| 1 | 2026-03-09T10:56:02.170Z | DEBG | test_update_status (init_with_steps): Running step start_crdb
|
| 2 | 2026-03-09T10:56:02.171Z | DEBG | test_update_status: Starting CRDB
|
| 3 | 2026-03-09T10:56:02.234Z | INFO | test_update_status: cockroach temporary directory: /var/tmp/omicron_tmp/.tmpSNECTU
|
| 4 | 2026-03-09T10:56:02.234Z | INFO | test_update_status: cockroach: copying from seed tarball (/var/tmp/omicron_tmp/crdb-base-build/c8842cbc45c90955cb97001831af66250e514541e95d28324b7cfe9a2e2fa1b7.tar) to storage directory (/var/tmp/omicron_tmp/.tmpSNECTU/data)
|
| 5 | 2026-03-09T10:56:02.278Z | INFO | test_update_status: cockroach command line: cockroach start-single-node --insecure --http-addr=:0 --store=path=/var/tmp/omicron_tmp/.tmpSNECTU/data,ballast-size=0 --listen-addr [::1]:0 --listening-url-file /var/tmp/omicron_tmp/.tmpSNECTU/listen-url --max-sql-memory 256MiB
|
| 6 | 2026-03-09T10:56:02.279Z | INFO | test_update_status: cockroach environment: BUILDOMAT_JOB_ID=01KK91SF5BB0WPXZ5EM22HKRG6 BUILDOMAT_TASK_ID=4 CARGO=/home/build/.rustup/toolchains/1.91.1-x86_64-unknown-illumos/bin/cargo CARGO_HOME=/home/build/.cargo CARGO_INCREMENTAL=0 CARGO_MANIFEST_DIR=/work/oxidecomputer/omicron/nexus CARGO_PKG_AUTHORS= CARGO_PKG_DESCRIPTION= CARGO_PKG_HOMEPAGE= CARGO_PKG_LICENSE=MPL-2.0 CARGO_PKG_LICENSE_FILE= CARGO_PKG_NAME=omicron-nexus CARGO_PKG_REPOSITORY= CARGO_PKG_RUST_VERSION= CARGO_PKG_VERSION=0.1.0 CARGO_PKG_VERSION_MAJOR=0 CARGO_PKG_VERSION_MINOR=1 CARGO_PKG_VERSION_PATCH=0 CARGO_PKG_VERSION_PRE= CARGO_TERM_COLOR=always CI=true CRDB_SEED_TAR=/var/tmp/omicron_tmp/crdb-base-build/c8842cbc45c90955cb97001831af66250e514541e95d28324b7cfe9a2e2fa1b7.tar GITHUB_BRANCH=ea-ztnrpmzzkqvp GITHUB_REF=refs/heads/ea-ztnrpmzzkqvp GITHUB_REPOSITORY=oxidecomputer/omicron GITHUB_SHA=0d11cb86329d8bf3d16bea1593ce873b169a005e GOTRACEBACK=crash HOME=/home/build LANG=en_US.UTF-8 LC_ALL=en_US.UTF-8 LD_LIBRARY_PATH=/work/oxidecomputer/omicron/target/debug/build/aws-lc-sys-b2991dcfe0032b19/out:/work/oxidecomputer/omicron/target/debug/build/blake3-df20c6b18d3956e5/out:/work/oxidecomputer/omicron/target/debug/build/bzip2-sys-8b0f050bf31de6f5/out/lib:/work/oxidecomputer/omicron/target/debug/build/libgit2-sys-fc1bb2730a9a80d7/out/build:/work/oxidecomputer/omicron/target/debug/build/psm-e3b3fd8e545b20fd/out:/work/oxidecomputer/omicron/target/debug/build/ring-882060e0ad2a422c/out:/work/oxidecomputer/omicron/target/debug/build/tofino-d064271f908edbf6/out:/work/oxidecomputer/omicron/target/debug/build/zstd-sys-54b41a4eb78e9d96/out:/work/oxidecomputer/omicron/target/debug/deps:/work/oxidecomputer/omicron/target/debug:/home/build/.rustup/toolchains/1.91.1-x86_64-unknown-illumos/lib/rustlib/x86_64-unknown-illumos/lib:/home/build/.rustup/toolchains/1.91.1-x86_64-unknown-illumos/lib LOGNAME=build NEXTEST=1 NEXTEST_ATTEMPT=1 NEXTEST_ATTEMPT_ID=474e743c-5914-4929-a6b4-3d11f13d1049:omicron-nexus::test_all$integration_tests::updates::test_update_status NEXTEST_BINARY_ID=omicron-nexus::test_all NEXTEST_BIN_EXE_nexus=/work/oxidecomputer/omicron/target/debug/nexus NEXTEST_BIN_EXE_schema-updater=/work/oxidecomputer/omicron/target/debug/schema-updater NEXTEST_BIN_EXE_schema_updater=/work/oxidecomputer/omicron/target/debug/schema-updater NEXTEST_EXECUTION_MODE=process-per-test NEXTEST_LD_LIBRARY_PATH=/work/oxidecomputer/omicron/target/debug/build/aws-lc-sys-b2991dcfe0032b19/out:/work/oxidecomputer/omicron/target/debug/build/blake3-df20c6b18d3956e5/out:/work/oxidecomputer/omicron/target/debug/build/bzip2-sys-8b0f050bf31de6f5/out/lib:/work/oxidecomputer/omicron/target/debug/build/libgit2-sys-fc1bb2730a9a80d7/out/build:/work/oxidecomputer/omicron/target/debug/build/psm-e3b3fd8e545b20fd/out:/work/oxidecomputer/omicron/target/debug/build/ring-882060e0ad2a422c/out:/work/oxidecomputer/omicron/target/debug/build/tofino-d064271f908edbf6/out:/work/oxidecomputer/omicron/target/debug/build/zstd-sys-54b41a4eb78e9d96/out:/work/oxidecomputer/omicron/target/debug/deps:/work/oxidecomputer/omicron/target/debug:/home/build/.rustup/toolchains/1.91.1-x86_64-unknown-illumos/lib/rustlib/x86_64-unknown-illumos/lib:/home/build/.rustup/toolchains/1.91.1-x86_64-unknown-illumos/lib NEXTEST_PROFILE=ci NEXTEST_RUN_ID=474e743c-5914-4929-a6b4-3d11f13d1049 NEXTEST_RUN_MODE=test NEXTEST_STATE_DIR=/tmp/nextest-state._AaaKs NEXTEST_STRESS_CURRENT=none NEXTEST_STRESS_TOTAL=none NEXTEST_TEST_GLOBAL_SLOT=22 NEXTEST_TEST_GROUP=@global NEXTEST_TEST_GROUP_SLOT=none NEXTEST_TEST_NAME=integration_tests::updates::test_update_status NEXTEST_TEST_PHASE=run NEXTEST_TOTAL_ATTEMPTS=1 OUT_DIR=/work/oxidecomputer/omicron/target/debug/build/omicron-nexus-3b5642a0768e3b39/out PATH=/work/oxidecomputer/omicron/out/mgd/root/opt/oxide/mgd/bin:/work/oxidecomputer/omicron/out/dendrite-stub/bin:/work/oxidecomputer/omicron/out/clickhouse:/work/oxidecomputer/omicron/out/cockroachdb/bin:/home/build/.cargo/bin:/usr/bin:/bin:/usr/sbin:/sbin:/opt/ooce/bin:/opt/ooce/sbin PWD=/work/oxidecomputer/omicron RUSTC_BOOTSTRAP=1 RUSTDOCFLAGS=--document-private-items -D warnings RUSTFLAGS=--cfg tokio_unstable -D warnings -C link-arg=-R/usr/platform/oxide/lib/amd64 RUSTUP_HOME=/home/build/.rustup RUSTUP_TOOLCHAIN=1.91.1-x86_64-unknown-illumos RUST_BACKTRACE=1 RUST_RECURSION_COUNT=1 SHLVL=1 SSL_CERT_DIR=/usr/ssl/certs SSL_CERT_FILE=/etc/ssl/cacert.pem TMPDIR=/var/tmp/omicron_tmp TZ=UTC USER=build _=/usr/bin/ptime
|
| 7 | 2026-03-09T10:56:03.614Z | INFO | test_update_status: cockroach pid: 2887
|
| 8 | 2026-03-09T10:56:03.614Z | INFO | test_update_status: cockroach listen URL: postgresql://root@[::1]:38023/omicron?sslmode=disable
|
| 9 | 2026-03-09T10:56:03.717Z | DEBG | test_update_status (init_with_steps): Running step start_clickhouse
|
| 10 | 2026-03-09T10:56:03.717Z | DEBG | test_update_status: Starting Clickhouse
|
| 11 | 2026-03-09T10:56:04.419Z | DEBG | test_update_status (init_with_steps): Running step start_internal_dns
|
| 12 | 2026-03-09T10:56:04.419Z | INFO | test_update_status (store): opening sled database
path = /var/tmp/omicron_tmp/.tmpYZjoc1
|
| 13 | 2026-03-09T10:56:04.481Z | INFO | test_update_status (store): pruning trees for generations newer than 0
|
| 14 | 2026-03-09T10:56:04.481Z | INFO | test_update_status (store): pruning trees for generations older than 0
keep = 3
|
| 15 | 2026-03-09T10:56:04.481Z | INFO | test_update_status (dns): DNS server bound to address
kind = dns
local_address = [::1]:43014
|
| 16 | 2026-03-09T10:56:04.482Z | DEBG | test_update_status (http): registered endpoint
kind = dns
local_addr = [::1]:37611
method = GET
path = /config
versions = all starting from 2.0.0
|
| 17 | 2026-03-09T10:56:04.482Z | DEBG | test_update_status (http): registered endpoint
kind = dns
local_addr = [::1]:37611
method = GET
path = /config
versions = from 1.0.0 to 2.0.0
|
| 18 | 2026-03-09T10:56:04.482Z | DEBG | test_update_status (http): registered endpoint
kind = dns
local_addr = [::1]:37611
method = PUT
path = /config
versions = all starting from 2.0.0
|
| 19 | 2026-03-09T10:56:04.482Z | DEBG | test_update_status (http): registered endpoint
kind = dns
local_addr = [::1]:37611
method = PUT
path = /config
versions = from 1.0.0 to 2.0.0
|
| 20 | 2026-03-09T10:56:04.482Z | INFO | test_update_status (http): listening
kind = dns
local_addr = [::1]:37611
|
| 21 | 2026-03-09T10:56:04.482Z | DEBG | test_update_status (http): successfully registered DTrace USDT probes
kind = dns
local_addr = [::1]:37611
|
| 22 | 2026-03-09T10:56:04.483Z | DEBG | test_update_status (init_with_steps): Running step start_external_dns
|
| 23 | 2026-03-09T10:56:04.483Z | INFO | test_update_status (store): opening sled database
path = /var/tmp/omicron_tmp/.tmp4rFLzM
|
| 24 | 2026-03-09T10:56:04.489Z | INFO | test_update_status (store): pruning trees for generations newer than 0
|
| 25 | 2026-03-09T10:56:04.489Z | INFO | test_update_status (store): pruning trees for generations older than 0
keep = 3
|
| 26 | 2026-03-09T10:56:04.489Z | INFO | test_update_status (dns): DNS server bound to address
kind = dns
local_address = [::1]:56080
|
| 27 | 2026-03-09T10:56:04.489Z | DEBG | test_update_status (http): registered endpoint
kind = dns
local_addr = [::1]:65043
method = GET
path = /config
versions = all starting from 2.0.0
|
| 28 | 2026-03-09T10:56:04.489Z | DEBG | test_update_status (http): registered endpoint
kind = dns
local_addr = [::1]:65043
method = GET
path = /config
versions = from 1.0.0 to 2.0.0
|
| 29 | 2026-03-09T10:56:04.489Z | DEBG | test_update_status (http): registered endpoint
kind = dns
local_addr = [::1]:65043
method = PUT
path = /config
versions = all starting from 2.0.0
|
| 30 | 2026-03-09T10:56:04.490Z | DEBG | test_update_status (http): registered endpoint
kind = dns
local_addr = [::1]:65043
method = PUT
path = /config
versions = from 1.0.0 to 2.0.0
|
| 31 | 2026-03-09T10:56:04.490Z | INFO | test_update_status (http): listening
kind = dns
local_addr = [::1]:65043
|
| 32 | 2026-03-09T10:56:04.490Z | DEBG | test_update_status (http): successfully registered DTrace USDT probes
kind = dns
local_addr = [::1]:65043
|
| 33 | 2026-03-09T10:56:04.491Z | DEBG | test_update_status (init_with_steps): Running step start_nexus_internal
|
| 34 | 2026-03-09T10:56:04.491Z | DEBG | test_update_status: Starting Nexus (internal API)
|
| 35 | 2026-03-09T10:56:04.491Z | INFO | test_update_status: setting up nexus server
|
| 36 | 2026-03-09T10:56:04.494Z | INFO | test_update_status (ServerContext): registering Oso class
class = Action
|
| 37 | 2026-03-09T10:56:04.494Z | INFO | test_update_status (ServerContext): registering Oso class
class = AuditLog
|
| 38 | 2026-03-09T10:56:04.494Z | INFO | test_update_status (ServerContext): registering Oso class
class = AnyActor
|
| 39 | 2026-03-09T10:56:04.494Z | INFO | test_update_status (ServerContext): registering Oso class
class = AuthenticatedActor
|
| 40 | 2026-03-09T10:56:04.494Z | INFO | test_update_status (ServerContext): registering Oso class
class = BlueprintConfig
|
| 41 | 2026-03-09T10:56:04.494Z | INFO | test_update_status (ServerContext): registering Oso class
class = Database
|
| 42 | 2026-03-09T10:56:04.494Z | INFO | test_update_status (ServerContext): registering Oso class
class = DnsConfig
|
| 43 | 2026-03-09T10:56:04.494Z | INFO | test_update_status (ServerContext): registering Oso class
class = Fleet
|
| 44 | 2026-03-09T10:56:04.494Z | INFO | test_update_status (ServerContext): registering Oso class
class = Inventory
|
| 45 | 2026-03-09T10:56:04.494Z | INFO | test_update_status (ServerContext): registering Oso class
class = IpPoolList
|
| 46 | 2026-03-09T10:56:04.494Z | INFO | test_update_status (ServerContext): registering Oso class
class = VpcList
|
| 47 | 2026-03-09T10:56:04.494Z | INFO | test_update_status (ServerContext): registering Oso class
class = ConsoleSessionList
|
| 48 | 2026-03-09T10:56:04.494Z | INFO | test_update_status (ServerContext): registering Oso class
class = DeviceAuthRequestList
|
| 49 | 2026-03-09T10:56:04.494Z | INFO | test_update_status (ServerContext): registering Oso class
class = QuiesceState
|
| 50 | 2026-03-09T10:56:04.494Z | INFO | test_update_status (ServerContext): registering Oso class
class = SiloCertificateList
|
| 51 | 2026-03-09T10:56:04.494Z | INFO | test_update_status (ServerContext): registering Oso class
class = SiloGroupList
|
| 52 | 2026-03-09T10:56:04.494Z | INFO | test_update_status (ServerContext): registering Oso class
class = SiloIdentityProviderList
|
| 53 | 2026-03-09T10:56:04.494Z | INFO | test_update_status (ServerContext): registering Oso class
class = SiloUserList
|
| 54 | 2026-03-09T10:56:04.494Z | INFO | test_update_status (ServerContext): registering Oso class
class = SiloUserSessionList
|
| 55 | 2026-03-09T10:56:04.494Z | INFO | test_update_status (ServerContext): registering Oso class
class = SiloUserTokenList
|
| 56 | 2026-03-09T10:56:04.494Z | INFO | test_update_status (ServerContext): registering Oso class
class = SubnetPoolList
|
| 57 | 2026-03-09T10:56:04.494Z | INFO | test_update_status (ServerContext): registering Oso class
class = UpdateTrustRootList
|
| 58 | 2026-03-09T10:56:04.494Z | INFO | test_update_status (ServerContext): registering Oso class
class = TargetReleaseConfig
|
| 59 | 2026-03-09T10:56:04.494Z | INFO | test_update_status (ServerContext): registering Oso class
class = AlertClassList
|
| 60 | 2026-03-09T10:56:04.494Z | INFO | test_update_status (ServerContext): registering Oso class
class = ScimClientBearerTokenList
|
| 61 | 2026-03-09T10:56:04.494Z | INFO | test_update_status (ServerContext): registering Oso class
class = MulticastGroupList
|
| 62 | 2026-03-09T10:56:04.495Z | INFO | test_update_status (ServerContext): registering Oso class
class = Project
|
| 63 | 2026-03-09T10:56:04.495Z | INFO | test_update_status (ServerContext): registering Oso class
class = Disk
|
| 64 | 2026-03-09T10:56:04.495Z | INFO | test_update_status (ServerContext): registering Oso class
class = Snapshot
|
| 65 | 2026-03-09T10:56:04.495Z | INFO | test_update_status (ServerContext): registering Oso class
class = ProjectImage
|
| 66 | 2026-03-09T10:56:04.495Z | INFO | test_update_status (ServerContext): registering Oso class
class = AffinityGroup
|
| 67 | 2026-03-09T10:56:04.495Z | INFO | test_update_status (ServerContext): registering Oso class
class = AntiAffinityGroup
|
| 68 | 2026-03-09T10:56:04.495Z | INFO | test_update_status (ServerContext): registering Oso class
class = Instance
|
| 69 | 2026-03-09T10:56:04.495Z | INFO | test_update_status (ServerContext): registering Oso class
class = IpPool
|
| 70 | 2026-03-09T10:56:04.495Z | INFO | test_update_status (ServerContext): registering Oso class
class = InstanceNetworkInterface
|
| 71 | 2026-03-09T10:56:04.495Z | INFO | test_update_status (ServerContext): registering Oso class
class = Vpc
|
| 72 | 2026-03-09T10:56:04.495Z | INFO | test_update_status (ServerContext): registering Oso class
class = VpcRouter
|
| 73 | 2026-03-09T10:56:04.495Z | INFO | test_update_status (ServerContext): registering Oso class
class = InternetGateway
|
| 74 | 2026-03-09T10:56:04.495Z | INFO | test_update_status (ServerContext): registering Oso class
class = InternetGatewayIpPool
|
| 75 | 2026-03-09T10:56:04.495Z | INFO | test_update_status (ServerContext): registering Oso class
class = InternetGatewayIpAddress
|
| 76 | 2026-03-09T10:56:04.495Z | INFO | test_update_status (ServerContext): registering Oso class
class = RouterRoute
|
| 77 | 2026-03-09T10:56:04.495Z | INFO | test_update_status (ServerContext): registering Oso class
class = VpcSubnet
|
| 78 | 2026-03-09T10:56:04.495Z | INFO | test_update_status (ServerContext): registering Oso class
class = FloatingIp
|
| 79 | 2026-03-09T10:56:04.495Z | INFO | test_update_status (ServerContext): registering Oso class
class = ExternalSubnet
|
| 80 | 2026-03-09T10:56:04.495Z | INFO | test_update_status (ServerContext): registering Oso class
class = Image
|
| 81 | 2026-03-09T10:56:04.495Z | INFO | test_update_status (ServerContext): registering Oso class
class = SiloImage
|
| 82 | 2026-03-09T10:56:04.495Z | INFO | test_update_status (ServerContext): registering Oso class
class = AddressLot
|
| 83 | 2026-03-09T10:56:04.495Z | INFO | test_update_status (ServerContext): registering Oso class
class = Blueprint
|
| 84 | 2026-03-09T10:56:04.495Z | INFO | test_update_status (ServerContext): registering Oso class
class = LoopbackAddress
|
| 85 | 2026-03-09T10:56:04.495Z | INFO | test_update_status (ServerContext): registering Oso class
class = Certificate
|
| 86 | 2026-03-09T10:56:04.495Z | INFO | test_update_status (ServerContext): registering Oso class
class = ConsoleSession
|
| 87 | 2026-03-09T10:56:04.495Z | INFO | test_update_status (ServerContext): registering Oso class
class = DeviceAuthRequest
|
| 88 | 2026-03-09T10:56:04.495Z | INFO | test_update_status (ServerContext): registering Oso class
class = DeviceAccessToken
|
| 89 | 2026-03-09T10:56:04.495Z | INFO | test_update_status (ServerContext): registering Oso class
class = PhysicalDisk
|
| 90 | 2026-03-09T10:56:04.495Z | INFO | test_update_status (ServerContext): registering Oso class
class = Rack
|
| 91 | 2026-03-09T10:56:04.495Z | INFO | test_update_status (ServerContext): registering Oso class
class = SshKey
|
| 92 | 2026-03-09T10:56:04.495Z | INFO | test_update_status (ServerContext): registering Oso class
class = Silo
|
| 93 | 2026-03-09T10:56:04.495Z | INFO | test_update_status (ServerContext): registering Oso class
class = SiloUser
|
| 94 | 2026-03-09T10:56:04.495Z | INFO | test_update_status (ServerContext): registering Oso class
class = SiloGroup
|
| 95 | 2026-03-09T10:56:04.495Z | INFO | test_update_status (ServerContext): registering Oso class
class = SupportBundle
|
| 96 | 2026-03-09T10:56:04.495Z | INFO | test_update_status (ServerContext): registering Oso class
class = IdentityProvider
|
| 97 | 2026-03-09T10:56:04.495Z | INFO | test_update_status (ServerContext): registering Oso class
class = SamlIdentityProvider
|
| 98 | 2026-03-09T10:56:04.495Z | INFO | test_update_status (ServerContext): registering Oso class
