4674 | 2026-01-27T01:14:08.879Z | DEBG | test_vpcs (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
result = Ok(())
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
saga_name = project-create
saga_node = VpcCreateGateway
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4675 | 2026-01-27T01:14:08.885Z | TRAC | test_vpcs (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
saga_name = project-create
saga_node = VpcCreateGateway
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4676 | 2026-01-27T01:14:08.885Z | DEBG | test_vpcs (SagaExecutor): roles
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
saga_name = project-create
saga_node = VpcCreateGateway
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4677 | 2026-01-27T01:14:08.886Z | DEBG | test_vpcs (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
result = Ok(())
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
saga_name = project-create
saga_node = VpcCreateGateway
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4678 | 2026-01-27T01:14:09.052Z | WARN | test_vpcs (SagaExecutor): Default ip pool lookup failed: Object (of type ByOther("default unicast IP pool for current silo")) not found: ip-pool. Default gateway has no ip pool association
authenticated = true
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
saga_name = project-create
saga_node = VpcCreateGateway
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4679 | 2026-01-27T01:14:09.053Z | DEBG | test_vpcs (SEC): saga log event
new_state = N017 succeeded
sec_id = 913233fe-92a8-4635-9572-183f495429c4
|
| 4680 | 2026-01-27T01:14:09.053Z | DEBG | test_vpcs (SecStore): recording saga event
event_type = Succeeded(Object {"key": String("1579c14d-e5cd-40f7-a168-ce2924cd16a7"), "lookup_type": Object {"ById": String("1579c14d-e5cd-40f7-a168-ce2924cd16a7")}, "parent": Object {"key": String("f8e83d21-ccf9-418f-8d28-ef8fd953b403"), "lookup_type": Object {"ByName": String("default")}, "parent": Object {"key": String("87aaa4f1-0672-47bd-b399-8861de8da8e7"), "lookup_type": Object {"ByName": String("peeky-park")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}}})
node_id = 17
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
|
| 4681 | 2026-01-27T01:14:09.059Z | DEBG | test_vpcs (SEC): saga log event
new_state = N018 started
sec_id = 913233fe-92a8-4635-9572-183f495429c4
|
| 4682 | 2026-01-27T01:14:09.059Z | DEBG | test_vpcs (SecStore): recording saga event
event_type = Started
node_id = 18
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
|
| 4683 | 2026-01-27T01:14:09.065Z | TRAC | test_vpcs (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
saga_name = project-create
saga_node = VpcNotifySleds
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4684 | 2026-01-27T01:14:09.065Z | DEBG | test_vpcs (SagaExecutor): roles
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
saga_name = project-create
saga_node = VpcNotifySleds
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4685 | 2026-01-27T01:14:09.066Z | DEBG | test_vpcs (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
result = Ok(())
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
saga_name = project-create
saga_node = VpcNotifySleds
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4686 | 2026-01-27T01:14:09.079Z | TRAC | test_vpcs (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
saga_name = project-create
saga_node = VpcNotifySleds
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4687 | 2026-01-27T01:14:09.079Z | DEBG | test_vpcs (SagaExecutor): roles
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
saga_name = project-create
saga_node = VpcNotifySleds
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4688 | 2026-01-27T01:14:09.080Z | DEBG | test_vpcs (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
result = Ok(())
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
saga_name = project-create
saga_node = VpcNotifySleds
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4689 | 2026-01-27T01:14:09.085Z | TRAC | test_vpcs (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
saga_name = project-create
saga_node = VpcNotifySleds
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4690 | 2026-01-27T01:14:09.085Z | DEBG | test_vpcs (SagaExecutor): roles
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
saga_name = project-create
saga_node = VpcNotifySleds
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4691 | 2026-01-27T01:14:09.086Z | DEBG | test_vpcs (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
result = Ok(())
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
saga_name = project-create
saga_node = VpcNotifySleds
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4692 | 2026-01-27T01:14:09.094Z | TRAC | test_vpcs (SagaExecutor): authorize begin
action = ListChildren
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 87aaa4f1-0672-47bd-b399-8861de8da8e7, lookup_type: ById(87aaa4f1-0672-47bd-b399-8861de8da8e7) }, key: f8e83d21-ccf9-418f-8d28-ef8fd953b403, lookup_type: ByName("default") }
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
saga_name = project-create
saga_node = VpcNotifySleds
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4693 | 2026-01-27T01:14:09.094Z | TRAC | test_vpcs (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }
authenticated = true
resource_id = 87aaa4f1-0672-47bd-b399-8861de8da8e7
resource_type = Project
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
saga_name = project-create