class = Sled
|
| 99 | 2026-03-09T10:56:04.495Z | INFO | test_update_status (ServerContext): registering Oso class
class = SubnetPool
|
| 100 | 2026-03-09T10:56:04.495Z | INFO | test_update_status (ServerContext): registering Oso class
class = TufRepo
|
| 101 | 2026-03-09T10:56:04.495Z | INFO | test_update_status (ServerContext): registering Oso class
class = TufArtifact
|
| 102 | 2026-03-09T10:56:04.495Z | INFO | test_update_status (ServerContext): registering Oso class
class = TufTrustRoot
|
| 103 | 2026-03-09T10:56:04.495Z | INFO | test_update_status (ServerContext): registering Oso class
class = Alert
|
| 104 | 2026-03-09T10:56:04.495Z | INFO | test_update_status (ServerContext): registering Oso class
class = AlertReceiver
|
| 105 | 2026-03-09T10:56:04.495Z | INFO | test_update_status (ServerContext): registering Oso class
class = WebhookSecret
|
| 106 | 2026-03-09T10:56:04.495Z | INFO | test_update_status (ServerContext): registering Oso class
class = Zpool
|
| 107 | 2026-03-09T10:56:04.495Z | INFO | test_update_status (ServerContext): registering Oso class
class = Service
|
| 108 | 2026-03-09T10:56:04.495Z | INFO | test_update_status (ServerContext): registering Oso class
class = UserBuiltin
|
| 109 | 2026-03-09T10:56:04.495Z | INFO | test_update_status (ServerContext): registering Oso class
class = ScimClientBearerToken
|
| 110 | 2026-03-09T10:56:04.495Z | INFO | test_update_status (ServerContext): registering Oso class
class = MulticastGroup
|
| 111 | 2026-03-09T10:56:04.496Z | INFO | test_update_status (ServerContext): full Oso configuration
config = #\n# Oso configuration for Omicron\n# This file is augmented by generated snippets.\n#\n\n#\n# ACTOR TYPES AND BASIC RULES\n#\n\n# `AnyActor` includes both authenticated and unauthenticated users.\nactor AnyActor {}\n\n# An `AuthenticatedActor` has an identity in the system. All of our operations\n# today require that an actor be authenticated.\nactor AuthenticatedActor {}\n\n# For any resource, `actor` can perform action `action` on it if they're\n# authenticated and their role(s) give them the corresponding permission on that\n# resource.\nallow(actor: AnyActor, action: Action, resource) if\n actor.authenticated and\n has_permission(actor.authn_actor.unwrap(), action.to_perm(), resource);\n\n# Define role relationships\nhas_role(actor: AuthenticatedActor, role: String, resource: Resource)\n\tif resource.has_role(actor, role);\n\n#\n# ROLES AND PERMISSIONS IN THE FLEET/SILO/PROJECT HIERARCHY\n#\n# We define the following permissions for most resources in the system:\n#\n# - "create_child": required to create child resources (of any type)\n#\n# - "list_children": required to list child resources (of all types) of a\n# resource\n#\n# - "modify": required to modify or delete a resource\n#\n# - "read": required to read a resource\n#\n# We define the following predefined roles for only a few high-level resources:\n# the Fleet (see below), Silo, Organization, and Project. The specific roles\n# are oriented around intended use-cases:\n#\n# - "admin": has all permissions on the resource\n#\n# - "collaborator": has "read", "list_children", and "create_child", plus\n# the "admin" role for child resources. The idea is that if you're an\n# Organization Collaborator, you have full control over the Projects within\n# the Organization, but you cannot modify or delete the Organization itself.\n#\n# - "viewer": has "read" and "list_children" on a resource\n#\n# Below the Project level, permissions are granted via roles at the Project\n# level. For example, for someone to be able to create, modify, or delete any\n# Instances, they must be granted project.collaborator, which means they can\n# create, modify, or delete _all_ resources in the Project.\n#\n# The complete set of predefined roles:\n#\n# - fleet.admin (superuser for the whole system)\n# - fleet.collaborator (can manage Silos)\n# - fleet.viewer (can read most non-siloed resources in the system)\n# - silo.admin (superuser for the silo)\n# - silo.collaborator (can create and own Organizations; grants project.admin on all projects)\n# - silo.limited-collaborator (grants project.limited-collaborator on all projects)\n# - silo.viewer (can read most resources within the Silo; grants project.viewer)\n# - organization.admin (complete control over an organization)\n# - organization.collaborator (can manage Projects)\n# - organization.viewer (can read most resources within the Organization)\n# - project.admin (complete control over a Project)\n# - project.collaborator (can manage all resources within the Project, including networking)\n# - project.limited-collaborator (can manage compute resources, but not networking resources)\n# - project.viewer (can read most resources within the Project)\n#\n# Outside the Silo/Organization/Project hierarchy, we (currently) treat most\n# resources as nested under Fleet or else a synthetic resource (see below). We\n# do not yet support role assignments on anything other than Fleet, Silo,\n# Organization, or Project.\n#\n\n# "Fleet" is a global singleton representing the whole system. The name comes\n# from the idea described in RFD 24, but it's not quite right. This probably\n# should be more like "Region" or "AvailabilityZone". The precise boundaries\n# have not yet been figured out.\nresource Fleet {\n\tpermissions = [\n\t "list_children",\n\t "modify",\n\t "read",\n\t "create_child",\n\t];\n\n\troles = [\n\t # Roles that can be attached by users\n\t "admin",\n\t "collaborator",\n\t "viewer",\n\n\t # Internal-only roles\n\t "external-authenticator"\n\t];\n\n\t# Roles implied by other roles on this resource\n\t"viewer" if "collaborator";\n\t"collaborator" if "admin";\n\n\t# Permissions granted directly by roles on this resource\n\t"list_children" if "viewer";\n\t"read" if "viewer";\n\t"create_child" if "collaborator";\n\t"modify" if "admin";\n}\n\n# For fleets specifically, roles can be conferred by roles on the user's Silo.\n# Note that certain Actors may not ever have any roles assigned to them, like\n# SCIM Actors.\nhas_role(actor: AuthenticatedActor, role: String, _: Fleet) if\n\tsilo_role in actor.confers_fleet_role(role) and\n\thas_role(actor, silo_role, actor.silo.unwrap());\n\nresource Silo {\n\tpermissions = [\n\t "list_children",\n\t "modify",\n\t "read",\n\t "create_child",\n\t];\n\troles = [ "admin", "collaborator", "limited-collaborator", "viewer" ];\n\n\t# Roles implied by other roles on this resource\n\t"viewer" if "limited-collaborator";\n\t"limited-collaborator" if "collaborator";\n\t"collaborator" if "admin";\n\n\t# Permissions granted directly by roles on this resource\n\t"list_children" if "viewer";\n\t"read" if "viewer";\n\n\t"create_child" if "collaborator";\n\t"modify" if "admin";\n\n\t# Permissions implied by roles on this resource's parent (Fleet). Fleet\n\t# privileges allow a user to see and potentially administer the Silo,\n\t# but they do not give anyone permission to look at anything inside the\n\t# Silo. To achieve this, we use permission rules here. (If we granted\n\t# Fleet administrators _roles_ on the Silo, then those would cascade\n\t# into the Silo as well.)\n\trelations = { parent_fleet: Fleet };\n\t"read" if "viewer" on "parent_fleet";\n\t"modify" if "collaborator" on "parent_fleet";\n\n\t# external authenticator has to create silo users\n\t"list_children" if "external-authenticator" on "parent_fleet";\n\t"create_child" if "external-authenticator" on "parent_fleet";\n}\n\nhas_relation(fleet: Fleet, "parent_fleet", silo: Silo)\n\tif silo.fleet = fleet;\n\n# As a special case, all authenticated users can read their own Silo. That's\n# not quite the same as having the "viewer" role. For example, they cannot list\n# Organizations in the Silo.\n#\n# One reason this is necessary is because if an unprivileged user tries to\n# create an Organization using "POST /organizations", they should get back a 403\n# (which implies they're able to see /organizations, which is essentially seeing\n# the Silo itself) rather than a 404. This behavior isn't a hard constraint\n# (i.e., you could reasonably get a 404 for an API you're not allowed to call).\n# Nor is the implementation (i.e., we could special-case this endpoint somehow).\n# But granting this permission is the simplest way to keep this endpoint's\n# behavior consistent with the rest of the API.\n#\n# This rule is also used to determine if a user can list the identity providers\n# in the Silo (which they should be able to), since that's predicated on being\n# able to read the Silo.\n#\n# It's unclear what else would break if users couldn't see their own Silo.\nhas_permission(actor: AuthenticatedActor, "read", silo: Silo)\n\tif actor.is_user and silo in actor.silo;\n\nresource Project {\n\tpermissions = [\n\t "list_children",\n\t "modify",\n\t "read",\n\t "create_child",\n\t];\n\troles = [ "admin", "collaborator", "limited-collaborator", "viewer" ];\n\n\t# Roles implied by other roles on this resource\n\t# Role hierarchy: admin > collaborator > limited-collaborator > viewer\n\t#\n\t# The "limited-collaborator" role can create/modify non-networking\n\t# resources (instances, disks, etc.) but cannot create/modify networking\n\t# infrastructure (VPCs, subnets, routers, internet gateways).\n\t# See nexus/authz-macros for InProjectLimited vs InProjectFull.\n\t"viewer" if "limited-collaborator";\n\t"limited-collaborator" if "collaborator";\n\t"collaborator" if "admin";\n\n\t# Permissions granted directly by roles on this resource\n\t"list_children" if "viewer";\n\t"read" if "viewer";\n\t"create_child" if "limited-collaborator";\n\t"modify" if "admin";\n\n\t# Roles implied by roles on this resource's parent (Silo)\n\trelations = { parent_silo: Silo };\n\t"admin" if "collaborator" on "parent_silo";\n\t"limited-collaborator" if "limited-collaborator" on "parent_silo";\n\t"viewer" if "viewer" on "parent_silo";\n}\nhas_relation(silo: Silo, "parent_silo", project: Project)\n\tif project.silo = silo;\n\n#\n# GENERAL RESOURCES OUTSIDE THE SILO/PROJECT HIERARCHY\n#\n# Many resources use snippets of Polar generated by the `authz_resource!` Rust\n# macro. Some resources require custom Polar code. Those appear here.\n#\n\nresource Certificate {\n\tpermissions = [ "read", "modify" ];\n\trelations = { parent_silo: Silo, parent_fleet: Fleet };\n\n\t# Fleet-level and silo-level roles both grant privileges on certificates.\n\t"read" if "admin" on "parent_silo";\n\t"modify" if "admin" on "parent_silo";\n\t"read" if "admin" on "parent_fleet";\n\t"modify" if "admin" on "parent_fleet";\n}\nhas_relation(silo: Silo, "parent_silo", certificate: Certificate)\n\tif certificate.silo = silo;\nhas_relation(fleet: Fleet, "parent_fleet", certificate: Certificate)\n\tif certificate.silo.fleet = fleet;\n\nresource SiloUser {\n\tpermissions = [\n\t "list_children",\n\t "modify",\n\t "read",\n\t "create_child",\n\t];\n\n\t# Fleet and Silo administrators can manage a Silo's users. This is one\n\t# of the only areas of Silo configuration that Fleet Administrators have\n\t# permissions on.\n\trelations = { parent_silo: Silo, parent_fleet: Fleet };\n\t"list_children" if "read" on "parent_silo";\n\t"read" if "read" on "parent_silo";\n\t"modify" if "admin" on "parent_silo";\n\t"create_child" if "admin" on "parent_silo";\n\t"list_children" if "read" on "parent_fleet";\n\t"read" if "read" on "parent_fleet";\n\t"modify" if "admin" on "parent_fleet";\n\t"create_child" if "admin" on "parent_fleet";\n}\nhas_relation(silo: Silo, "parent_silo", user: SiloUser)\n\tif user.silo = silo;\nhas_relation(fleet: Fleet, "parent_fleet", user: SiloUser)\n\tif user.silo.fleet = fleet;\n\n# authenticated actors have all permissions on themselves\nhas_permission(actor: AuthenticatedActor, _perm: String, silo_user: SiloUser)\n if actor.equals_silo_user(silo_user);\n\nhas_permission(actor: AuthenticatedActor, "read", silo_user: SiloUser)\n if actor.is_user and silo_user.silo in actor.silo;\n\nresource SiloGroup {\n\tpermissions = [\n\t "list_children",\n\t "modify",\n\t "read",\n\t "create_child",\n\t];\n\n\trelations = { parent_silo: Silo };\n\t"list_children" if "read" on "parent_silo";\n\t"read" if "read" on "parent_silo";\n\t"modify" if "admin" on "parent_silo";\n\t"create_child" if "admin" on "parent_silo";\n}\nhas_relation(silo: Silo, "parent_silo", group: SiloGroup)\n\tif group.silo = silo;\n\nresource SshKey {\n\tpermissions = [ "read", "modify" ];\n\trelations = { silo_user: SiloUser };\n\n\t"read" if "read" on "silo_user";\n}\n# We want to allow the user to modify the ssh key but disallow a SCIM IdP token\n# from doing the same.\nhas_permission(actor: AuthenticatedActor, "modify", ssh_key: SshKey)\n\tif actor.is_user and has_permission(actor, "modify", ssh_key.silo_user);\nhas_relation(user: SiloUser, "silo_user", ssh_key: SshKey)\n\tif ssh_key.silo_user = user;\n\nresource IdentityProvider {\n\tpermissions = [\n\t "read",\n\t "modify",\n\t "create_child",\n\t "list_children",\n\t];\n\trelations = { parent_silo: Silo, parent_fleet: Fleet };\n\n\t# Silo-level roles grant privileges on identity providers.\n\t"read" if "viewer" on "parent_silo";\n\t"list_children" if "viewer" on "parent_silo";\n\t"modify" if "admin" on "parent_silo";\n\t"create_child" if "admin" on "parent_silo";\n\n\t# Fleet-level roles also grant privileges on identity providers.\n\t"read" if "viewer" on "parent_fleet";\n\t"list_children" if "viewer" on "parent_fleet";\n\t"modify" if "admin" on "parent_fleet";\n\t"create_child" if "admin" on "parent_fleet";\n}\nhas_relation(silo: Silo, "parent_silo", identity_provider: IdentityProvider)\n\tif identity_provider.silo = silo;\nhas_relation(fleet: Fleet, "parent_fleet", collection: IdentityProvider)\n\tif collection.silo.fleet = fleet;\n\nresource SamlIdentityProvider {\n\tpermissions = [\n\t "read",\n\t "modify",\n\t "create_child",\n\t "list_children",\n\t];\n\trelations = { parent_silo: Silo, parent_fleet: Fleet };\n\n\t# Silo-level roles grant privileges on identity providers.\n\t"read" if "viewer" on "parent_silo";\n\t"list_children" if "viewer" on "parent_silo";\n\t"modify" if "admin" on "parent_silo";\n\t"create_child" if "admin" on "parent_silo";\n\n\t# Fleet-level roles also grant privileges on identity providers.\n\t"read" if "viewer" on "parent_fleet";\n\t"list_children" if "viewer" on "parent_fleet";\n\t"modify" if "admin" on "parent_fleet";\n\t"create_child" if "admin" on "parent_fleet";\n}\nhas_relation(silo: Silo, "parent_silo", saml_identity_provider: SamlIdentityProvider)\n\tif saml_identity_provider.silo = silo;\nhas_relation(fleet: Fleet, "parent_fleet", collection: SamlIdentityProvider)\n\tif collection.silo.fleet = fleet;\n\nresource ScimClientBearerToken {\n\tpermissions = [ "read", "modify" ];\n\trelations = { parent_silo: Silo, parent_fleet: Fleet };\n\n # necessary to authenticate SCIM actors\n\t"read" if "external-authenticator" on "parent_fleet";\n\n\t# Silo-level roles grant privileges for SCIM client tokens.\n\t"read" if "admin" on "parent_silo";\n\t"modify" if "admin" on "parent_silo";\n\n\t# Fleet-level roles also grant privileges for SCIM client tokens.\n\t"read" if "admin" on "parent_fleet";\n\t"modify" if "admin" on "parent_fleet";\n}\nhas_relation(silo: Silo, "parent_silo", scim_client_bearer_token: ScimClientBearerToken)\n\tif scim_client_bearer_token.silo = silo;\nhas_relation(fleet: Fleet, "parent_fleet", collection: ScimClientBearerToken)\n\tif collection.silo.fleet = fleet;\n\n\n#\n# SYNTHETIC RESOURCES OUTSIDE THE SILO HIERARCHY\n#\n# The resources here do not correspond to anything that appears explicitly in\n# the API or is stored in the database. These are used either at the top level\n# of the API path (e.g., "/v1/system/ip-pools") or as an implementation detail of the system\n# (in the case of console sessions and "Database"). The policies are\n# either statically-defined in this file or driven by role assignments on the\n# Fleet. None of these resources defines their own roles.\n#\n\n# Describes the quiesce state of a particular Nexus instance.\n#\n# These authz checks must not require the database. We grant this directly to\n# callers of the internal API.\nresource QuiesceState {\n\tpermissions = [ "read", "modify" ];\n}\nhas_permission(USER_INTERNAL_API: AuthenticatedActor, "read", _q: QuiesceState);\nhas_permission(\n USER_INTERNAL_API: AuthenticatedActor,\n "modify",\n _q: QuiesceState\n);\n\n# Describes the policy for reading and modifying DNS configuration\n# (both internal and external)\nresource DnsConfig {\n\tpermissions = [ "read", "modify" ];\n\trelations = { parent_fleet: Fleet };\n\t# "external-authenticator" requires these permissions because that's the\n\t# context that Nexus uses when creating and deleting Silos. These\n\t# operations necessarily need to read and modify DNS configuration.\n\t"read" if "external-authenticator" on "parent_fleet";\n\t"modify" if "external-authenticator" on "parent_fleet";\n\t# "admin" on the parent fleet also gets these permissions, primarily for\n\t# the test suite.\n\t"read" if "admin" on "parent_fleet";\n\t"modify" if "admin" on "parent_fleet";\n}\nhas_relation(fleet: Fleet, "parent_fleet", dns_config: DnsConfig)\n\tif dns_config.fleet = fleet;\n\n# Describes the policy for accessing blueprints\nresource BlueprintConfig {\n\tpermissions = [\n\t "list_children", # list blueprints\n\t "create_child", # create blueprint\n\t "read", # read the current target\n\t "modify", # change the current target\n\t];\n\n\trelations = { parent_fleet: Fleet };\n\t"create_child" if "admin" on "parent_fleet";\n\t"modify" if "admin" on "parent_fleet";\n\t"list_children" if "viewer" on "parent_fleet";\n\t"read" if "viewer" on "parent_fleet";\n}\nhas_relation(fleet: Fleet, "parent_fleet", list: BlueprintConfig)\n\tif list.fleet = fleet;\n\n# Describes the policy for accessing "/v1/system/update/trust-roots" in the API\nresource UpdateTrustRootList {\n\tpermissions = [ "list_children", "create_child" ];\n\trelations = { parent_fleet: Fleet };\n\t"list_children" if "viewer" on "parent_fleet";\n\t"create_child" if "admin" on "parent_fleet";\n}\nhas_relation(fleet: Fleet, "parent_fleet", collection: UpdateTrustRootList)\n\tif collection.fleet = fleet;\n\n# Describes the policy for accessing blueprints\nresource TargetReleaseConfig {\n\tpermissions = [\n\t "read", # read the current target release\n\t "modify", # change the current target release\n\t];\n\n\trelations = { parent_fleet: Fleet };\n\t"read" if "viewer" on "parent_fleet";\n\t"modify" if "admin" on "parent_fleet";\n}\nhas_relation(fleet: Fleet, "parent_fleet", resource: TargetReleaseConfig)\n\tif resource.fleet = fleet;\n\n# Describes the policy for reading and modifying low-level inventory\nresource Inventory {\n\tpermissions = [ "read", "modify" ];\n\trelations = { parent_fleet: Fleet };\n\t"read" if "viewer" on "parent_fleet";\n\t"modify" if "admin" on "parent_fleet";\n}\nhas_relation(fleet: Fleet, "parent_fleet", inventory: Inventory)\n\tif inventory.fleet = fleet;\n\n# Describes the policy for accessing "/v1/system/ip-pools" in the API\nresource IpPoolList {\n\tpermissions = [\n\t "list_children",\n\t "modify",\n\t "create_child",\n\t];\n\n\t# Fleet Administrators can create or modify the IP Pools list.\n\trelations = { parent_fleet: Fleet };\n\t"modify" if "admin" on "parent_fleet";\n\t"create_child" if "admin" on "parent_fleet";\n\n\t# Fleet Viewers can list IP Pools\n\t"list_children" if "viewer" on "parent_fleet";\n}\nhas_relation(fleet: Fleet, "parent_fleet", ip_pool_list: IpPoolList)\n\tif ip_pool_list.fleet = fleet;\n\n# Any authenticated user can create a child of a provided IP Pool.\n# This is necessary to use the pools when provisioning instances.\nhas_permission(actor: AuthenticatedActor, "create_child", ip_pool: IpPool)\n\tif actor.is_user and silo in actor.silo and silo.fleet = ip_pool.fleet;\n\n# Describes the policy for accessing "/v1/multicast-groups" in the API\n# Groups are created when the first instance joins and deleted when the last leaves.\nresource MulticastGroupList {\n\tpermissions = [ "list_children" ];\n\n\trelations = { parent_fleet: Fleet };\n\n\t# Fleet Viewers can list multicast groups\n\t"list_children" if "viewer" on "parent_fleet";\n}\nhas_relation(fleet: Fleet, "parent_fleet", multicast_group_list: MulticastGroupList)\n\tif multicast_group_list.fleet = fleet;\n\n# Any authenticated user can list multicast groups in their fleet.\n# This enables silo users to discover groups for attaching instances,\n# without requiring the Fleet::Viewer role.\nhas_permission(actor: AuthenticatedActor, "list_children", multicast_group_list: MulticastGroupList)\n\tif actor.is_user and silo in actor.silo and silo.fleet = multicast_group_list.fleet;\n\n# MulticastGroup is a fleet-level discovery resource.\n# Join/leave authorization is gated by Instance::Modify, not the group itself.\nresource MulticastGroup {\n\tpermissions = [ "read", "list_children" ];\n\trelations = { parent_fleet: Fleet };\n}\nhas_relation(fleet: Fleet, "parent_fleet", multicast_group: MulticastGroup)\n\tif multicast_group.fleet = fleet;\n\n# Any authenticated user can read multicast groups in their fleet\nhas_permission(actor: AuthenticatedActor, "read", multicast_group: MulticastGroup)\n\tif actor.is_user and silo in actor.silo and silo.fleet = multicast_group.fleet;\n\n# Any authenticated user can list members of multicast groups in their fleet\nhas_permission(actor: AuthenticatedActor, "list_children", multicast_group: MulticastGroup)\n\tif actor.is_user and silo in actor.silo and silo.fleet = multicast_group.fleet;\n\n# Describes the policy for reading and writing the audit log\nresource AuditLog {\n\tpermissions = [\n\t "list_children", # retrieve audit log\n\t "create_child", # create audit log entry\n\t];\n\n\trelations = { parent_fleet: Fleet };\n\n\t# Fleet viewers can read the audit log\n\t"list_children" if "viewer" on "parent_fleet";\n}\n\n# Any actor should be able to write to the audit log because we need to be able\n# to write to the log from any request, authenticated or not. Audit log writes\n# are always a byproduct of other operations: there are no endpoints that allow\n# the user to write to the log deliberately. Note we use AuthenticatedActor\n# because we don't really mean unauthenticated -- in the case of login\n# operations, we use the external authenticator actor that creates the session\n# to authorize the audit log write.\nhas_permission(_actor: AuthenticatedActor, "create_child", _audit_log: AuditLog);\n\nhas_relation(fleet: Fleet, "parent_fleet", audit_log: AuditLog)\n\tif audit_log.fleet = fleet;\n\n# Describes the policy for creating and managing web console sessions.\nresource ConsoleSessionList {\n\tpermissions = [ "create_child" ];\n\trelations = { parent_fleet: Fleet };\n\t"create_child" if "external-authenticator" on "parent_fleet";\n}\nhas_relation(fleet: Fleet, "parent_fleet", collection: ConsoleSessionList)\n\tif collection.fleet = fleet;\n\n# Allow silo admins to delete and list user sessions\nresource SiloUserSessionList {\n permissions = [ "modify", "list_children" ];\n relations = { parent_silo: Silo };\n\n # A silo admin can modify (e.g., delete) a user's sessions.\n "modify" if "admin" on "parent_silo";\n\n # A silo admin can list a user's sessions.\n "list_children" if "admin" on "parent_silo";\n}\nhas_relation(silo: Silo, "parent_silo", authn_list: SiloUserSessionList)\n if authn_list.silo_user.silo = silo;\n\n# give users 'modify' and 'list_children' on their own sessions\nhas_permission(actor: AuthenticatedActor, "modify", authn_list: SiloUserSessionList)\n if actor.equals_silo_user(authn_list.silo_user);\nhas_permission(actor: AuthenticatedActor, "list_children", authn_list: SiloUserSessionList)\n if actor.equals_silo_user(authn_list.silo_user);\n\n# Allow silo admins to delete and list user access tokens\nresource SiloUserTokenList {\n permissions = [ "modify", "list_children" ];\n relations = { parent_silo: Silo };\n\n # A silo admin can modify (e.g., delete) a user's tokens.\n "modify" if "admin" on "parent_silo";\n\n # A silo admin can list a user's tokens.\n "list_children" if "admin" on "parent_silo";\n}\nhas_relation(silo: Silo, "parent_silo", authn_list: SiloUserTokenList)\n if authn_list.silo_user.silo = silo;\n\n# give users 'modify' and 'list_children' on their own tokens\nhas_permission(actor: AuthenticatedActor, "modify", authn_list: SiloUserTokenList)\n if actor.equals_silo_user(authn_list.silo_user);\nhas_permission(actor: AuthenticatedActor, "list_children", authn_list: SiloUserTokenList)\n if actor.equals_silo_user(authn_list.silo_user);\n\n# Describes the policy for creating and managing device authorization requests.\nresource DeviceAuthRequestList {\n\tpermissions = [ "create_child" ];\n\trelations = { parent_fleet: Fleet };\n\t"create_child" if "external-authenticator" on "parent_fleet";\n}\nhas_relation(fleet: Fleet, "parent_fleet", collection: DeviceAuthRequestList)\n\tif collection.fleet = fleet;\n\n# Describes the policy for creating and managing Silo certificates\nresource SiloCertificateList {\n\tpermissions = [ "list_children", "create_child" ];\n\n\trelations = { parent_silo: Silo, parent_fleet: Fleet };\n\n\t# Both Fleet and Silo administrators can see and modify the Silo's\n\t# certificates.\n\t"list_children" if "admin" on "parent_silo";\n\t"list_children" if "admin" on "parent_fleet";\n\t"create_child" if "admin" on "parent_silo";\n\t"create_child" if "admin" on "parent_fleet";\n}\nhas_relation(silo: Silo, "parent_silo", collection: SiloCertificateList)\n\tif collection.silo = silo;\nhas_relation(fleet: Fleet, "parent_fleet", collection: SiloCertificateList)\n\tif collection.silo.fleet = fleet;\n\n# Describes the policy for creating and managing Silo identity providers\nresource SiloIdentityProviderList {\n\tpermissions = [ "list_children", "create_child" ];\n\n\trelations = { parent_silo: Silo, parent_fleet: Fleet };\n\n\t# Everyone who can read the Silo (which includes all the users in the\n\t# Silo) can see the identity providers in it.\n\t"list_children" if "read" on "parent_silo";\n\n\t# Fleet and Silo administrators can manage the Silo's identity provider\n\t# configuration. This is one of the only areas of Silo configuration\n\t# that Fleet Administrators have permissions on. This is also one of\n\t# the only cases where we need to look two levels up the hierarchy to\n\t# see if somebody has the right permission. For most other things,\n\t# permissions cascade down the hierarchy so we only need to look at the\n\t# parent.\n\t"create_child" if "admin" on "parent_silo";\n\t"create_child" if "admin" on "parent_fleet";\n}\nhas_relation(silo: Silo, "parent_silo", collection: SiloIdentityProviderList)\n\tif collection.silo = silo;\nhas_relation(fleet: Fleet, "parent_fleet", collection: SiloIdentityProviderList)\n\tif collection.silo.fleet = fleet;\n\n# Describes the policy for creating and managing Silo users (mostly intended for\n# API-managed users)\nresource SiloUserList {\n\tpermissions = [ "list_children", "create_child" ];\n\n\trelations = { parent_silo: Silo, parent_fleet: Fleet };\n\n\t# Everyone who can read the Silo (which includes all the users in the\n\t# Silo) can see the users in it.\n\t"list_children" if "read" on "parent_silo";\n\n\t# Fleet and Silo administrators can manage the Silo's users. This is\n\t# one of the only areas of Silo configuration that Fleet Administrators\n\t# have permissions on. This is also one of the few cases (so far) where\n\t# we need to look two levels up the hierarchy to see if somebody has the\n\t# right permission. For most other things, permissions cascade down the\n\t# hierarchy so we only need to look at the parent.\n\t"create_child" if "admin" on "parent_silo";\n\t"list_children" if "admin" on "parent_fleet";\n\t"create_child" if "admin" on "parent_fleet";\n}\nhas_relation(silo: Silo, "parent_silo", collection: SiloUserList)\n\tif collection.silo = silo;\nhas_relation(fleet: Fleet, "parent_fleet", collection: SiloUserList)\n\tif collection.silo.fleet = fleet;\n\n# Grant SCIM IdP actors the permissions they need on users.\nhas_permission(actor: AuthenticatedActor, "read", silo_user: SiloUser)\n if actor.is_scim_idp and silo_user.silo in actor.silo;\nhas_permission(actor: AuthenticatedActor, "create_child", silo_user_list: SiloUserList)\n\tif actor.is_scim_idp and silo_user_list.silo in actor.silo;\nhas_permission(actor: AuthenticatedActor, "modify", silo_user: SiloUser)\n\tif actor.is_scim_idp and silo_user.silo in actor.silo;\nhas_permission(actor: AuthenticatedActor, "list_children", silo_user_list: SiloUserList)\n if actor.is_scim_idp and silo_user_list.silo in actor.silo;\n\n# Describes the policy for creating and managing Silo groups (mostly intended\n# for API-managed groups)\nresource SiloGroupList {\n\tpermissions = [ "list_children", "create_child" ];\n\n\trelations = { parent_silo: Silo, parent_fleet: Fleet };\n\n\t# Everyone who can read the Silo (which includes all the groups in the\n\t# Silo) can see the groups in it.\n\t"list_children" if "read" on "parent_silo";\n\n\t# Fleet and Silo administrators can manage the Silo's groups. This is\n\t# one of the only areas of Silo configuration that Fleet Administrators\n\t# have permissions on. This is also one of the few cases (so far) where\n\t# we need to look two levels up the hierarchy to see if somebody has the\n\t# right permission. For most other things, permissions cascade down the\n\t# hierarchy so we only need to look at the parent.\n\t"create_child" if "admin" on "parent_silo";\n\t"list_children" if "admin" on "parent_fleet";\n\t"create_child" if "admin" on "parent_fleet";\n}\nhas_relation(silo: Silo, "parent_silo", collection: SiloGroupList)\n\tif collection.silo = silo;\nhas_relation(fleet: Fleet, "parent_fleet", collection: SiloGroupList)\n\tif collection.silo.fleet = fleet;\n\n# Grant SCIM IdP actors the permissions they need on groups.\nhas_permission(actor: AuthenticatedActor, "read", silo_group: SiloGroup)\n if actor.is_scim_idp and silo_group.silo in actor.silo;\nhas_permission(actor: AuthenticatedActor, "create_child", silo_group_list: SiloGroupList)\n\tif actor.is_scim_idp and silo_group_list.silo in actor.silo;\nhas_permission(actor: AuthenticatedActor, "modify", silo_group: SiloGroup)\n\tif actor.is_scim_idp and silo_group.silo in actor.silo;\nhas_permission(actor: AuthenticatedActor, "list_children", silo_group_list: SiloGroupList)\n if actor.is_scim_idp and silo_group_list.silo in actor.silo;\n\n# These rules grants the external authenticator role the permissions it needs to\n# read silo users and modify their sessions. This is necessary for login to\n# work.\nhas_permission(actor: AuthenticatedActor, "read", silo: Silo)\n\tif has_role(actor, "external-authenticator", silo.fleet);\nhas_permission(actor: AuthenticatedActor, "read", user: SiloUser)\n\tif has_role(actor, "external-authenticator", user.silo.fleet);\nhas_permission(actor: AuthenticatedActor, "modify", user: SiloUser)\n\tif has_role(actor, "external-authenticator", user.silo.fleet);\nhas_permission(actor: AuthenticatedActor, "read", group: SiloGroup)\n\tif has_role(actor, "external-authenticator", group.silo.fleet);\nhas_permission(actor: AuthenticatedActor, "modify", group: SiloGroup)\n\tif has_role(actor, "external-authenticator", group.silo.fleet);\n\nhas_permission(actor: AuthenticatedActor, "read", session: ConsoleSession)\n\tif has_role(actor, "external-authenticator", session.fleet);\nhas_permission(actor: AuthenticatedActor, "modify", session: ConsoleSession)\n\tif has_role(actor, "external-authenticator", session.fleet);\n\n# All authenticated users can read and delete device authn requests because\n# by necessity these operations happen before we've figured out what user (or\n# even Silo) the device auth is associated with. Any user can claim a device\n# auth request with the right user code (that's how it works) -- it's the user\n# code and associated logic that prevents unauthorized access here.\nhas_permission(actor: AuthenticatedActor, "read", _device_auth: DeviceAuthRequest)\n if actor.is_user;\nhas_permission(actor: AuthenticatedActor, "modify", _device_auth: DeviceAuthRequest)\n if actor.is_user;\n\nhas_permission(actor: AuthenticatedActor, "read", device_token: DeviceAccessToken)\n\tif has_role(actor, "external-authenticator", device_token.fleet);\n\nhas_permission(actor: AuthenticatedActor, "read", identity_provider: IdentityProvider)\n\tif has_role(actor, "external-authenticator", identity_provider.silo.fleet);\n\nhas_permission(actor: AuthenticatedActor, "read", saml_identity_provider: SamlIdentityProvider)\n\tif has_role(actor, "external-authenticator", saml_identity_provider.silo.fleet);\n\n# Describes the policy for who can access the internal database.\nresource Database {\n\tpermissions = [\n\t # "query" is required to perform any query against the database,\n\t # whether a read or write query. This is checked when an operation\n\t # checks out a database connection from the connection pool.\n\t #\n\t # Any authenticated user gets this permission. There's generally\n\t # some other authz check involved in the database query. For\n\t # example, if you're querying the database to "read" a "Project", we\n\t # should also be checking that. So why do we do this at all? It's\n\t # a belt-and-suspenders measure so that if we somehow introduced an\n\t # unauthenticated code path that hits the database, it cannot be\n\t # used to DoS the database because we won't allow the operation to\n\t # make the query. (As long as the code path _is_ authenticated, we\n\t # can use throttling mechanisms to prevent DoS.)\n\t "query",\n\n\t # "modify" is required to populate database data that's delivered\n\t # with the system. It should also be required for schema changes,\n\t # when we support those. This is separate from "query" so that we\n\t # cannot accidentally invoke these code paths from API calls and\n\t # other general functions.