saga_node = VpcNotifySleds
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4694 | 2026-01-27T01:14:09.094Z | TRAC | test_vpcs (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
saga_name = project-create
saga_node = VpcNotifySleds
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4695 | 2026-01-27T01:14:09.094Z | DEBG | test_vpcs (SagaExecutor): roles
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
saga_name = project-create
saga_node = VpcNotifySleds
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4696 | 2026-01-27T01:14:09.095Z | DEBG | test_vpcs (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
result = Ok(())
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
saga_name = project-create
saga_node = VpcNotifySleds
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4697 | 2026-01-27T01:14:09.102Z | TRAC | test_vpcs (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }
authenticated = true
resource_id = 001de000-5110-4000-8000-000000000000
resource_type = Silo
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
saga_name = project-create
saga_node = VpcNotifySleds
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4698 | 2026-01-27T01:14:09.102Z | TRAC | test_vpcs (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
saga_name = project-create
saga_node = VpcNotifySleds
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4699 | 2026-01-27T01:14:09.103Z | DEBG | test_vpcs (SagaExecutor): roles
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
saga_name = project-create
saga_node = VpcNotifySleds
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4700 | 2026-01-27T01:14:09.104Z | DEBG | test_vpcs (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
result = Ok(())
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
saga_name = project-create
saga_node = VpcNotifySleds
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4701 | 2026-01-27T01:14:09.112Z | TRAC | test_vpcs (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }
authenticated = true
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
saga_name = project-create
saga_node = VpcNotifySleds
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4702 | 2026-01-27T01:14:09.112Z | TRAC | test_vpcs (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
saga_name = project-create
saga_node = VpcNotifySleds
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4703 | 2026-01-27T01:14:09.112Z | DEBG | test_vpcs (SagaExecutor): roles
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
saga_name = project-create
saga_node = VpcNotifySleds
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4704 | 2026-01-27T01:14:09.113Z | DEBG | test_vpcs (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
result = Ok(())
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
saga_name = project-create
saga_node = VpcNotifySleds
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4705 | 2026-01-27T01:14:09.122Z | DEBG | test_vpcs (SagaExecutor): roles
authenticated = true
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} }
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
saga_name = project-create
saga_node = VpcNotifySleds
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4706 | 2026-01-27T01:14:09.158Z | DEBG | test_vpcs (SagaExecutor): authorize result
action = ListChildren
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 87aaa4f1-0672-47bd-b399-8861de8da8e7, lookup_type: ById(87aaa4f1-0672-47bd-b399-8861de8da8e7) }, key: f8e83d21-ccf9-418f-8d28-ef8fd953b403, lookup_type: ByName("default") }
result = Ok(())
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
saga_name = project-create
saga_node = VpcNotifySleds
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4707 | 2026-01-27T01:14:09.158Z | TRAC | test_vpcs (SagaExecutor): authorize begin
action = ListChildren
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 87aaa4f1-0672-47bd-b399-8861de8da8e7, lookup_type: ById(87aaa4f1-0672-47bd-b399-8861de8da8e7) }, key: f8e83d21-ccf9-418f-8d28-ef8fd953b403, lookup_type: ByName("default") }
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
saga_name = project-create
saga_node = VpcNotifySleds
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4708 | 2026-01-27T01:14:09.158Z | TRAC | test_vpcs (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }
authenticated = true
resource_id = 87aaa4f1-0672-47bd-b399-8861de8da8e7
resource_type = Project
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
saga_name = project-create
saga_node = VpcNotifySleds
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4709 | 2026-01-27T01:14:09.158Z | TRAC | test_vpcs (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
saga_name = project-create
saga_node = VpcNotifySleds
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4710 | 2026-01-27T01:14:09.159Z | DEBG | test_vpcs (SagaExecutor): roles
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
saga_name = project-create
saga_node = VpcNotifySleds
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4711 | 2026-01-27T01:14:09.159Z | DEBG | test_vpcs (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
result = Ok(())
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
saga_name = project-create
saga_node = VpcNotifySleds
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4712 | 2026-01-27T01:14:09.166Z | TRAC | test_vpcs (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }
authenticated = true