\n\t "modify"\n\t];\n}\n\n# All authenticated users have the "query" permission on the database.\nhas_permission(_actor: AuthenticatedActor, "query", _resource: Database);\n\n# The "db-init" user is the only one with the "modify" permission.\nhas_permission(USER_DB_INIT: AuthenticatedActor, "modify", _resource: Database);\nhas_permission(USER_DB_INIT: AuthenticatedActor, "create_child", _resource: IpPoolList);\n# It also has "admin" on the internal silo to populate it with built-in resources.\n# TODO-completeness: actually limit to just internal silo and not all silos\nhas_role(USER_DB_INIT: AuthenticatedActor, "admin", _silo: Silo);\n\n# Allow the internal API admin permissions on all silos.\nhas_role(USER_INTERNAL_API: AuthenticatedActor, "admin", _silo: Silo);\n\nresource WebhookSecret {\n\tpermissions = [ "read", "modify" ];\n\trelations = { parent_alert_receiver: AlertReceiver };\n\n\t"read" if "read" on "parent_alert_receiver";\n\t"modify" if "modify" on "parent_alert_receiver";\n}\n\nhas_relation(rx: AlertReceiver, "parent_alert_receiver", secret: WebhookSecret)\n\tif secret.alert_receiver = rx;\n\nresource AlertClassList {\n\tpermissions = [ "list_children" ];\n\trelations = { parent_fleet: Fleet };\n\n\t"list_children" if "viewer" on "parent_fleet";\n}\n\nhas_relation(fleet: Fleet, "parent_fleet", collection: AlertClassList)\n\tif collection.fleet = fleet;\n\nresource ScimClientBearerTokenList {\n\tpermissions = [ "create_child", "list_children" ];\n\trelations = { parent_silo: Silo, parent_fleet: Fleet };\n\n\t# Silo-level roles grant privileges for SCIM client tokens.\n # These are all admin because being able to create these tokens would allow\n # a user to grant themselves admin by modifying group membership through SCIM calls\n\t"create_child" if "admin" on "parent_silo";\n\t"list_children" if "admin" on "parent_silo";\n\n # Fleet-level roles also grant privileges for SCIM client tokens, for\n # configuration before silo admins are present.\n\t"create_child" if "admin" on "parent_fleet";\n\t"list_children" if "admin" on "parent_fleet";\n}\nhas_relation(silo: Silo, "parent_silo", scim_client_bearer_token_list: ScimClientBearerTokenList)\n\tif scim_client_bearer_token_list.silo = silo;\nhas_relation(fleet: Fleet, "parent_fleet", collection: ScimClientBearerTokenList)\n\tif collection.silo.fleet = fleet;\n\n# VpcList is a synthetic resource for controlling VPC creation.\n# Unlike other project resources, VPC creation requires the full "collaborator"\n# role rather than "limited-collaborator", enforcing the networking restriction.\n# This allows organizations to restrict who can reconfigure the network topology\n# while still allowing users with limited-collaborator to work with compute\n# resources (instances, disks, etc.) within the existing network.\nresource VpcList {\n\tpermissions = [ "list_children", "create_child" ];\n\n\trelations = { containing_project: Project };\n\n\t"list_children" if "read" on "containing_project";\n\t"create_child" if "collaborator" on "containing_project";\n}\nhas_relation(project: Project, "containing_project", collection: VpcList)\n\tif collection.project = project;\n\n# Describes the policy for accessing "/v1/system/subnet-pools" in the API\nresource SubnetPoolList {\n\tpermissions = [\n\t "list_children",\n\t "modify",\n\t "create_child",\n\t];\n\n\t# Fleet Administrators can create or modify the Subnet Pools list.\n\trelations = { parent_fleet: Fleet };\n\t"modify" if "admin" on "parent_fleet";\n\t"create_child" if "admin" on "parent_fleet";\n\n\t# Fleet Viewers can list External Subnet Pools\n\t"list_children" if "viewer" on "parent_fleet";\n}\nhas_relation(fleet: Fleet, "parent_fleet", subnet_pool_list: SubnetPoolList)\n\tif subnet_pool_list.fleet = fleet;\n\n\n\n resource Disk {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = { containing_project: Project };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "limited-collaborator" on "containing_project";\n "create_child" if "limited-collaborator" on "containing_project";\n }\n\n has_relation(parent: Project, "containing_project", child: Disk)\n if child.project = parent;\n \n\n resource Snapshot {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = { containing_project: Project };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "limited-collaborator" on "containing_project";\n "create_child" if "limited-collaborator" on "containing_project";\n }\n\n has_relation(parent: Project, "containing_project", child: Snapshot)\n if child.project = parent;\n \n\n resource ProjectImage {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = { containing_project: Project };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "limited-collaborator" on "containing_project";\n "create_child" if "limited-collaborator" on "containing_project";\n }\n\n has_relation(parent: Project, "containing_project", child: ProjectImage)\n if child.project = parent;\n \n\n resource AffinityGroup {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = { containing_project: Project };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "limited-collaborator" on "containing_project";\n "create_child" if "limited-collaborator" on "containing_project";\n }\n\n has_relation(parent: Project, "containing_project", child: AffinityGroup)\n if child.project = parent;\n \n\n resource AntiAffinityGroup {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = { containing_project: Project };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "limited-collaborator" on "containing_project";\n "create_child" if "limited-collaborator" on "containing_project";\n }\n\n has_relation(parent: Project, "containing_project", child: AntiAffinityGroup)\n if child.project = parent;\n \n\n resource Instance {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = { containing_project: Project };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "limited-collaborator" on "containing_project";\n "create_child" if "limited-collaborator" on "containing_project";\n }\n\n has_relation(parent: Project, "containing_project", child: Instance)\n if child.project = parent;\n \n\n resource IpPool {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: IpPool)\n if child.fleet = fleet;\n \n\n resource InstanceNetworkInterface {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = {\n containing_project: Project,\n parent: Instance\n };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "limited-collaborator" on "containing_project";\n "create_child" if "limited-collaborator" on "containing_project";\n }\n\n has_relation(project: Project, "containing_project", child: InstanceNetworkInterface)\n if has_relation(project, "containing_project", child.instance);\n\n has_relation(parent: Instance, "parent", child: InstanceNetworkInterface)\n if child.instance = parent;\n \n\n resource Vpc {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = { containing_project: Project };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(parent: Project, "containing_project", child: Vpc)\n if child.project = parent;\n \n\n resource VpcRouter {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = {\n containing_project: Project,\n parent: Vpc\n };\n\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(project: Project, "containing_project", child: VpcRouter)\n if has_relation(project, "containing_project", child.vpc);\n\n has_relation(parent: Vpc, "parent", child: VpcRouter)\n if child.vpc = parent;\n \n\n resource InternetGateway {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = {\n containing_project: Project,\n parent: Vpc\n };\n\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(project: Project, "containing_project", child: InternetGateway)\n if has_relation(project, "containing_project", child.vpc);\n\n has_relation(parent: Vpc, "parent", child: InternetGateway)\n if child.vpc = parent;\n \n\n resource InternetGatewayIpPool {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = {\n containing_project: Project,\n parent: InternetGateway\n };\n\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(project: Project, "containing_project", child: InternetGatewayIpPool)\n if has_relation(project, "containing_project", child.internet_gateway);\n\n has_relation(parent: InternetGateway, "parent", child: InternetGatewayIpPool)\n if child.internet_gateway = parent;\n \n\n resource InternetGatewayIpAddress {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = {\n containing_project: Project,\n parent: InternetGateway\n };\n\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(project: Project, "containing_project", child: InternetGatewayIpAddress)\n if has_relation(project, "containing_project", child.internet_gateway);\n\n has_relation(parent: InternetGateway, "parent", child: InternetGatewayIpAddress)\n if child.internet_gateway = parent;\n \n\n resource RouterRoute {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = {\n containing_project: Project,\n parent: VpcRouter\n };\n\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(project: Project, "containing_project", child: RouterRoute)\n if has_relation(project, "containing_project", child.vpc_router);\n\n has_relation(parent: VpcRouter, "parent", child: RouterRoute)\n if child.vpc_router = parent;\n \n\n resource VpcSubnet {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = {\n containing_project: Project,\n parent: Vpc\n };\n\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(project: Project, "containing_project", child: VpcSubnet)\n if has_relation(project, "containing_project", child.vpc);\n\n has_relation(parent: Vpc, "parent", child: VpcSubnet)\n if child.vpc = parent;\n \n\n resource FloatingIp {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = { containing_project: Project };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "limited-collaborator" on "containing_project";\n "create_child" if "limited-collaborator" on "containing_project";\n }\n\n has_relation(parent: Project, "containing_project", child: FloatingIp)\n if child.project = parent;\n \n\n resource ExternalSubnet {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = { containing_project: Project };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "limited-collaborator" on "containing_project";\n "create_child" if "limited-collaborator" on "containing_project";\n }\n\n has_relation(parent: Project, "containing_project", child: ExternalSubnet)\n if child.project = parent;\n \n\n resource Image {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = { containing_silo: Silo };\n "list_children" if "viewer" on "containing_silo";\n "read" if "viewer" on "containing_silo";\n "modify" if "collaborator" on "containing_silo";\n "create_child" if "collaborator" on "containing_silo";\n }\n\n has_relation(parent: Silo, "containing_silo", child: Image)\n if child.silo = parent;\n \n\n resource SiloImage {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = { containing_silo: Silo };\n "list_children" if "viewer" on "containing_silo";\n "read" if "viewer" on "containing_silo";\n "modify" if "collaborator" on "containing_silo";\n "create_child" if "collaborator" on "containing_silo";\n }\n\n has_relation(parent: Silo, "containing_silo", child: SiloImage)\n if child.silo = parent;\n \n\n resource AddressLot {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: AddressLot)\n if child.fleet = fleet;\n \n\n resource Blueprint {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: Blueprint)\n if child.fleet = fleet;\n \n\n resource LoopbackAddress {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: LoopbackAddress)\n if child.fleet = fleet;\n \n\n\n resource ConsoleSession {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: ConsoleSession)\n if child.fleet = fleet;\n \n\n resource DeviceAuthRequest {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: DeviceAuthRequest)\n if child.fleet = fleet;\n \n\n resource DeviceAccessToken {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: DeviceAccessToken)\n if child.fleet = fleet;\n \n\n resource PhysicalDisk {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: PhysicalDisk)\n if child.fleet = fleet;\n \n\n resource Rack {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: Rack)\n if child.fleet = fleet;\n \n\n\n\n\n\n resource SupportBundle {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: SupportBundle)\n if child.fleet = fleet;\n \n\n\n\n resource Sled {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: Sled)\n if child.fleet = fleet;\n \n\n resource SubnetPool {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: SubnetPool)\n if child.fleet = fleet;\n \n\n resource TufRepo {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: TufRepo)\n if child.fleet = fleet;\n \n\n resource TufArtifact {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: TufArtifact)\n if child.fleet = fleet;\n \n\n resource TufTrustRoot {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: TufTrustRoot)\n if child.fleet = fleet;\n \n\n resource Alert {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: Alert)\n if child.fleet = fleet;\n \n\n resource AlertReceiver {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: AlertReceiver)\n if child.fleet = fleet;\n \n\n\n resource Zpool {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: Zpool)\n if child.fleet = fleet;\n \n\n resource Service {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: Service)\n if child.fleet = fleet;\n \n\n resource UserBuiltin {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: UserBuiltin)\n if child.fleet = fleet;\n \n\n
|
| 112 | 2026-03-09T10:56:04.519Z | INFO | test_update_status (ServerContext): Setting up resolver using DNS address: [::1]:43014
|
| 113 | 2026-03-09T10:56:04.520Z | INFO | test_update_status (DnsResolver): new DNS resolver
addresses = [[::1]:43014]
|
| 114 | 2026-03-09T10:56:04.527Z | INFO | test_update_status (ServerContext): Setting up qorb database pool from a single host
url = PostgresConfigWithUrl {\n url_raw: "postgresql://root@[::1]:38023/omicron?sslmode=disable",\n config: Config {\n user: Some(\n "root",\n ),\n password: None,\n dbname: Some(\n "omicron",\n ),\n options: None,\n application_name: None,\n ssl_mode: Disable,\n host: [\n Tcp(\n "::1",\n ),\n ],\n hostaddr: [],\n port: [\n 38023,\n ],\n connect_timeout: None,\n tcp_user_timeout: None,\n keepalives: true,\n keepalives_idle: 7200s,\n keepalives_interval: None,\n keepalives_retries: None,\n target_session_attrs: Any,\n channel_binding: Prefer,\n load_balance_hosts: Disable,\n },\n}
|
| 115 | 2026-03-09T10:56:04.530Z | DEBG | test_update_status (ServerContext): registered USDT probes
|
| 116 | 2026-03-09T10:56:06.377Z | INFO | test_update_status (datastore): Database schema version is up to date
desired_version = 236.0.0
found_version = 236.0.0
|
| 117 | 2026-03-09T10:56:06.389Z | WARN | test_update_status (datastore): No db_metadata_nexus records exist - skipping access check
explanation = This is expected during initial deployment or before migration
nexus_id = 913233fe-92a8-4635-9572-183f495429c4 (omicron_zone)
|
| 118 | 2026-03-09T10:56:06.389Z | INFO | test_update_status (nexus): Datastore is ready for usage
|
| 119 | 2026-03-09T10:56:06.390Z | INFO | test_update_status (SEC): SEC running
sec_id = 913233fe-92a8-4635-9572-183f495429c4
|
| 120 | 2026-03-09T10:56:06.550Z | DEBG | test_update_status (clickhouse-client): registered USDT probes
id = ffe5286d-1f8c-4c00-a4ed-6cda41e7dc38
|
| 121 | 2026-03-09T10:56:06.551Z | TRAC | test_update_status (DataLoader): authorize begin
action = Modify
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 122 | 2026-03-09T10:56:06.552Z | DEBG | test_update_status (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 123 | 2026-03-09T10:56:06.555Z | DEBG | test_update_status (DataLoader): authorize result
action = Modify
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 124 | 2026-03-09T10:56:06.555Z | DEBG | test_update_status (DataLoader): attempting to create built-in users
|
| 125 | 2026-03-09T10:56:06.558Z | TRAC | test_update_status (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 126 | 2026-03-09T10:56:06.558Z | DEBG | test_update_status (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 127 | 2026-03-09T10:56:06.558Z | DEBG | test_update_status (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 128 | 2026-03-09T10:56:06.607Z | INFO | test_update_status (MgsUpdateDriver): starting MgsUpdateDriver
|
| 129 | 2026-03-09T10:56:06.610Z | TRAC | test_update_status (dns): buffer
buffer = Length: 79 (0x4f) bytes\n0000: 98 cd 01 00 00 01 00 00 00 00 00 01 10 5f 63 72 ............._cr\n0010: 75 63 69 62 6c 65 2d 70 61 6e 74 72 79 04 5f 74 ucible-pantry._t\n0020: 63 70 0d 63 6f 6e 74 72 6f 6c 2d 70 6c 61 6e 65 cp.control-plane\n0030: 05 6f 78 69 64 65 08 69 6e 74 65 72 6e 61 6c 00 .oxide.internal.\n0040: 00 21 00 01 00 00 29 04 d0 00 00 00 00 00 00 .!....)........