resource_id = 001de000-5110-4000-8000-000000000000
resource_type = Silo
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
saga_name = project-create
saga_node = VpcNotifySleds
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4713 | 2026-01-27T01:14:09.167Z | TRAC | test_vpcs (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
saga_name = project-create
saga_node = VpcNotifySleds
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4714 | 2026-01-27T01:14:09.167Z | DEBG | test_vpcs (SagaExecutor): roles
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
saga_name = project-create
saga_node = VpcNotifySleds
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4715 | 2026-01-27T01:14:09.167Z | DEBG | test_vpcs (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
result = Ok(())
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
saga_name = project-create
saga_node = VpcNotifySleds
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4716 | 2026-01-27T01:14:09.173Z | TRAC | test_vpcs (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }
authenticated = true
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
saga_name = project-create
saga_node = VpcNotifySleds
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4717 | 2026-01-27T01:14:09.174Z | TRAC | test_vpcs (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
saga_name = project-create
saga_node = VpcNotifySleds
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4718 | 2026-01-27T01:14:09.174Z | DEBG | test_vpcs (SagaExecutor): roles
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
saga_name = project-create
saga_node = VpcNotifySleds
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4719 | 2026-01-27T01:14:09.174Z | DEBG | test_vpcs (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
result = Ok(())
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
saga_name = project-create
saga_node = VpcNotifySleds
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4720 | 2026-01-27T01:14:09.182Z | DEBG | test_vpcs (SagaExecutor): roles
authenticated = true
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} }
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
saga_name = project-create
saga_node = VpcNotifySleds
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4721 | 2026-01-27T01:14:09.196Z | DEBG | test_vpcs (SagaExecutor): authorize result
action = ListChildren
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 87aaa4f1-0672-47bd-b399-8861de8da8e7, lookup_type: ById(87aaa4f1-0672-47bd-b399-8861de8da8e7) }, key: f8e83d21-ccf9-418f-8d28-ef8fd953b403, lookup_type: ByName("default") }
result = Ok(())
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
saga_name = project-create
saga_node = VpcNotifySleds
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4722 | 2026-01-27T01:14:09.196Z | TRAC | test_vpcs (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
saga_name = project-create
saga_node = VpcNotifySleds
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4723 | 2026-01-27T01:14:09.196Z | DEBG | test_vpcs (SagaExecutor): roles
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
saga_name = project-create
saga_node = VpcNotifySleds
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4724 | 2026-01-27T01:14:09.197Z | DEBG | test_vpcs (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
result = Ok(())
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
saga_name = project-create
saga_node = VpcNotifySleds
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4725 | 2026-01-27T01:14:09.214Z | DEBG | test_vpcs (nexus): resolved names for firewall rules
instance_interfaces = {}
subnet_interfaces = {}
subnet_networks = {}
vpc_interfaces = {}
|
| 4726 | 2026-01-27T01:14:09.215Z | DEBG | test_vpcs (nexus): resolved firewall rules for sled agents
sled_agent_rules = []
|
| 4727 | 2026-01-27T01:14:09.215Z | DEBG | test_vpcs (nexus): resolved 0 rules for sleds
|
| 4728 | 2026-01-27T01:14:09.342Z | DEBG | test_vpcs (nexus): resolved sleds for vpc default
vpc_to_sled = []
|
| 4729 | 2026-01-27T01:14:09.342Z | DEBG | test_vpcs (nexus): sending firewall rules to sled agents
|
| 4730 | 2026-01-27T01:14:09.342Z | INFO | test_vpcs (nexus): updated firewall rules on 0 sleds
|
| 4731 | 2026-01-27T01:14:09.342Z | TRAC | test_vpcs (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
saga_name = project-create
saga_node = VpcNotifySleds
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4732 | 2026-01-27T01:14:09.343Z | DEBG | test_vpcs (SagaExecutor): roles
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
saga_name = project-create
saga_node = VpcNotifySleds
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4733 | 2026-01-27T01:14:09.343Z | DEBG | test_vpcs (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
result = Ok(())
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
saga_name = project-create
saga_node = VpcNotifySleds
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4734 | 2026-01-27T01:14:09.368Z | DEBG | test_vpcs (SEC): saga log event
new_state = N018 succeeded
sec_id = 913233fe-92a8-4635-9572-183f495429c4
|
| 4735 | 2026-01-27T01:14:09.369Z | DEBG | test_vpcs (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 18
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
|
| 4736 | 2026-01-27T01:14:09.399Z | DEBG | test_vpcs (SEC): saga log event
new_state = N019 started
sec_id = 913233fe-92a8-4635-9572-183f495429c4
|
| 4737 | 2026-01-27T01:14:09.403Z | DEBG | test_vpcs (SecStore): recording saga event
event_type = Started
node_id = 19
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
|
| 4738 | 2026-01-27T01:14:09.426Z | DEBG | test_vpcs (SEC): saga log event
new_state = N019 succeeded
sec_id = 913233fe-92a8-4635-9572-183f495429c4
|
| 4739 | 2026-01-27T01:14:09.426Z | DEBG | test_vpcs (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 19
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
|
| 4740 | 2026-01-27T01:14:09.436Z | DEBG | test_vpcs (SEC): saga log event
new_state = N021 started
sec_id = 913233fe-92a8-4635-9572-183f495429c4
|
| 4741 | 2026-01-27T01:14:09.436Z | DEBG | test_vpcs (SecStore): recording saga event
event_type = Started
node_id = 21
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
|
| 4742 | 2026-01-27T01:14:09.442Z | DEBG | test_vpcs (SEC): saga log event
new_state = N021 succeeded
sec_id = 913233fe-92a8-4635-9572-183f495429c4
|
| 4743 | 2026-01-27T01:14:09.442Z | DEBG | test_vpcs (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 21
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
|
| 4744 | 2026-01-27T01:14:09.458Z | INFO | test_vpcs (SEC): update for saga cached state
new_state = Done
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
sec_id = 913233fe-92a8-4635-9572-183f495429c4
|
| 4745 | 2026-01-27T01:14:09.458Z | INFO | test_vpcs (SecStore): updating state
new_state = done
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
|
| 4746 | 2026-01-27T01:14:09.524Z | INFO | test_vpcs (SEC): saga finished
result = success
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
saga_name = project-create
sec_id = 913233fe-92a8-4635-9572-183f495429c4
|
| 4747 | 2026-01-27T01:14:09.524Z | INFO | test_vpcs (SagaQuiesceHandle): tracked saga has finished
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
|
| 4748 | 2026-01-27T01:14:09.525Z | INFO | test_vpcs (SagaExecutor): saga finished
saga_id = 87bf9ee1-5b44-4945-9d49-bcba52767c11
saga_name = project-create
saga_result = SagaResult { saga_id: 87bf9ee1-5b44-4945-9d49-bcba52767c11, saga_log: SagaLog { saga_id: 87bf9ee1-5b44-4945-9d49-bcba52767c11, unwinding: false, events: [N020 started, N020 succeeded, N000 started, N000 succeeded, N001 started, N001 succeeded, N002 started, N002 succeeded, N003 started, N003 succeeded, N004 started, N004 succeeded, N005 started, N005 succeeded, N006 started, N006 succeeded, N007 started, N007 succeeded, N008 started, N008 succeeded, N009 started, N009 succeeded, N010 started, N010 succeeded, N011 started, N011 succeeded, N012 started, N012 succeeded, N013 started, N013 succeeded, N014 started, N014 succeeded, N015 started, N015 succeeded, N016 started, N016 succeeded, N017 started, N017 succeeded, N018 started, N018 succeeded, N019 started, N019 succeeded, N021 started, N021 succeeded], node_status: {0: Succeeded(Array [Object {"key": String("87aaa4f1-0672-47bd-b399-8861de8da8e7"), "lookup_type": Object {"ByName": String("peeky-park")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}, Object {"identity": Object {"description": String("a pier"), "id": String("87aaa4f1-0672-47bd-b399-8861de8da8e7"), "name": String("peeky-park"), "time_created": String("2026-01-27T01:14:08.010405Z"), "time_deleted": Null, "time_modified": String("2026-01-27T01:14:08.010405Z")}, "rcgen": Number(1), "silo_id": String("001de000-5110-4000-8000-000000000000")}]), 1: Succeeded(Object {"authz_project": Object {"key": String("87aaa4f1-0672-47bd-b399-8861de8da8e7"), "lookup_type": Object {"ByName": String("peeky-park")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}, "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}, "credential_id": Null, "device_token_expiration": Null}, Object {"mapped_fleet_roles": Object {}}]}}, "vpc_create": Object {"description": String("Default VPC"), "dns_name": String("default"), "ipv6_prefix": String("fd4f:f905:66ff::/48"), "name": String("default")}}), 2: Succeeded(Null), 3: Succeeded(String("f8e83d21-ccf9-418f-8d28-ef8fd953b403")), 4: Succeeded(String("6f241441-d4fd-4437-8ab8-d9c03a5832e5")), 5: Succeeded(String("a5817081-3c59-4ea3-bdad-a2d0ab0a5ba8")), 6: Succeeded(String("658602dc-bb9c-41aa-a110-25ca7f2e4f51")), 7: Succeeded(String("1a75a3ca-5545-42be-b4cb-8883d818a039")), 8: Succeeded(String("0d13bfa0-224d-4f5f-872e-6bda5c7f29ea")), 9: Succeeded(String("1579c14d-e5cd-40f7-a168-ce2924cd16a7")), 10: Succeeded(Array [Object {"key": String("f8e83d21-ccf9-418f-8d28-ef8fd953b403"), "lookup_type": Object {"ByName": String("default")}, "parent": Object {"key": String("87aaa4f1-0672-47bd-b399-8861de8da8e7"), "lookup_type": Object {"ByName": String("peeky-park")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}}, Object {"dns_name": String("default"), "firewall_gen": Number(1), "identity": Object {"description": String("Default VPC"), "id": String("f8e83d21-ccf9-418f-8d28-ef8fd953b403"), "name": String("default"), "time_created": String("2026-01-27T01:14:08.171344Z"), "time_deleted": Null, "time_modified": String("2026-01-27T01:14:08.171344Z")}, "ipv6_prefix": String("fd4f:f905:66ff::/48"), "project_id": String("87aaa4f1-0672-47bd-b399-8861de8da8e7"), "subnet_gen": Number(1), "system_router_id": String("6f241441-d4fd-4437-8ab8-d9c03a5832e5"), "vni": Number(9338389)}]), 11: Succeeded(Object {"key": String("6f241441-d4fd-4437-8ab8-d9c03a5832e5"), "lookup_type": Object {"ById": String("6f241441-d4fd-4437-8ab8-d9c03a5832e5")}, "parent": Object {"key": String("f8e83d21-ccf9-418f-8d28-ef8fd953b403"), "lookup_type": Object {"ByName": String("default")}, "parent": Object {"key": String("87aaa4f1-0672-47bd-b399-8861de8da8e7"), "lookup_type": Object {"ByName": String("peeky-park")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}}}), 12: Succeeded(Null), 13: Succeeded(Null), 14: Succeeded(Array [Object {"key": String("0d13bfa0-224d-4f5f-872e-6bda5c7f29ea"), "lookup_type": Object {"ById": String("0d13bfa0-224d-4f5f-872e-6bda5c7f29ea")}, "parent": Object {"key": String("f8e83d21-ccf9-418f-8d28-ef8fd953b403"), "lookup_type": Object {"ByName": String("default")}, "parent": Object {"key": String("87aaa4f1-0672-47bd-b399-8861de8da8e7"), "lookup_type": Object {"ByName": String("peeky-park")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}}}, Object {"custom_router_id": Null, "identity": Object {"description": String("The default subnet for default"), "id": String("0d13bfa0-224d-4f5f-872e-6bda5c7f29ea"), "name": String("default"), "time_created": String("2026-01-27T01:14:08.483094Z"), "time_deleted": Null, "time_modified": String("2026-01-27T01:14:08.483094Z")}, "ipv4_block": String("172.30.0.0/22"), "ipv6_block": String("fd4f:f905:66ff::/64"), "rcgen": Number(1), "vpc_id": String("f8e83d21-ccf9-418f-8d28-ef8fd953b403")}]), 15: Succeeded(Object {"key": String("1a75a3ca-5545-42be-b4cb-8883d818a039"), "lookup_type": Object {"ById": String("0d13bfa0-224d-4f5f-872e-6bda5c7f29ea")}, "parent": Object {"key": String("6f241441-d4fd-4437-8ab8-d9c03a5832e5"), "lookup_type": Object {"ById": String("6f241441-d4fd-4437-8ab8-d9c03a5832e5")}, "parent": Object {"key": String("f8e83d21-ccf9-418f-8d28-ef8fd953b403"), "lookup_type": Object {"ByName": String("default")}, "parent": Object {"key": String("87aaa4f1-0672-47bd-b399-8861de8da8e7"), "lookup_type": Object {"ByName": String("peeky-park")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}}}}), 16: Succeeded(Array [Object {"action": String("allow"), "direction": String("inbound"), "filter_hosts": Array [Object {"type": String("vpc"), "value": String("default")}], "filter_ports": Null, "filter_protocols": Null, "identity": Object {"description": String("allow inbound traffic to all instances within the VPC if originated within the VPC"), "id": String("61c988ec-e614-458f-b8c9-b414ea5e7d95"), "name": String("allow-internal-inbound"), "time_created": String("2026-01-27T01:14:08.624749938Z"), "time_deleted": Null, "time_modified": String("2026-01-27T01:14:08.624749938Z")}, "priority": Number(65534), "status": String("enabled"), "targets": Array [Object {"type": String("vpc"), "value": String("default")}], "vpc_id": String("f8e83d21-ccf9-418f-8d28-ef8fd953b403")}, Object {"action": String("allow"), "direction": String("inbound"), "filter_hosts": Null, "filter_ports": Array [String("22")], "filter_protocols": Array [Object {"type": String("tcp")}], "identity": Object {"description": String("allow inbound TCP connections on port 22 from anywhere"), "id": String("c3f303dc-fa4a-477e-98e8-64a99e1f0334"), "name": String("allow-ssh"), "time_created": String("2026-01-27T01:14:08.624770028Z"), "time_deleted": Null, "time_modified": String("2026-01-27T01:14:08.624770028Z")}, "priority": Number(65534), "status": String("enabled"), "targets": Array [Object {"type": String("vpc"), "value": String("default")}], "vpc_id": String("f8e83d21-ccf9-418f-8d28-ef8fd953b403")}, Object {"action": String("allow"), "direction": String("inbound"), "filter_hosts": Null, "filter_ports": Null, "filter_protocols": Array [Object {"type": String("icmp"), "value": Null}], "identity": Object {"description": String("allow inbound ICMP traffic from anywhere"), "id": String("dad3dac5-1bed-4e55-80df-82cd8ea2d7b7"), "name": String("allow-icmp"), "time_created": String("2026-01-27T01:14:08.624778214Z"), "time_deleted": Null, "time_modified": String("2026-01-27T01:14:08.624778214Z")}, "priority": Number(65534), "status": String("enabled"), "targets": Array [Object {"type": String("vpc"), "value": String("default")}], "vpc_id": String("f8e83d21-ccf9-418f-8d28-ef8fd953b403")}]), 17: Succeeded(Object {"key": String("1579c14d-e5cd-40f7-a168-ce2924cd16a7"), "lookup_type": Object {"ById": String("1579c14d-e5cd-40f7-a168-ce2924cd16a7")}, "parent": Object {"key": String("f8e83d21-ccf9-418f-8d28-ef8fd953b403"), "lookup_type": Object {"ByName": String("default")}, "parent": Object {"key": String("87aaa4f1-0672-47bd-b399-8861de8da8e7"), "lookup_type": Object {"ByName": String("peeky-park")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}}}), 18: Succeeded(Null), 19: Succeeded(Null), 20: Succeeded(Null), 21: Succeeded(Null)} }, kind: Ok(SagaResultOk { saga_output: Null, node_outputs: {"default_internet_gateway_id": String("1579c14d-e5cd-40f7-a168-ce2924cd16a7"), "default_subnet_id": String("0d13bfa0-224d-4f5f-872e-6bda5c7f29ea"), "default_v4_route_id": String("a5817081-3c59-4ea3-bdad-a2d0ab0a5ba8"), "default_v6_route_id": String("658602dc-bb9c-41aa-a110-25ca7f2e4f51"), "firewall": Array [Object {"action": String("allow"), "direction": String("inbound"), "filter_hosts": Array [Object {"type": String("vpc"), "value": String("default")}], "filter_ports": Null, "filter_protocols": Null, "identity": Object {"description": String("allow inbound traffic to all instances within the VPC if originated within the VPC"), "id": String("61c988ec-e614-458f-b8c9-b414ea5e7d95"), "name": String("allow-internal-inbound"), "time_created": String("2026-01-27T01:14:08.624749938Z"), "time_deleted": Null, "time_modified": String("2026-01-27T01:14:08.624749938Z")}, "priority": Number(65534), "status": String("enabled"), "targets": Array [Object {"type": String("vpc"), "value": String("default")}], "vpc_id": String("f8e83d21-ccf9-418f-8d28-ef8fd953b403")}, Object {"action": String("allow"), "direction": String("inbound"), "filter_hosts": Null, "filter_ports": Array [String("22")], "filter_protocols": Array [Object {"type": String("tcp")}], "identity": Object {"description": String("allow inbound TCP connections on port 22 from anywhere"), "id": String("c3f303dc-fa4a-477e-98e8-64a99e1f0334"), "name": String("allow-ssh"), "time_created": String("2026-01-27T01:14:08.624770028Z"), "time_deleted": Null, "time_modified": String("2026-01-27T01:14:08.624770028Z")}, "priority": Number(65534), "status": String("enabled"), "targets": Array [Object {"type": String("vpc"), "value": String("default")}], "vpc_id": String("f8e83d21-ccf9-418f-8d28-ef8fd953b403")}, Object {"action": String("allow"), "direction": String("inbound"), "filter_hosts": Null, "filter_ports": Null, "filter_protocols": Array [Object {"type": String("icmp"), "value": Null}], "identity": Object {"description": String("allow inbound ICMP traffic from anywhere"), "id": String("dad3dac5-1bed-4e55-80df-82cd8ea2d7b7"), "name": String("allow-icmp"), "time_created": String("2026-01-27T01:14:08.624778214Z"), "time_deleted": Null, "time_modified": String("2026-01-27T01:14:08.624778214Z")}, "priority": Number(65534), "status": String("enabled"), "targets": Array [Object {"type": String("vpc"), "value": String("default")}], "vpc_id": String("f8e83d21-ccf9-418f-8d28-ef8fd953b403")}], "gateway": Object {"key": String("1579c14d-e5cd-40f7-a168-ce2924cd16a7"), "lookup_type": Object {"ById": String("1579c14d-e5cd-40f7-a168-ce2924cd16a7")}, "parent": Object {"key": String("f8e83d21-ccf9-418f-8d28-ef8fd953b403"), "lookup_type": Object {"ByName": String("default")}, "parent": Object {"key": String("87aaa4f1-0672-47bd-b399-8861de8da8e7"), "lookup_type": Object {"ByName": String("peeky-park")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}}}, "no_result": Null, "project": Array [Object {"key": String("87aaa4f1-0672-47bd-b399-8861de8da8e7"), "lookup_type": Object {"ByName": String("peeky-park")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}, Object {"identity": Object {"description": String("a pier"), "id": String("87aaa4f1-0672-47bd-b399-8861de8da8e7"), "name": String("peeky-park"), "time_created": String("2026-01-27T01:14:08.010405Z"), "time_deleted": Null, "time_modified": String("2026-01-27T01:14:08.010405Z")}, "rcgen": Number(1), "silo_id": String("001de000-5110-4000-8000-000000000000")}], "route": Object {"key": String("1a75a3ca-5545-42be-b4cb-8883d818a039"), "lookup_type": Object {"ById": String("0d13bfa0-224d-4f5f-872e-6bda5c7f29ea")}, "parent": Object {"key": String("6f241441-d4fd-4437-8ab8-d9c03a5832e5"), "lookup_type": Object {"ById": String("6f241441-d4fd-4437-8ab8-d9c03a5832e5")}, "parent": Object {"key": String("f8e83d21-ccf9-418f-8d28-ef8fd953b403"), "lookup_type": Object {"ByName": String("default")}, "parent": Object {"key": String("87aaa4f1-0672-47bd-b399-8861de8da8e7"), "lookup_type": Object {"ByName": String("peeky-park")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}}}}, "route4": Null, "route6": Null, "router": Object {"key": String("6f241441-d4fd-4437-8ab8-d9c03a5832e5"), "lookup_type": Object {"ById": String("6f241441-d4fd-4437-8ab8-d9c03a5832e5")}, "parent": Object {"key": String("f8e83d21-ccf9-418f-8d28-ef8fd953b403"), "lookup_type": Object {"ByName": String("default")}, "parent": Object {"key": String("87aaa4f1-0672-47bd-b399-8861de8da8e7"), "lookup_type": Object {"ByName": String("peeky-park")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}}}, "subnet": Array [Object {"key": String("0d13bfa0-224d-4f5f-872e-6bda5c7f29ea"), "lookup_type": Object {"ById": String("0d13bfa0-224d-4f5f-872e-6bda5c7f29ea")}, "parent": Object {"key": String("f8e83d21-ccf9-418f-8d28-ef8fd953b403"), "lookup_type": Object {"ByName": String("default")}, "parent": Object {"key": String("87aaa4f1-0672-47bd-b399-8861de8da8e7"), "lookup_type": Object {"ByName": String("peeky-park")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}}}, Object {"custom_router_id": Null, "identity": Object {"description": String("The default subnet for default"), "id": String("0d13bfa0-224d-4f5f-872e-6bda5c7f29ea"), "name": String("default"), "time_created": String("2026-01-27T01:14:08.483094Z"), "time_deleted": Null, "time_modified": String("2026-01-27T01:14:08.483094Z")}, "ipv4_block": String("172.30.0.0/22"), "ipv6_block": String("fd4f:f905:66ff::/64"), "rcgen": Number(1), "vpc_id": String("f8e83d21-ccf9-418f-8d28-ef8fd953b403")}], "subnet_route_id": String("1a75a3ca-5545-42be-b4cb-8883d818a039"), "system_router_id": String("6f241441-d4fd-4437-8ab8-d9c03a5832e5"), "vpc": Null, "vpc_create_params": Object {"authz_project": Object {"key": String("87aaa4f1-0672-47bd-b399-8861de8da8e7"), "lookup_type": Object {"ByName": String("peeky-park")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}, "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}, "credential_id": Null, "device_token_expiration": Null}, Object {"mapped_fleet_roles": Object {}}]}}, "vpc_create": Object {"description": String("Default VPC"), "dns_name": String("default"), "ipv6_prefix": String("fd4f:f905:66ff::/48"), "name": String("default")}}, "vpc_id": String("f8e83d21-ccf9-418f-8d28-ef8fd953b403")} }) }
|
| 4749 | 2026-01-27T01:14:09.527Z | TRAC | test_vpcs (dropshot_external): authorize begin