kind = dns
peer_addr = [::1]:52410
req_id = bed90253-9917-4f6e-9de6-f427db0046b8
|
| 130 | 2026-03-09T10:56:06.611Z | DEBG | test_update_status (dns): message_request
kind = dns
mr = MessageRequest {\n header: Header {\n id: 39117,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n queries: Queries {\n queries: [\n LowerQuery {\n name: LowerName(\n Name("_crucible-pantry._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_crucible-pantry._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n ],\n original: [\n 16,\n 95,\n 99,\n 114,\n 117,\n 99,\n 105,\n 98,\n 108,\n 101,\n 45,\n 112,\n 97,\n 110,\n 116,\n 114,\n 121,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n flags: EdnsFlags {\n dnssec_ok: false,\n z: 0,\n },\n max_payload: 1232,\n options: OPT {\n options: [],\n },\n },\n ),\n}
peer_addr = [::1]:52410
req_id = bed90253-9917-4f6e-9de6-f427db0046b8
|
| 131 | 2026-03-09T10:56:06.629Z | DEBG | test_update_status (dropshot_internal): registered endpoint
local_addr = 127.0.0.1:38163
method = POST
path = /crucible/0/upstairs/{upstairs_id}/downstairs/{downstairs_id}/stop-request
versions = all
|
| 132 | 2026-03-09T10:56:06.629Z | DEBG | test_update_status (dropshot_internal): registered endpoint
local_addr = 127.0.0.1:38163
method = POST
path = /crucible/0/upstairs/{upstairs_id}/downstairs/{downstairs_id}/stopped
versions = all
|
| 133 | 2026-03-09T10:56:06.629Z | DEBG | test_update_status (dropshot_internal): registered endpoint
local_addr = 127.0.0.1:38163
method = POST
path = /crucible/0/upstairs/{upstairs_id}/repair/{repair_id}/progress
versions = all
|
| 134 | 2026-03-09T10:56:06.629Z | DEBG | test_update_status (dropshot_internal): registered endpoint
local_addr = 127.0.0.1:38163
method = POST
path = /crucible/0/upstairs/{upstairs_id}/repair-finish
versions = all
|
| 135 | 2026-03-09T10:56:06.629Z | DEBG | test_update_status (dropshot_internal): registered endpoint
local_addr = 127.0.0.1:38163
method = POST
path = /crucible/0/upstairs/{upstairs_id}/repair-start
versions = all
|
| 136 | 2026-03-09T10:56:06.629Z | DEBG | test_update_status (dropshot_internal): registered endpoint
local_addr = 127.0.0.1:38163
method = POST
path = /disk/{disk_id}/remove-read-only-parent
versions = all
|
| 137 | 2026-03-09T10:56:06.629Z | DEBG | test_update_status (dropshot_internal): registered endpoint
local_addr = 127.0.0.1:38163
method = PUT
path = /disks/{disk_id}
versions = all
|
| 138 | 2026-03-09T10:56:06.629Z | DEBG | test_update_status (dropshot_internal): registered endpoint
local_addr = 127.0.0.1:38163
method = POST
path = /metrics/collectors
versions = all
|
| 139 | 2026-03-09T10:56:06.629Z | DEBG | test_update_status (dropshot_internal): registered endpoint
local_addr = 127.0.0.1:38163
method = GET
path = /metrics/collectors/{collector_id}/producers
versions = all
|
| 140 | 2026-03-09T10:56:06.629Z | DEBG | test_update_status (dropshot_internal): registered endpoint
local_addr = 127.0.0.1:38163
method = POST
path = /metrics/producers
versions = all
|
| 141 | 2026-03-09T10:56:06.629Z | DEBG | test_update_status (dropshot_internal): registered endpoint
local_addr = 127.0.0.1:38163
method = GET
path = /nat/ipv4/changeset/{from_gen}
versions = all
|
| 142 | 2026-03-09T10:56:06.629Z | DEBG | test_update_status (dropshot_internal): registered endpoint
local_addr = 127.0.0.1:38163
method = GET
path = /probes/{sled}
versions = all
|
| 143 | 2026-03-09T10:56:06.629Z | DEBG | test_update_status (dropshot_internal): registered endpoint
local_addr = 127.0.0.1:38163
method = POST
path = /refresh-vpc-routes
versions = all
|
| 144 | 2026-03-09T10:56:06.629Z | DEBG | test_update_status (dropshot_internal): registered endpoint
local_addr = 127.0.0.1:38163
method = GET
path = /sled-agents/{sled_id}
versions = all
|
| 145 | 2026-03-09T10:56:06.629Z | DEBG | test_update_status (dropshot_internal): registered endpoint
local_addr = 127.0.0.1:38163
method = POST
path = /sled-agents/{sled_id}
versions = all
|
| 146 | 2026-03-09T10:56:06.629Z | DEBG | test_update_status (dropshot_internal): registered endpoint
local_addr = 127.0.0.1:38163
method = PUT
path = /switch/{switch_id}
versions = all
|
| 147 | 2026-03-09T10:56:06.629Z | DEBG | test_update_status (dropshot_internal): registered endpoint
local_addr = 127.0.0.1:38163
method = GET
path = /v1/ping
versions = all
|
| 148 | 2026-03-09T10:56:06.629Z | DEBG | test_update_status (dropshot_internal): registered endpoint
local_addr = 127.0.0.1:38163
method = PUT
path = /vmms/{propolis_id}
versions = all
|
| 149 | 2026-03-09T10:56:06.629Z | DEBG | test_update_status (dropshot_internal): registered endpoint
local_addr = 127.0.0.1:38163
method = POST
path = /volume/{volume_id}/remove-read-only-parent
versions = all
|
| 150 | 2026-03-09T10:56:06.629Z | INFO | test_update_status (dropshot_internal): listening
local_addr = 127.0.0.1:38163
|
| 151 | 2026-03-09T10:56:06.630Z | DEBG | test_update_status (dropshot_internal): successfully registered DTrace USDT probes
local_addr = 127.0.0.1:38163
|
| 152 | 2026-03-09T10:56:06.642Z | DEBG | test_update_status (dropshot_lockstep): registered endpoint
local_addr = 127.0.0.1:44075
method = GET
path = /bgtasks
versions = all
|
| 153 | 2026-03-09T10:56:06.642Z | DEBG | test_update_status (dropshot_lockstep): registered endpoint
local_addr = 127.0.0.1:44075
method = POST
path = /bgtasks/activate
versions = all
|
| 154 | 2026-03-09T10:56:06.642Z | DEBG | test_update_status (dropshot_lockstep): registered endpoint
local_addr = 127.0.0.1:44075
method = GET
path = /bgtasks/view/{bgtask_name}
versions = all
|
| 155 | 2026-03-09T10:56:06.642Z | DEBG | test_update_status (dropshot_lockstep): registered endpoint
local_addr = 127.0.0.1:44075
method = GET
path = /clickhouse/policy
versions = all
|
| 156 | 2026-03-09T10:56:06.642Z | DEBG | test_update_status (dropshot_lockstep): registered endpoint
local_addr = 127.0.0.1:44075
method = POST
path = /clickhouse/policy
versions = all
|
| 157 | 2026-03-09T10:56:06.642Z | DEBG | test_update_status (dropshot_lockstep): registered endpoint
local_addr = 127.0.0.1:44075
method = GET
path = /debug/fetch-omdb-binary
versions = all
|
| 158 | 2026-03-09T10:56:06.642Z | DEBG | test_update_status (dropshot_lockstep): registered endpoint
local_addr = 127.0.0.1:44075
method = POST
path = /demo-saga
versions = all
|
| 159 | 2026-03-09T10:56:06.642Z | DEBG | test_update_status (dropshot_lockstep): registered endpoint
local_addr = 127.0.0.1:44075
method = POST
path = /demo-saga/{demo_saga_id}/complete
versions = all
|
| 160 | 2026-03-09T10:56:06.642Z | DEBG | test_update_status (dropshot_lockstep): registered endpoint
local_addr = 127.0.0.1:44075
method = GET
path = /deployment/blueprints/all
versions = all
|
| 161 | 2026-03-09T10:56:06.642Z | DEBG | test_update_status (dropshot_lockstep): registered endpoint
local_addr = 127.0.0.1:44075
method = DELETE
path = /deployment/blueprints/all/{blueprint_id}
versions = all
|
| 162 | 2026-03-09T10:56:06.642Z | DEBG | test_update_status (dropshot_lockstep): registered endpoint
local_addr = 127.0.0.1:44075
method = GET
path = /deployment/blueprints/all/{blueprint_id}
versions = all
|
| 163 | 2026-03-09T10:56:06.642Z | DEBG | test_update_status (dropshot_lockstep): registered endpoint
local_addr = 127.0.0.1:44075
method = POST
path = /deployment/blueprints/import
versions = all
|
| 164 | 2026-03-09T10:56:06.642Z | DEBG | test_update_status (dropshot_lockstep): registered endpoint
local_addr = 127.0.0.1:44075
method = POST
path = /deployment/blueprints/regenerate
versions = all
|
| 165 | 2026-03-09T10:56:06.642Z | DEBG | test_update_status (dropshot_lockstep): registered endpoint
local_addr = 127.0.0.1:44075
method = GET
path = /deployment/blueprints/target
versions = all
|
| 166 | 2026-03-09T10:56:06.642Z | DEBG | test_update_status (dropshot_lockstep): registered endpoint
local_addr = 127.0.0.1:44075
method = POST
path = /deployment/blueprints/target
versions = all
|
| 167 | 2026-03-09T10:56:06.642Z | DEBG | test_update_status (dropshot_lockstep): registered endpoint
local_addr = 127.0.0.1:44075
method = PUT
path = /deployment/blueprints/target/enabled
versions = all
|
| 168 | 2026-03-09T10:56:06.642Z | DEBG | test_update_status (dropshot_lockstep): registered endpoint
local_addr = 127.0.0.1:44075
method = GET
path = /deployment/reconfigurator-config
versions = all
|
| 169 | 2026-03-09T10:56:06.642Z | DEBG | test_update_status (dropshot_lockstep): registered endpoint
local_addr = 127.0.0.1:44075
method = POST
path = /deployment/reconfigurator-config
versions = all
|
| 170 | 2026-03-09T10:56:06.642Z | DEBG | test_update_status (dropshot_lockstep): registered endpoint
local_addr = 127.0.0.1:44075
method = GET
path = /deployment/reconfigurator-config/{version}
versions = all
|
| 171 | 2026-03-09T10:56:06.642Z | DEBG | test_update_status (dropshot_lockstep): registered endpoint
local_addr = 127.0.0.1:44075
method = GET
path = /deployment/update-status
versions = all
|
| 172 | 2026-03-09T10:56:06.642Z | DEBG | test_update_status (dropshot_lockstep): registered endpoint
local_addr = 127.0.0.1:44075
method = GET
path = /experimental/v1/system/support-bundles
versions = all
|
| 173 | 2026-03-09T10:56:06.642Z | DEBG | test_update_status (dropshot_lockstep): registered endpoint
local_addr = 127.0.0.1:44075
method = POST
path = /experimental/v1/system/support-bundles
versions = all
|
| 174 | 2026-03-09T10:56:06.642Z | DEBG | test_update_status (dropshot_lockstep): registered endpoint
local_addr = 127.0.0.1:44075
method = DELETE
path = /experimental/v1/system/support-bundles/{bundle_id}
versions = all
|
| 175 | 2026-03-09T10:56:06.642Z | DEBG | test_update_status (dropshot_lockstep): registered endpoint
local_addr = 127.0.0.1:44075
method = GET
path = /experimental/v1/system/support-bundles/{bundle_id}
versions = all
|
| 176 | 2026-03-09T10:56:06.642Z | DEBG | test_update_status (dropshot_lockstep): registered endpoint
local_addr = 127.0.0.1:44075
method = PUT
path = /experimental/v1/system/support-bundles/{bundle_id}
versions = all
|
| 177 | 2026-03-09T10:56:06.642Z | DEBG | test_update_status (dropshot_lockstep): registered endpoint
local_addr = 127.0.0.1:44075
method = GET
path = /experimental/v1/system/support-bundles/{bundle_id}/download
versions = all
|
| 178 | 2026-03-09T10:56:06.642Z | DEBG | test_update_status (dropshot_lockstep): registered endpoint
local_addr = 127.0.0.1:44075
method = HEAD
path = /experimental/v1/system/support-bundles/{bundle_id}/download
versions = all
|
| 179 | 2026-03-09T10:56:06.642Z | DEBG | test_update_status (dropshot_lockstep): registered endpoint
local_addr = 127.0.0.1:44075
method = GET
path = /experimental/v1/system/support-bundles/{bundle_id}/download/{file}
versions = all
|
| 180 | 2026-03-09T10:56:06.642Z | DEBG | test_update_status (dropshot_lockstep): registered endpoint
local_addr = 127.0.0.1:44075
method = HEAD
path = /experimental/v1/system/support-bundles/{bundle_id}/download/{file}
versions = all
|
| 181 | 2026-03-09T10:56:06.642Z | DEBG | test_update_status (dropshot_lockstep): registered endpoint
local_addr = 127.0.0.1:44075
method = GET
path = /experimental/v1/system/support-bundles/{bundle_id}/index
versions = all
|
| 182 | 2026-03-09T10:56:06.642Z | DEBG | test_update_status (dropshot_lockstep): registered endpoint
local_addr = 127.0.0.1:44075
method = POST
path = /instances/{instance_id}/migrate
versions = all
|
| 183 | 2026-03-09T10:56:06.642Z | DEBG | test_update_status (dropshot_lockstep): registered endpoint
local_addr = 127.0.0.1:44075
method = GET
path = /mgs-updates
versions = all
|
| 184 | 2026-03-09T10:56:06.642Z | DEBG | test_update_status (dropshot_lockstep): registered endpoint
local_addr = 127.0.0.1:44075
method = GET
path = /oximeter/read-policy
versions = all
|
| 185 | 2026-03-09T10:56:06.642Z | DEBG | test_update_status (dropshot_lockstep): registered endpoint
local_addr = 127.0.0.1:44075
method = POST
path = /oximeter/read-policy
versions = all
|
| 186 | 2026-03-09T10:56:06.642Z | DEBG | test_update_status (dropshot_lockstep): registered endpoint
local_addr = 127.0.0.1:44075
method = POST
path = /physical-disk/expunge
versions = all
|
| 187 | 2026-03-09T10:56:06.642Z | DEBG | test_update_status (dropshot_lockstep): registered endpoint
local_addr = 127.0.0.1:44075
method = GET
path = /quiesce
versions = all
|
| 188 | 2026-03-09T10:56:06.642Z | DEBG | test_update_status (dropshot_lockstep): registered endpoint
local_addr = 127.0.0.1:44075
method = POST
path = /quiesce
versions = all
|
| 189 | 2026-03-09T10:56:06.642Z | DEBG | test_update_status (dropshot_lockstep): registered endpoint
local_addr = 127.0.0.1:44075
method = PUT
path = /racks/{rack_id}/initialization-complete
versions = all
|
| 190 | 2026-03-09T10:56:06.643Z | DEBG | test_update_status (dropshot_lockstep): registered endpoint
local_addr = 127.0.0.1:44075
method = GET
path = /sagas
versions = all
|
| 191 | 2026-03-09T10:56:06.643Z | DEBG | test_update_status (dropshot_lockstep): registered endpoint
local_addr = 127.0.0.1:44075
method = GET
path = /sagas/{saga_id}
versions = all
|
| 192 | 2026-03-09T10:56:06.643Z | DEBG | test_update_status (dropshot_lockstep): registered endpoint
local_addr = 127.0.0.1:44075
method = POST
path = /sleds/expunge
versions = all
|
| 193 | 2026-03-09T10:56:06.643Z | DEBG | test_update_status (dropshot_lockstep): registered endpoint
local_addr = 127.0.0.1:44075
method = GET
path = /sleds/uninitialized
versions = all
|
| 194 | 2026-03-09T10:56:06.643Z | DEBG | test_update_status (dropshot_lockstep): registered endpoint
local_addr = 127.0.0.1:44075
method = GET
path = /trust-quorum/config/{rack_id}
versions = all
|
| 195 | 2026-03-09T10:56:06.643Z | DEBG | test_update_status (dropshot_lockstep): registered endpoint
local_addr = 127.0.0.1:44075
method = POST
path = /trust-quorum/lrtq-upgrade
versions = all
|
| 196 | 2026-03-09T10:56:06.643Z | DEBG | test_update_status (dropshot_lockstep): registered endpoint
local_addr = 127.0.0.1:44075
method = POST
path = /trust-quorum/remove/{sled}
versions = all
|
| 197 | 2026-03-09T10:56:06.643Z | DEBG | test_update_status (dropshot_lockstep): registered endpoint
local_addr = 127.0.0.1:44075
method = GET
path = /v1/ping
versions = all
|
| 198 | 2026-03-09T10:56:06.643Z | INFO | test_update_status (dropshot_lockstep): listening
local_addr = 127.0.0.1:44075
|
| 199 | 2026-03-09T10:56:06.643Z | DEBG | test_update_status (dropshot_lockstep): successfully registered DTrace USDT probes
local_addr = 127.0.0.1:44075
|
| 200 | 2026-03-09T10:56:06.829Z | ERRO | test_update_status (dns): failed to handle incoming DNS message: MessageRequest {
header: Header {
id: 39117,
message_type: Query,
op_code: Query,
authoritative: false,
truncation: false,
recursion_desired: true,
recursion_available: false,
authentic_data: false,
checking_disabled: false,
response_code: NoError,
query_count: 1,
answer_count: 0,
name_server_count: 0,
additional_count: 1,
},
queries: Queries {
queries: [
LowerQuery {
name: LowerName(
Name("_crucible-pantry._tcp.control-plane.oxide.internal."),
),
original: Query {
name: Name("_crucible-pantry._tcp.control-plane.oxide.internal."),
query_type: SRV,
query_class: IN,
},
},
],
original: [
16,
95,
99,
114,
117,
99,
105,
98,
108,
101,
45,
112,
97,
110,
116,
114,
121,
4,
95,
116,
99,
112,
13,
99,
111,
110,
116,
114,
111,
108,
45,
112,
108,
97,
110,
101,
5,
111,
120,
105,
100,
101,
8,
105,
110,
116,
101,
114,
110,
97,
108,
0,
0,
33,
0,
1,
],
},
answers: [],
name_servers: [],
additionals: [],
sig0: [],
edns: Some(
Edns {
rcode_high: 0,
version: 0,
flags: EdnsFlags {
dnssec_ok: false,
z: 0,
},
max_payload: 1232,
options: OPT {
options: [],
},
},
),
} SERVFAIL: server is not authoritative for name: "_crucible-pantry._tcp.control-plane.oxide.internal."
kind = dns
peer_addr = [::1]:52410
req_id = bed90253-9917-4f6e-9de6-f427db0046b8
|
| 201 | 2026-03-09T10:56:06.829Z | TRAC | test_update_status (dns): buffer
buffer = Length: 74 (0x4a) bytes\n0000: c3 23 01 00 00 01 00 00 00 00 00 01 0b 5f 72 65 .#..........._re\n0010: 70 6f 2d 64 65 70 6f 74 04 5f 74 63 70 0d 63 6f po-depot._tcp.co\n0020: 6e 74 72 6f 6c 2d 70 6c 61 6e 65 05 6f 78 69 64 ntrol-plane.oxid\n0030: 65 08 69 6e 74 65 72 6e 61 6c 00 00 21 00 01 00 e.internal..!...\n0040: 00 29 04 d0 00 00 00 00 00 00 .)........
kind = dns
peer_addr = [::1]:59849
req_id = a0b94e69-9d40-44f1-a0bd-ca81433076bf
|
| 202 | 2026-03-09T10:56:06.830Z | DEBG | test_update_status (dns): message_request
kind = dns
mr = MessageRequest {\n header: Header {\n id: 49955,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n queries: Queries {\n queries: [\n LowerQuery {\n name: LowerName(\n Name("_repo-depot._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_repo-depot._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n ],\n original: [\n 11,\n 95,\n 114,\n 101,\n 112,\n 111,\n 45,\n 100,\n 101,\n 112,\n 111,\n 116,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n flags: EdnsFlags {\n dnssec_ok: false,\n z: 0,\n },\n max_payload: 1232,\n options: OPT {\n options: [],\n },\n },\n ),\n}
peer_addr = [::1]:59849
req_id = a0b94e69-9d40-44f1-a0bd-ca81433076bf
|
| 203 | 2026-03-09T10:56:06.830Z | ERRO | test_update_status (dns): failed to handle incoming DNS message: MessageRequest {
header: Header {
id: 49955,
message_type: Query,
op_code: Query,
authoritative: false,
truncation: false,
recursion_desired: true,
recursion_available: false,
authentic_data: false,
checking_disabled: false,
response_code: NoError,
query_count: 1,
answer_count: 0,
name_server_count: 0,
additional_count: 1,
},
queries: Queries {
queries: [
LowerQuery {
name: LowerName(
Name("_repo-depot._tcp.control-plane.oxide.internal."),
),
original: Query {
name: Name("_repo-depot._tcp.control-plane.oxide.internal."),
query_type: SRV,
query_class: IN,
},
},
],
original: [
11,
95,
114,
101,
112,
111,
45,
100,
101,
112,
111,
116,
4,
95,
116,
99,
112,
13,
99,
111,
110,
116,
114,
111,
108,
45,
112,
108,
97,
110,
101,
5,
111,
120,
105,
100,
101,
8,
105,
110,
116,
101,
114,
110,
97,
108,
0,
0,
33,
0,
1,
],
},
answers: [],
name_servers: [],
additionals: [],
sig0: [],
edns: Some(
Edns {
rcode_high: 0,
version: 0,
flags: EdnsFlags {
dnssec_ok: false,
z: 0,
},
max_payload: 1232,
options: OPT {
options: [],
},
},
),
} SERVFAIL: server is not authoritative for name: "_repo-depot._tcp.control-plane.oxide.internal."
kind = dns
peer_addr = [::1]:59849
req_id = a0b94e69-9d40-44f1-a0bd-ca81433076bf
|
| 204 | 2026-03-09T10:56:06.830Z | TRAC | test_update_status (dns): buffer
buffer = Length: 67 (0x43) bytes\n0000: a2 5b 01 00 00 01 00 00 00 00 00 01 04 5f 6d 67 .[..........._mg\n0010: 73 04 5f 74 63 70 0d 63 6f 6e 74 72 6f 6c 2d 70 s._tcp.control-p\n0020: 6c 61 6e 65 05 6f 78 69 64 65 08 69 6e 74 65 72 lane.oxide.inter\n0030: 6e 61 6c 00 00 21 00 01 00 00 29 04 d0 00 00 00 nal..!....).....\n0040: 00 00 00 ...
kind = dns
peer_addr = [::1]:51895
req_id = 52acca88-761a-44e3-8834-db836d6dd432
|
| 205 | 2026-03-09T10:56:06.830Z | DEBG | test_update_status (dns): message_request
kind = dns
mr = MessageRequest {\n header: Header {\n id: 41563,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n queries: Queries {\n queries: [\n LowerQuery {\n name: LowerName(\n Name("_mgs._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_mgs._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n ],\n original: [\n 4,\n 95,\n 109,\n 103,\n 115,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n flags: EdnsFlags {\n dnssec_ok: false,\n z: 0,\n },\n max_payload: 1232,\n options: OPT {\n options: [],\n },\n },\n ),\n}
peer_addr = [::1]:51895
req_id = 52acca88-761a-44e3-8834-db836d6dd432
|
| 206 | 2026-03-09T10:56:06.830Z | ERRO | test_update_status (dns): failed to handle incoming DNS message: MessageRequest {
header: Header {
id: 41563,
message_type: Query,
op_code: Query,
authoritative: false,
truncation: false,
recursion_desired: true,
recursion_available: false,
authentic_data: false,
checking_disabled: false,
response_code: NoError,
query_count: 1,
answer_count: 0,
name_server_count: 0,
additional_count: 1,
},
queries: Queries {
queries: [
LowerQuery {
name: LowerName(
Name("_mgs._tcp.control-plane.oxide.internal."),
),
original: Query {
name: Name("_mgs._tcp.control-plane.oxide.internal."),
query_type: SRV,
query_class: IN,
},
},
],
original: [
4,
95,
109,
103,
115,
4,
95,
116,
99,
112,
13,
99,
111,
110,
116,
114,
111,
108,
45,
112,
108,
97,
110,
101,
5,
111,
120,
105,
100,
101,
8,
105,
110,
116,
101,
114,
110,
97,
108,
0,
0,
33,
0,
1,
],
},
answers: [],
name_servers: [],
additionals: [],
sig0: [],
edns: Some(
Edns {
rcode_high: 0,
version: 0,
flags: EdnsFlags {
dnssec_ok: false,
z: 0,
},
max_payload: 1232,
options: OPT {
options: [],
},
},
),
} SERVFAIL: server is not authoritative for name: "_mgs._tcp.control-plane.oxide.internal."