action = CreateChild
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
local_addr = 127.0.0.1:50372
method = POST
remote_addr = 127.0.0.1:38658
req_id = 2c4023ef-c6a2-448b-9a04-47ec3b9e1661
resource = AuditLog
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
uri = /v1/projects
|
| 4750 | 2026-01-27T01:14:09.527Z | TRAC | test_vpcs (dropshot_external): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }
authenticated = true
local_addr = 127.0.0.1:50372
method = POST
remote_addr = 127.0.0.1:38658
req_id = 2c4023ef-c6a2-448b-9a04-47ec3b9e1661
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
uri = /v1/projects
|
| 4751 | 2026-01-27T01:14:09.527Z | TRAC | test_vpcs (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
local_addr = 127.0.0.1:50372
method = POST
remote_addr = 127.0.0.1:38658
req_id = 2c4023ef-c6a2-448b-9a04-47ec3b9e1661
resource = Database
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
uri = /v1/projects
|
| 4752 | 2026-01-27T01:14:09.527Z | DEBG | test_vpcs (dropshot_external): roles
authenticated = true
local_addr = 127.0.0.1:50372
method = POST
remote_addr = 127.0.0.1:38658
req_id = 2c4023ef-c6a2-448b-9a04-47ec3b9e1661
roles = RoleSet { roles: {} }
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
uri = /v1/projects
|
| 4753 | 2026-01-27T01:14:09.527Z | DEBG | test_vpcs (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
local_addr = 127.0.0.1:50372
method = POST
remote_addr = 127.0.0.1:38658
req_id = 2c4023ef-c6a2-448b-9a04-47ec3b9e1661
resource = Database
result = Ok(())
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
uri = /v1/projects
|
| 4754 | 2026-01-27T01:14:09.532Z | DEBG | test_vpcs (dropshot_external): roles
authenticated = true
local_addr = 127.0.0.1:50372
method = POST
remote_addr = 127.0.0.1:38658
req_id = 2c4023ef-c6a2-448b-9a04-47ec3b9e1661
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
uri = /v1/projects
|
| 4755 | 2026-01-27T01:14:09.534Z | DEBG | test_vpcs (dropshot_external): authorize result
action = CreateChild
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
local_addr = 127.0.0.1:50372
method = POST
remote_addr = 127.0.0.1:38658
req_id = 2c4023ef-c6a2-448b-9a04-47ec3b9e1661
resource = AuditLog
result = Ok(())
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
uri = /v1/projects
|
| 4756 | 2026-01-27T01:14:09.534Z | TRAC | test_vpcs (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
local_addr = 127.0.0.1:50372
method = POST
remote_addr = 127.0.0.1:38658
req_id = 2c4023ef-c6a2-448b-9a04-47ec3b9e1661
resource = Database
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
uri = /v1/projects
|
| 4757 | 2026-01-27T01:14:09.534Z | DEBG | test_vpcs (dropshot_external): roles
authenticated = true
local_addr = 127.0.0.1:50372
method = POST
remote_addr = 127.0.0.1:38658
req_id = 2c4023ef-c6a2-448b-9a04-47ec3b9e1661
roles = RoleSet { roles: {} }
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
uri = /v1/projects
|
| 4758 | 2026-01-27T01:14:09.535Z | DEBG | test_vpcs (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
local_addr = 127.0.0.1:50372
method = POST
remote_addr = 127.0.0.1:38658
req_id = 2c4023ef-c6a2-448b-9a04-47ec3b9e1661
resource = Database
result = Ok(())
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
uri = /v1/projects
|
| 4759 | 2026-01-27T01:14:09.626Z | INFO | test_vpcs (dropshot_external): request completed
latency_us = 1739489
local_addr = 127.0.0.1:50372
method = POST
remote_addr = 127.0.0.1:38658
req_id = 2c4023ef-c6a2-448b-9a04-47ec3b9e1661
response_code = 201
uri = /v1/projects
|
| 4760 | 2026-01-27T01:14:09.627Z | INFO | test_vpcs (external client test context): client received response
status = 201
|
| 4761 | 2026-01-27T01:14:09.627Z | INFO | test_vpcs (external client test context): client request
body = Body { inner: BoxBody }
method = GET
uri = http://127.0.0.1:50372/v1/vpcs?project=springfield-squidport
|
| 4762 | 2026-01-27T01:14:09.627Z | TRAC | test_vpcs (dropshot_external): incoming request
local_addr = 127.0.0.1:50372
method = GET
remote_addr = 127.0.0.1:38658
req_id = 10e4cfb1-114a-438d-beb2-ffccb00193f5
uri = /v1/vpcs?project=springfield-squidport
|
| 4763 | 2026-01-27T01:14:09.627Z | DEBG | test_vpcs (dropshot_external): determined request API version
local_addr = 127.0.0.1:50372
method = GET
remote_addr = 127.0.0.1:38658
req_id = 10e4cfb1-114a-438d-beb2-ffccb00193f5
uri = /v1/vpcs?project=springfield-squidport
version = 2026012300.0.0
|
| 4764 | 2026-01-27T01:14:09.628Z | TRAC | test_vpcs (dropshot_external): authn: trying Spoof
local_addr = 127.0.0.1:50372
method = GET
remote_addr = 127.0.0.1:38658
req_id = 10e4cfb1-114a-438d-beb2-ffccb00193f5
uri = /v1/vpcs?project=springfield-squidport
|
| 4765 | 2026-01-27T01:14:09.628Z | DEBG | test_vpcs (dropshot_external): looking up silo for user
local_addr = 127.0.0.1:50372
method = GET
remote_addr = 127.0.0.1:38658
req_id = 10e4cfb1-114a-438d-beb2-ffccb00193f5
silo_user_id = 001de000-05e4-4000-8000-000000004007
uri = /v1/vpcs?project=springfield-squidport
|
| 4766 | 2026-01-27T01:14:09.628Z | TRAC | test_vpcs (ExternalAuthn): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. })
resource = Database
|
| 4767 | 2026-01-27T01:14:09.628Z | DEBG | test_vpcs (ExternalAuthn): roles
roles = RoleSet { roles: {} }
|
| 4768 | 2026-01-27T01:14:09.629Z | DEBG | test_vpcs (ExternalAuthn): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 4769 | 2026-01-27T01:14:09.631Z | DEBG | test_vpcs (results-sink): inserting 1 samples into database
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
|
| 4770 | 2026-01-27T01:14:09.631Z | DEBG | test_vpcs (results-sink-cluster): inserting 1 samples into database
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
|
| 4771 | 2026-01-27T01:14:09.631Z | DEBG | test_vpcs (clickhouse-client): unrolling 1 total samples
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 719060a6-12ac-470c-bb91-e566c7f997b2
|
| 4772 | 2026-01-27T01:14:09.633Z | TRAC | test_vpcs (clickhouse-client): inserting data
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 719060a6-12ac-470c-bb91-e566c7f997b2
n_columns = 4
n_rows = 2
sql = INSERT INTO oximeter.fields_string FORMAT Native
|
| 4773 | 2026-01-27T01:14:09.636Z | TRAC | test_vpcs (ExternalAuthn): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. })
resource = Database
|
| 4774 | 2026-01-27T01:14:09.636Z | DEBG | test_vpcs (ExternalAuthn): roles
roles = RoleSet { roles: {} }
|
| 4775 | 2026-01-27T01:14:09.637Z | DEBG | test_vpcs (ExternalAuthn): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 4776 | 2026-01-27T01:14:09.639Z | DEBG | test_vpcs (clickhouse-client): inserted rows into table
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 719060a6-12ac-470c-bb91-e566c7f997b2
n_rows = 2
table_name = fields_string
|
| 4777 | 2026-01-27T01:14:09.639Z | TRAC | test_vpcs (clickhouse-client): inserting data
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 719060a6-12ac-470c-bb91-e566c7f997b2
n_columns = 4
n_rows = 1
sql = INSERT INTO oximeter.measurements_i64 FORMAT Native
|
| 4778 | 2026-01-27T01:14:09.641Z | TRAC | test_vpcs (ExternalAuthn): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. })
resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007 (silo_user), lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
|
| 4779 | 2026-01-27T01:14:09.642Z | TRAC | test_vpcs (ExternalAuthn): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. }
resource_id = 001de000-5110-4000-8000-000000000000
resource_type = Silo
|
| 4780 | 2026-01-27T01:14:09.642Z | TRAC | test_vpcs (ExternalAuthn): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. })
resource = Database
|
| 4781 | 2026-01-27T01:14:09.642Z | DEBG | test_vpcs (ExternalAuthn): roles
roles = RoleSet { roles: {} }
|
| 4782 | 2026-01-27T01:14:09.643Z | DEBG | test_vpcs (ExternalAuthn): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 4783 | 2026-01-27T01:14:09.646Z | DEBG | test_vpcs (clickhouse-client): inserted rows into table
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 719060a6-12ac-470c-bb91-e566c7f997b2
n_rows = 1
table_name = measurements_i64
|
| 4784 | 2026-01-27T01:14:09.646Z | TRAC | test_vpcs (results-sink): successfully inserted samples
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
|
| 4785 | 2026-01-27T01:14:09.648Z | TRAC | test_vpcs (ExternalAuthn): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 4786 | 2026-01-27T01:14:09.648Z | TRAC | test_vpcs (ExternalAuthn): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. })
resource = Database
|
| 4787 | 2026-01-27T01:14:09.648Z | DEBG | test_vpcs (ExternalAuthn): roles
roles = RoleSet { roles: {} }
|
| 4788 | 2026-01-27T01:14:09.649Z | DEBG | test_vpcs (ExternalAuthn): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 4789 | 2026-01-27T01:14:09.654Z | DEBG | test_vpcs (ExternalAuthn): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
|
| 4790 | 2026-01-27T01:14:09.659Z | DEBG | test_vpcs (ExternalAuthn): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. })
resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007 (silo_user), lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
result = Ok(())
|
| 4791 | 2026-01-27T01:14:09.659Z | TRAC | test_vpcs (ExternalAuthn): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. })
resource = Database
|
| 4792 | 2026-01-27T01:14:09.659Z | DEBG | test_vpcs (ExternalAuthn): roles
roles = RoleSet { roles: {} }
|
| 4793 | 2026-01-27T01:14:09.659Z | DEBG | test_vpcs (ExternalAuthn): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 4794 | 2026-01-27T01:14:09.664Z | TRAC | test_vpcs (ExternalAuthn): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. })
resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
|
| 4795 | 2026-01-27T01:14:09.664Z | TRAC | test_vpcs (ExternalAuthn): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. }
resource_id = 001de000-5110-4000-8000-000000000000
resource_type = Silo
|
| 4796 | 2026-01-27T01:14:09.664Z | TRAC | test_vpcs (ExternalAuthn): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. })
resource = Database
|
| 4797 | 2026-01-27T01:14:09.664Z | DEBG | test_vpcs (ExternalAuthn): roles
roles = RoleSet { roles: {} }
|
| 4798 | 2026-01-27T01:14:09.665Z | DEBG | test_vpcs (ExternalAuthn): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 4799 | 2026-01-27T01:14:09.679Z | TRAC | test_vpcs (ExternalAuthn): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 4800 | 2026-01-27T01:14:09.679Z | TRAC | test_vpcs (ExternalAuthn): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. })
resource = Database
|
| 4801 | 2026-01-27T01:14:09.679Z | DEBG | test_vpcs (ExternalAuthn): roles
roles = RoleSet { roles: {} }
|
| 4802 | 2026-01-27T01:14:09.680Z | DEBG | test_vpcs (ExternalAuthn): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 4803 | 2026-01-27T01:14:09.685Z | DEBG | test_vpcs (ExternalAuthn): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
|