kind = dns
peer_addr = [::1]:51895
req_id = 52acca88-761a-44e3-8834-db836d6dd432
|
| 207 | 2026-03-09T10:56:06.838Z | INFO | test_update_status (DataLoader): created 5 built-in users
|
| 208 | 2026-03-09T10:56:06.838Z | TRAC | test_update_status (DataLoader): authorize begin
action = Modify
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 209 | 2026-03-09T10:56:06.838Z | DEBG | test_update_status (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 210 | 2026-03-09T10:56:06.840Z | DEBG | test_update_status (DataLoader): authorize result
action = Modify
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 211 | 2026-03-09T10:56:06.840Z | DEBG | test_update_status (DataLoader): attempting to create built-in role assignments
|
| 212 | 2026-03-09T10:56:06.840Z | TRAC | test_update_status (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 213 | 2026-03-09T10:56:06.840Z | DEBG | test_update_status (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 214 | 2026-03-09T10:56:06.840Z | DEBG | test_update_status (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 215 | 2026-03-09T10:56:07.001Z | INFO | test_update_status (DataLoader): created 4 built-in role assignments
|
| 216 | 2026-03-09T10:56:07.002Z | TRAC | test_update_status (DataLoader): authorize begin
action = Modify
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 217 | 2026-03-09T10:56:07.002Z | DEBG | test_update_status (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 218 | 2026-03-09T10:56:07.005Z | DEBG | test_update_status (DataLoader): authorize result
action = Modify
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 219 | 2026-03-09T10:56:07.005Z | DEBG | test_update_status (DataLoader): attempting to create built-in silos
|
| 220 | 2026-03-09T10:56:07.005Z | TRAC | test_update_status (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 221 | 2026-03-09T10:56:07.005Z | DEBG | test_update_status (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 222 | 2026-03-09T10:56:07.006Z | DEBG | test_update_status (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 223 | 2026-03-09T10:56:07.090Z | INFO | test_update_status (DataLoader): created 2 built-in silos
|
| 224 | 2026-03-09T10:56:07.090Z | TRAC | test_update_status (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 225 | 2026-03-09T10:56:07.090Z | DEBG | test_update_status (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 226 | 2026-03-09T10:56:07.091Z | DEBG | test_update_status (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 227 | 2026-03-09T10:56:07.108Z | TRAC | test_update_status (DataLoader): authorize begin
action = Modify
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 228 | 2026-03-09T10:56:07.109Z | DEBG | test_update_status (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 229 | 2026-03-09T10:56:07.111Z | DEBG | test_update_status (DataLoader): authorize result
action = Modify
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 230 | 2026-03-09T10:56:07.111Z | DEBG | test_update_status (DataLoader): attempting to create built-in projects
|
| 231 | 2026-03-09T10:56:07.111Z | TRAC | test_update_status (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 232 | 2026-03-09T10:56:07.111Z | DEBG | test_update_status (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 233 | 2026-03-09T10:56:07.111Z | DEBG | test_update_status (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 234 | 2026-03-09T10:56:07.130Z | TRAC | test_update_status (DataLoader): authorize begin
action = CreateChild
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }
|
| 235 | 2026-03-09T10:56:07.131Z | TRAC | test_update_status (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }
resource_id = 001de000-5110-4000-8000-000000000001
resource_type = Silo
|
| 236 | 2026-03-09T10:56:07.131Z | TRAC | test_update_status (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 237 | 2026-03-09T10:56:07.131Z | DEBG | test_update_status (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 238 | 2026-03-09T10:56:07.131Z | DEBG | test_update_status (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 239 | 2026-03-09T10:56:07.184Z | TRAC | test_update_status (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 240 | 2026-03-09T10:56:07.184Z | TRAC | test_update_status (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 241 | 2026-03-09T10:56:07.184Z | DEBG | test_update_status (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 242 | 2026-03-09T10:56:07.185Z | DEBG | test_update_status (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 243 | 2026-03-09T10:56:07.189Z | DEBG | test_update_status (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 244 | 2026-03-09T10:56:07.192Z | DEBG | test_update_status (DataLoader): authorize result
action = CreateChild
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }
result = Ok(())
|
| 245 | 2026-03-09T10:56:07.192Z | TRAC | test_update_status (DataLoader): authorize begin
action = CreateChild
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }
|
| 246 | 2026-03-09T10:56:07.192Z | TRAC | test_update_status (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }
resource_id = 001de000-5110-4000-8000-000000000001
resource_type = Silo
|
| 247 | 2026-03-09T10:56:07.192Z | TRAC | test_update_status (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 248 | 2026-03-09T10:56:07.192Z | DEBG | test_update_status (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 249 | 2026-03-09T10:56:07.194Z | DEBG | test_update_status (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 250 | 2026-03-09T10:56:07.196Z | TRAC | test_update_status (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 251 | 2026-03-09T10:56:07.196Z | TRAC | test_update_status (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 252 | 2026-03-09T10:56:07.197Z | DEBG | test_update_status (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 253 | 2026-03-09T10:56:07.197Z | DEBG | test_update_status (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 254 | 2026-03-09T10:56:07.200Z | DEBG | test_update_status (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 255 | 2026-03-09T10:56:07.203Z | DEBG | test_update_status (DataLoader): authorize result
action = CreateChild
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }
result = Ok(())
|
| 256 | 2026-03-09T10:56:07.203Z | TRAC | test_update_status (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 257 | 2026-03-09T10:56:07.203Z | DEBG | test_update_status (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 258 | 2026-03-09T10:56:07.203Z | DEBG | test_update_status (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 259 | 2026-03-09T10:56:07.219Z | INFO | test_update_status (DataLoader): created built-in services project
|
| 260 | 2026-03-09T10:56:07.220Z | TRAC | test_update_status (DataLoader): authorize begin
action = Modify
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 261 | 2026-03-09T10:56:07.220Z | DEBG | test_update_status (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 262 | 2026-03-09T10:56:07.221Z | DEBG | test_update_status (DataLoader): authorize result
action = Modify
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 263 | 2026-03-09T10:56:07.222Z | DEBG | test_update_status (DataLoader): attempting to create built-in VPCs
|
| 264 | 2026-03-09T10:56:07.222Z | TRAC | test_update_status (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 265 | 2026-03-09T10:56:07.222Z | DEBG | test_update_status (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 266 | 2026-03-09T10:56:07.222Z | DEBG | test_update_status (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 267 | 2026-03-09T10:56:07.225Z | TRAC | test_update_status (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 268 | 2026-03-09T10:56:07.225Z | DEBG | test_update_status (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 269 | 2026-03-09T10:56:07.225Z | DEBG | test_update_status (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 270 | 2026-03-09T10:56:07.228Z | TRAC | test_update_status (DataLoader): authorize begin
action = CreateChild
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }
|
| 271 | 2026-03-09T10:56:07.229Z | TRAC | test_update_status (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }
resource_id = 001de000-4401-4000-8000-000000000000
resource_type = Project
|
| 272 | 2026-03-09T10:56:07.229Z | TRAC | test_update_status (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 273 | 2026-03-09T10:56:07.229Z | DEBG | test_update_status (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 274 | 2026-03-09T10:56:07.230Z | DEBG | test_update_status (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 275 | 2026-03-09T10:56:07.237Z | TRAC | test_update_status (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }
resource_id = 001de000-5110-4000-8000-000000000001
resource_type = Silo
|
| 276 | 2026-03-09T10:56:07.237Z | TRAC | test_update_status (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 277 | 2026-03-09T10:56:07.237Z | DEBG | test_update_status (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 278 | 2026-03-09T10:56:07.237Z | DEBG | test_update_status (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 279 | 2026-03-09T10:56:07.241Z | TRAC | test_update_status (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 280 | 2026-03-09T10:56:07.242Z | TRAC | test_update_status (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 281 | 2026-03-09T10:56:07.242Z | DEBG | test_update_status (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 282 | 2026-03-09T10:56:07.243Z | DEBG | test_update_status (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 283 | 2026-03-09T10:56:07.247Z | DEBG | test_update_status (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 284 | 2026-03-09T10:56:07.251Z | DEBG | test_update_status (DataLoader): authorize result
action = CreateChild
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }
result = Ok(())
|
| 285 | 2026-03-09T10:56:07.251Z | TRAC | test_update_status (DataLoader): successful lookup of siloed resource "Project" using built-in user
|
| 286 | 2026-03-09T10:56:07.251Z | TRAC | test_update_status (DataLoader): authorize begin
action = CreateChild
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }
|
| 287 | 2026-03-09T10:56:07.251Z | TRAC | test_update_status (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }
resource_id = 001de000-4401-4000-8000-000000000000
resource_type = Project
|
| 288 | 2026-03-09T10:56:07.251Z | TRAC | test_update_status (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 289 | 2026-03-09T10:56:07.251Z | DEBG | test_update_status (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 290 | 2026-03-09T10:56:07.252Z | DEBG | test_update_status (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 291 | 2026-03-09T10:56:07.256Z | TRAC | test_update_status (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }
resource_id = 001de000-5110-4000-8000-000000000001
resource_type = Silo
|
| 292 | 2026-03-09T10:56:07.256Z | TRAC | test_update_status (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 293 | 2026-03-09T10:56:07.256Z | DEBG | test_update_status (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 294 | 2026-03-09T10:56:07.256Z | DEBG | test_update_status (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 295 | 2026-03-09T10:56:07.259Z | TRAC | test_update_status (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 296 | 2026-03-09T10:56:07.259Z | TRAC | test_update_status (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 297 | 2026-03-09T10:56:07.259Z | DEBG | test_update_status (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 298 | 2026-03-09T10:56:07.259Z | DEBG | test_update_status (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 299 | 2026-03-09T10:56:07.262Z | DEBG | test_update_status (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 300 | 2026-03-09T10:56:07.267Z | DEBG | test_update_status (DataLoader): authorize result
action = CreateChild
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }
result = Ok(())
|
| 301 | 2026-03-09T10:56:07.267Z | TRAC | test_update_status (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 302 | 2026-03-09T10:56:07.267Z | DEBG | test_update_status (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 303 | 2026-03-09T10:56:07.268Z | DEBG | test_update_status (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 304 | 2026-03-09T10:56:07.276Z | TRAC | test_update_status (DataLoader): authorize begin
action = CreateChild
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }
|
| 305 | 2026-03-09T10:56:07.276Z | TRAC | test_update_status (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }
resource_id = 001de000-4401-4000-8000-000000000000
resource_type = Project
|
| 306 | 2026-03-09T10:56:07.276Z | TRAC | test_update_status (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 307 | 2026-03-09T10:56:07.276Z | DEBG | test_update_status (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 308 | 2026-03-09T10:56:07.277Z | DEBG | test_update_status (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 309 | 2026-03-09T10:56:07.282Z | TRAC | test_update_status (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }
resource_id = 001de000-5110-4000-8000-000000000001
resource_type = Silo
|
| 310 | 2026-03-09T10:56:07.282Z | TRAC | test_update_status (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 311 | 2026-03-09T10:56:07.282Z | DEBG | test_update_status (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 312 | 2026-03-09T10:56:07.282Z | DEBG | test_update_status (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 313 | 2026-03-09T10:56:07.284Z | TRAC | test_update_status (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 314 | 2026-03-09T10:56:07.284Z | TRAC | test_update_status (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 315 | 2026-03-09T10:56:07.284Z | DEBG | test_update_status (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 316 | 2026-03-09T10:56:07.285Z | DEBG | test_update_status (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 317 | 2026-03-09T10:56:07.290Z | DEBG | test_update_status (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 318 | 2026-03-09T10:56:07.296Z | DEBG | test_update_status (DataLoader): authorize result
action = CreateChild
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }
result = Ok(())
|
| 319 | 2026-03-09T10:56:07.296Z | TRAC | test_update_status (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 320 | 2026-03-09T10:56:07.296Z | DEBG | test_update_status (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 321 | 2026-03-09T10:56:07.296Z | DEBG | test_update_status (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 322 | 2026-03-09T10:56:07.304Z | TRAC | test_update_status (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 323 | 2026-03-09T10:56:07.304Z | DEBG | test_update_status (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 324 | 2026-03-09T10:56:07.305Z | DEBG | test_update_status (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 325 | 2026-03-09T10:56:07.313Z | TRAC | test_update_status (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 326 | 2026-03-09T10:56:07.313Z | DEBG | test_update_status (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 327 | 2026-03-09T10:56:07.313Z | DEBG | test_update_status (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 328 | 2026-03-09T10:56:07.318Z | TRAC | test_update_status (DataLoader): authorize begin
action = CreateChild
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }
|
| 329 | 2026-03-09T10:56:07.318Z | TRAC | test_update_status (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }
resource_id = 001de000-4401-4000-8000-000000000000
resource_type = Project
|
| 330 | 2026-03-09T10:56:07.318Z | TRAC | test_update_status (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 331 | 2026-03-09T10:56:07.318Z | DEBG | test_update_status (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 332 | 2026-03-09T10:56:07.318Z | DEBG | test_update_status (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 333 | 2026-03-09T10:56:07.322Z | TRAC | test_update_status (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }
resource_id = 001de000-5110-4000-8000-000000000001
resource_type = Silo
|
| 334 | 2026-03-09T10:56:07.322Z | TRAC | test_update_status (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 335 | 2026-03-09T10:56:07.322Z | DEBG | test_update_status (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 336 | 2026-03-09T10:56:07.322Z | DEBG | test_update_status (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 337 | 2026-03-09T10:56:07.327Z | TRAC | test_update_status (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 338 | 2026-03-09T10:56:07.327Z | TRAC | test_update_status (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 339 | 2026-03-09T10:56:07.327Z | DEBG | test_update_status (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 340 | 2026-03-09T10:56:07.329Z | DEBG | test_update_status (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 341 | 2026-03-09T10:56:07.331Z | DEBG | test_update_status (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 342 | 2026-03-09T10:56:07.337Z | DEBG | test_update_status (DataLoader): authorize result
action = CreateChild
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }
result = Ok(())
|
| 343 | 2026-03-09T10:56:07.337Z | TRAC | test_update_status (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 344 | 2026-03-09T10:56:07.337Z | DEBG | test_update_status (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 345 | 2026-03-09T10:56:07.338Z | DEBG | test_update_status (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 346 | 2026-03-09T10:56:07.380Z | TRAC | test_update_status (DataLoader): authorize begin
action = CreateChild
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-074c-4000-8000-000000000001, lookup_type: ById(001de000-074c-4000-8000-000000000001) }
|
| 347 | 2026-03-09T10:56:07.380Z | TRAC | test_update_status (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }
resource_id = 001de000-4401-4000-8000-000000000000
resource_type = Project
|
| 348 | 2026-03-09T10:56:07.380Z | TRAC | test_update_status (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 349 | 2026-03-09T10:56:07.380Z | DEBG | test_update_status (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 350 | 2026-03-09T10:56:07.380Z | DEBG | test_update_status (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 351 | 2026-03-09T10:56:07.386Z | TRAC | test_update_status (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }
resource_id = 001de000-5110-4000-8000-000000000001
resource_type = Silo
|
| 352 | 2026-03-09T10:56:07.386Z | TRAC | test_update_status (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 353 | 2026-03-09T10:56:07.386Z | DEBG | test_update_status (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 354 | 2026-03-09T10:56:07.387Z | DEBG | test_update_status (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 355 | 2026-03-09T10:56:07.390Z | TRAC | test_update_status (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 356 | 2026-03-09T10:56:07.390Z | TRAC | test_update_status (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 357 | 2026-03-09T10:56:07.390Z | DEBG | test_update_status (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 358 | 2026-03-09T10:56:07.393Z | DEBG | test_update_status (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 359 | 2026-03-09T10:56:07.397Z | DEBG | test_update_status (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 360 | 2026-03-09T10:56:07.409Z | DEBG | test_update_status (DataLoader): authorize result
action = CreateChild
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-074c-4000-8000-000000000001, lookup_type: ById(001de000-074c-4000-8000-000000000001) }
result = Ok(())
|
| 361 | 2026-03-09T10:56:07.409Z | TRAC | test_update_status (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 362 | 2026-03-09T10:56:07.409Z | DEBG | test_update_status (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 363 | 2026-03-09T10:56:07.409Z | DEBG | test_update_status (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 364 | 2026-03-09T10:56:07.491Z | TRAC | test_update_status (DataLoader): authorize begin
action = CreateChild
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-074c-4000-8000-000000000001, lookup_type: ById(001de000-074c-4000-8000-000000000001) }
|
| 365 | 2026-03-09T10:56:07.491Z | TRAC | test_update_status (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }
resource_id = 001de000-4401-4000-8000-000000000000
resource_type = Project
|
| 366 | 2026-03-09T10:56:07.491Z | TRAC | test_update_status (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 367 | 2026-03-09T10:56:07.491Z | DEBG | test_update_status (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 368 | 2026-03-09T10:56:07.496Z | DEBG | test_update_status (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 369 | 2026-03-09T10:56:07.507Z | TRAC | test_update_status (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }
resource_id = 001de000-5110-4000-8000-000000000001
resource_type = Silo
|
| 370 | 2026-03-09T10:56:07.507Z | TRAC | test_update_status (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 371 | 2026-03-09T10:56:07.507Z | DEBG | test_update_status (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 372 | 2026-03-09T10:56:07.508Z | DEBG | test_update_status (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 373 | 2026-03-09T10:56:07.511Z | TRAC | test_update_status (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 374 | 2026-03-09T10:56:07.511Z | TRAC | test_update_status (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 375 | 2026-03-09T10:56:07.511Z | DEBG | test_update_status (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 376 | 2026-03-09T10:56:07.512Z | DEBG | test_update_status (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 377 | 2026-03-09T10:56:07.518Z | DEBG | test_update_status (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 378 | 2026-03-09T10:56:07.523Z | DEBG | test_update_status (DataLoader): authorize result
action = CreateChild
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-074c-4000-8000-000000000001, lookup_type: ById(001de000-074c-4000-8000-000000000001) }
result = Ok(())
|
| 379 | 2026-03-09T10:56:07.524Z | TRAC | test_update_status (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 380 | 2026-03-09T10:56:07.524Z | DEBG | test_update_status (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 381 | 2026-03-09T10:56:07.524Z | DEBG | test_update_status (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 382 | 2026-03-09T10:56:07.532Z | DEBG | test_update_status (DataLoader): attempting to create built-in VPC firewall rules
|
| 383 | 2026-03-09T10:56:07.532Z | TRAC | test_update_status (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 384 | 2026-03-09T10:56:07.532Z | DEBG | test_update_status (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 385 | 2026-03-09T10:56:07.533Z | DEBG | test_update_status (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 386 | 2026-03-09T10:56:07.539Z | TRAC | test_update_status (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 387 | 2026-03-09T10:56:07.539Z | DEBG | test_update_status (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 388 | 2026-03-09T10:56:07.540Z | DEBG | test_update_status (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 389 | 2026-03-09T10:56:07.548Z | TRAC | test_update_status (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 390 | 2026-03-09T10:56:07.548Z | DEBG | test_update_status (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 391 | 2026-03-09T10:56:07.550Z | DEBG | test_update_status (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 392 | 2026-03-09T10:56:07.551Z | TRAC | test_update_status (DataLoader): authorize begin
action = CreateChild
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
|
| 393 | 2026-03-09T10:56:07.552Z | TRAC | test_update_status (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }
resource_id = 001de000-4401-4000-8000-000000000000
resource_type = Project
|
| 394 | 2026-03-09T10:56:07.552Z | TRAC | test_update_status (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 395 | 2026-03-09T10:56:07.552Z | DEBG | test_update_status (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 396 | 2026-03-09T10:56:07.552Z | DEBG | test_update_status (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 397 | 2026-03-09T10:56:07.554Z | TRAC | test_update_status (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }
resource_id = 001de000-5110-4000-8000-000000000001
resource_type = Silo
|
| 398 | 2026-03-09T10:56:07.554Z | TRAC | test_update_status (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 399 | 2026-03-09T10:56:07.554Z | DEBG | test_update_status (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 400 | 2026-03-09T10:56:07.555Z | DEBG | test_update_status (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 401 | 2026-03-09T10:56:07.557Z | TRAC | test_update_status (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 402 | 2026-03-09T10:56:07.557Z | TRAC | test_update_status (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 403 | 2026-03-09T10:56:07.557Z | DEBG | test_update_status (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 404 | 2026-03-09T10:56:07.558Z | DEBG | test_update_status (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 405 | 2026-03-09T10:56:07.560Z | DEBG | test_update_status (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 406 | 2026-03-09T10:56:07.566Z | DEBG | test_update_status (DataLoader): authorize result
action = CreateChild
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
result = Ok(())
|
| 407 | 2026-03-09T10:56:07.566Z | TRAC | test_update_status (DataLoader): successful lookup of siloed resource "Vpc" using built-in user
|
| 408 | 2026-03-09T10:56:07.566Z | TRAC | test_update_status (DataLoader): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
|
| 409 | 2026-03-09T10:56:07.566Z | TRAC | test_update_status (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }
resource_id = 001de000-4401-4000-8000-000000000000
resource_type = Project
|
| 410 | 2026-03-09T10:56:07.566Z | TRAC | test_update_status (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 411 | 2026-03-09T10:56:07.566Z | DEBG | test_update_status (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 412 | 2026-03-09T10:56:07.567Z | DEBG | test_update_status (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 413 | 2026-03-09T10:56:07.571Z | TRAC | test_update_status (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }
resource_id = 001de000-5110-4000-8000-000000000001
resource_type = Silo
|
| 414 | 2026-03-09T10:56:07.571Z | TRAC | test_update_status (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 415 | 2026-03-09T10:56:07.571Z | DEBG | test_update_status (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 416 | 2026-03-09T10:56:07.572Z | DEBG | test_update_status (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 417 | 2026-03-09T10:56:07.575Z | TRAC | test_update_status (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 418 | 2026-03-09T10:56:07.575Z | TRAC | test_update_status (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 419 | 2026-03-09T10:56:07.575Z | DEBG | test_update_status (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 420 | 2026-03-09T10:56:07.576Z | DEBG | test_update_status (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 421 | 2026-03-09T10:56:07.580Z | DEBG | test_update_status (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 422 | 2026-03-09T10:56:07.589Z | DEBG | test_update_status (DataLoader): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
result = Ok(())
|
| 423 | 2026-03-09T10:56:07.589Z | TRAC | test_update_status (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 424 | 2026-03-09T10:56:07.589Z | DEBG | test_update_status (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 425 | 2026-03-09T10:56:07.591Z | DEBG | test_update_status (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 426 | 2026-03-09T10:56:07.599Z | TRAC | test_update_status (DataLoader): authorize begin
action = Modify
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
|
| 427 | 2026-03-09T10:56:07.600Z | TRAC | test_update_status (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }
resource_id = 001de000-4401-4000-8000-000000000000
resource_type = Project
|
| 428 | 2026-03-09T10:56:07.600Z | TRAC | test_update_status (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 429 | 2026-03-09T10:56:07.600Z | DEBG | test_update_status (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 430 | 2026-03-09T10:56:07.601Z | DEBG | test_update_status (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 431 | 2026-03-09T10:56:07.604Z | TRAC | test_update_status (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }
resource_id = 001de000-5110-4000-8000-000000000001
resource_type = Silo
|
| 432 | 2026-03-09T10:56:07.604Z | TRAC | test_update_status (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 433 | 2026-03-09T10:56:07.604Z | DEBG | test_update_status (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 434 | 2026-03-09T10:56:07.605Z | DEBG | test_update_status (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 435 | 2026-03-09T10:56:07.612Z | TRAC | test_update_status (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 436 | 2026-03-09T10:56:07.612Z | TRAC | test_update_status (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 437 | 2026-03-09T10:56:07.612Z | DEBG | test_update_status (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 438 | 2026-03-09T10:56:07.613Z | DEBG | test_update_status (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 439 | 2026-03-09T10:56:07.617Z | DEBG | test_update_status (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 440 | 2026-03-09T10:56:07.623Z | DEBG | test_update_status (DataLoader): authorize result
action = Modify
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
result = Ok(())
|
| 441 | 2026-03-09T10:56:07.623Z | TRAC | test_update_status (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 442 | 2026-03-09T10:56:07.623Z | DEBG | test_update_status (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 443 | 2026-03-09T10:56:07.624Z | DEBG | test_update_status (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 444 | 2026-03-09T10:56:07.706Z | INFO | test_update_status (DataLoader): created built-in VPC firewall rules
|
| 445 | 2026-03-09T10:56:07.706Z | DEBG | test_update_status (DataLoader): attempting to create built-in VPC Subnets
|
| 446 | 2026-03-09T10:56:07.706Z | TRAC | test_update_status (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 447 | 2026-03-09T10:56:07.706Z | DEBG | test_update_status (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 448 | 2026-03-09T10:56:07.707Z | DEBG | test_update_status (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 449 | 2026-03-09T10:56:07.716Z | TRAC | test_update_status (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 450 | 2026-03-09T10:56:07.716Z | DEBG | test_update_status (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 451 | 2026-03-09T10:56:07.717Z | DEBG | test_update_status (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 452 | 2026-03-09T10:56:07.723Z | TRAC | test_update_status (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 453 | 2026-03-09T10:56:07.724Z | DEBG | test_update_status (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 454 | 2026-03-09T10:56:07.725Z | DEBG | test_update_status (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 455 | 2026-03-09T10:56:07.728Z | TRAC | test_update_status (DataLoader): authorize begin
action = CreateChild
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
|
| 456 | 2026-03-09T10:56:07.728Z | TRAC | test_update_status (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }
resource_id = 001de000-4401-4000-8000-000000000000
resource_type = Project
|
| 457 | 2026-03-09T10:56:07.728Z | TRAC | test_update_status (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 458 | 2026-03-09T10:56:07.728Z | DEBG | test_update_status (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 459 | 2026-03-09T10:56:07.730Z | DEBG | test_update_status (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 460 | 2026-03-09T10:56:07.739Z | TRAC | test_update_status (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }
resource_id = 001de000-5110-4000-8000-000000000001
resource_type = Silo
|
| 461 | 2026-03-09T10:56:07.739Z | TRAC | test_update_status (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 462 | 2026-03-09T10:56:07.739Z | DEBG | test_update_status (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 463 | 2026-03-09T10:56:07.740Z | DEBG | test_update_status (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 464 | 2026-03-09T10:56:07.744Z | TRAC | test_update_status (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 465 | 2026-03-09T10:56:07.744Z | TRAC | test_update_status (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 466 | 2026-03-09T10:56:07.744Z | DEBG | test_update_status (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 467 | 2026-03-09T10:56:07.744Z | DEBG | test_update_status (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 468 | 2026-03-09T10:56:07.747Z | DEBG | test_update_status (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 469 | 2026-03-09T10:56:07.753Z | DEBG | test_update_status (DataLoader): authorize result
action = CreateChild
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
result = Ok(())
|
| 470 | 2026-03-09T10:56:07.753Z | TRAC | test_update_status (DataLoader): successful lookup of siloed resource "Vpc" using built-in user
|
| 471 | 2026-03-09T10:56:07.753Z | TRAC | test_update_status (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 472 | 2026-03-09T10:56:07.753Z | DEBG | test_update_status (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 473 | 2026-03-09T10:56:07.754Z | DEBG | test_update_status (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 474 | 2026-03-09T10:56:07.761Z | TRAC | test_update_status (DataLoader): authorize begin
action = CreateChild
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
|
| 475 | 2026-03-09T10:56:07.761Z | TRAC | test_update_status (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }
resource_id = 001de000-4401-4000-8000-000000000000
resource_type = Project
|
| 476 | 2026-03-09T10:56:07.761Z | TRAC | test_update_status (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 477 | 2026-03-09T10:56:07.761Z | DEBG | test_update_status (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 478 | 2026-03-09T10:56:07.762Z | DEBG | test_update_status (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 479 | 2026-03-09T10:56:07.775Z | TRAC | test_update_status (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }
resource_id = 001de000-5110-4000-8000-000000000001
resource_type = Silo
|
| 480 | 2026-03-09T10:56:07.775Z | TRAC | test_update_status (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 481 | 2026-03-09T10:56:07.775Z | DEBG | test_update_status (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 482 | 2026-03-09T10:56:07.775Z | DEBG | test_update_status (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 483 | 2026-03-09T10:56:07.781Z | TRAC | test_update_status (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 484 | 2026-03-09T10:56:07.781Z | TRAC | test_update_status (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 485 | 2026-03-09T10:56:07.781Z | DEBG | test_update_status (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 486 | 2026-03-09T10:56:07.782Z | DEBG | test_update_status (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 487 | 2026-03-09T10:56:07.786Z | DEBG | test_update_status (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 488 | 2026-03-09T10:56:07.790Z | DEBG | test_update_status (DataLoader): authorize result
action = CreateChild
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
result = Ok(())
|
| 489 | 2026-03-09T10:56:07.800Z | TRAC | test_update_status (DataLoader): authorize begin
action = CreateChild
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-074c-4000-8000-000000000001, lookup_type: ById(001de000-074c-4000-8000-000000000001) }
|
| 490 | 2026-03-09T10:56:07.800Z | TRAC | test_update_status (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }
resource_id = 001de000-4401-4000-8000-000000000000
resource_type = Project
|
| 491 | 2026-03-09T10:56:07.800Z | TRAC | test_update_status (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 492 | 2026-03-09T10:56:07.800Z | DEBG | test_update_status (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 493 | 2026-03-09T10:56:07.801Z | DEBG | test_update_status (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 494 | 2026-03-09T10:56:07.803Z | TRAC | test_update_status (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }
resource_id = 001de000-5110-4000-8000-000000000001
resource_type = Silo
|
| 495 | 2026-03-09T10:56:07.803Z | TRAC | test_update_status (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 496 | 2026-03-09T10:56:07.803Z | DEBG | test_update_status (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 497 | 2026-03-09T10:56:07.805Z | DEBG | test_update_status (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 498 | 2026-03-09T10:56:07.809Z | TRAC | test_update_status (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 499 | 2026-03-09T10:56:07.809Z | TRAC | test_update_status (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 500 | 2026-03-09T10:56:07.809Z | DEBG | test_update_status (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 501 | 2026-03-09T10:56:07.809Z | DEBG | test_update_status (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 502 | 2026-03-09T10:56:07.817Z | DEBG | test_update_status (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 503 | 2026-03-09T10:56:07.830Z | DEBG | test_update_status (DataLoader): authorize result
action = CreateChild
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-074c-4000-8000-000000000001, lookup_type: ById(001de000-074c-4000-8000-000000000001) }
result = Ok(())
|
| 504 | 2026-03-09T10:56:07.830Z | TRAC | test_update_status (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 505 | 2026-03-09T10:56:07.830Z | DEBG | test_update_status (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 506 | 2026-03-09T10:56:07.830Z | DEBG | test_update_status (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 507 | 2026-03-09T10:56:07.881Z | TRAC | test_update_status (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 508 | 2026-03-09T10:56:07.881Z | DEBG | test_update_status (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 509 | 2026-03-09T10:56:07.881Z | DEBG | test_update_status (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 510 | 2026-03-09T10:56:07.889Z | TRAC | test_update_status (DataLoader): authorize begin
action = CreateChild
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
|
| 511 | 2026-03-09T10:56:07.889Z | TRAC | test_update_status (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }
resource_id = 001de000-4401-4000-8000-000000000000
resource_type = Project
|
| 512 | 2026-03-09T10:56:07.889Z | TRAC | test_update_status (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 513 | 2026-03-09T10:56:07.889Z | DEBG | test_update_status (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 514 | 2026-03-09T10:56:07.893Z | DEBG | test_update_status (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 515 | 2026-03-09T10:56:07.897Z | TRAC | test_update_status (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }
resource_id = 001de000-5110-4000-8000-000000000001
resource_type = Silo
|
| 516 | 2026-03-09T10:56:07.897Z | TRAC | test_update_status (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 517 | 2026-03-09T10:56:07.897Z | DEBG | test_update_status (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 518 | 2026-03-09T10:56:07.898Z | DEBG | test_update_status (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 519 | 2026-03-09T10:56:07.902Z | TRAC | test_update_status (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 520 | 2026-03-09T10:56:07.902Z | TRAC | test_update_status (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 521 | 2026-03-09T10:56:07.902Z | DEBG | test_update_status (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 522 | 2026-03-09T10:56:07.902Z | DEBG | test_update_status (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 523 | 2026-03-09T10:56:07.906Z | DEBG | test_update_status (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 524 | 2026-03-09T10:56:07.911Z | DEBG | test_update_status (DataLoader): authorize result
action = CreateChild
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
result = Ok(())
|
| 525 | 2026-03-09T10:56:07.918Z | TRAC | test_update_status (DataLoader): authorize begin
action = CreateChild
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-074c-4000-8000-000000000001, lookup_type: ById(001de000-074c-4000-8000-000000000001) }
|
| 526 | 2026-03-09T10:56:07.919Z | TRAC | test_update_status (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }
resource_id = 001de000-4401-4000-8000-000000000000
resource_type = Project
|
| 527 | 2026-03-09T10:56:07.919Z | TRAC | test_update_status (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 528 | 2026-03-09T10:56:07.919Z | DEBG | test_update_status (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 529 | 2026-03-09T10:56:07.919Z | DEBG | test_update_status (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 530 | 2026-03-09T10:56:07.923Z | TRAC | test_update_status (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }
resource_id = 001de000-5110-4000-8000-000000000001
resource_type = Silo
|
| 531 | 2026-03-09T10:56:07.923Z | TRAC | test_update_status (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 532 | 2026-03-09T10:56:07.923Z | DEBG | test_update_status (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 533 | 2026-03-09T10:56:07.924Z | DEBG | test_update_status (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 534 | 2026-03-09T10:56:07.934Z | TRAC | test_update_status (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 535 | 2026-03-09T10:56:07.934Z | TRAC | test_update_status (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 536 | 2026-03-09T10:56:07.934Z | DEBG | test_update_status (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 537 | 2026-03-09T10:56:07.935Z | DEBG | test_update_status (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 538 | 2026-03-09T10:56:07.940Z | DEBG | test_update_status (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 539 | 2026-03-09T10:56:07.949Z | DEBG | test_update_status (DataLoader): authorize result
action = CreateChild
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-074c-4000-8000-000000000001, lookup_type: ById(001de000-074c-4000-8000-000000000001) }
result = Ok(())
|
| 540 | 2026-03-09T10:56:07.949Z | TRAC | test_update_status (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 541 | 2026-03-09T10:56:07.949Z | DEBG | test_update_status (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 542 | 2026-03-09T10:56:07.949Z | DEBG | test_update_status (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 543 | 2026-03-09T10:56:07.959Z | TRAC | test_update_status (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 544 | 2026-03-09T10:56:07.959Z | DEBG | test_update_status (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 545 | 2026-03-09T10:56:07.959Z | DEBG | test_update_status (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 546 | 2026-03-09T10:56:07.966Z | TRAC | test_update_status (DataLoader): authorize begin
action = CreateChild
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
|
| 547 | 2026-03-09T10:56:07.966Z | TRAC | test_update_status (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }
resource_id = 001de000-4401-4000-8000-000000000000
resource_type = Project
|
| 548 | 2026-03-09T10:56:07.966Z | TRAC | test_update_status (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 549 | 2026-03-09T10:56:07.966Z | DEBG | test_update_status (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 550 | 2026-03-09T10:56:07.967Z | DEBG | test_update_status (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 551 | 2026-03-09T10:56:07.970Z | TRAC | test_update_status (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }
resource_id = 001de000-5110-4000-8000-000000000001
resource_type = Silo
|
| 552 | 2026-03-09T10:56:07.970Z | TRAC | test_update_status (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 553 | 2026-03-09T10:56:07.970Z | DEBG | test_update_status (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 554 | 2026-03-09T10:56:07.970Z | DEBG | test_update_status (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 555 | 2026-03-09T10:56:07.974Z | TRAC | test_update_status (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 556 | 2026-03-09T10:56:07.974Z | TRAC | test_update_status (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 557 | 2026-03-09T10:56:07.974Z | DEBG | test_update_status (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 558 | 2026-03-09T10:56:07.975Z | DEBG | test_update_status (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 559 | 2026-03-09T10:56:07.977Z | DEBG | test_update_status (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 560 | 2026-03-09T10:56:07.982Z | DEBG | test_update_status (DataLoader): authorize result
action = CreateChild
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
result = Ok(())
|
| 561 | 2026-03-09T10:56:07.989Z | TRAC | test_update_status (DataLoader): authorize begin
action = CreateChild
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-074c-4000-8000-000000000001, lookup_type: ById(001de000-074c-4000-8000-000000000001) }
|
| 562 | 2026-03-09T10:56:07.989Z | TRAC | test_update_status (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }
resource_id = 001de000-4401-4000-8000-000000000000
resource_type = Project
|
| 563 | 2026-03-09T10:56:07.989Z | TRAC | test_update_status (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 564 | 2026-03-09T10:56:07.989Z | DEBG | test_update_status (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 565 | 2026-03-09T10:56:07.990Z | DEBG | test_update_status (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 566 | 2026-03-09T10:56:07.993Z | TRAC | test_update_status (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }
resource_id = 001de000-5110-4000-8000-000000000001
resource_type = Silo
|
| 567 | 2026-03-09T10:56:07.993Z | TRAC | test_update_status (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 568 | 2026-03-09T10:56:07.993Z | DEBG | test_update_status (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 569 | 2026-03-09T10:56:07.993Z | DEBG | test_update_status (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 570 | 2026-03-09T10:56:07.997Z | TRAC | test_update_status (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 571 | 2026-03-09T10:56:07.997Z | TRAC | test_update_status (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 572 | 2026-03-09T10:56:07.997Z | DEBG | test_update_status (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 573 | 2026-03-09T10:56:07.998Z | DEBG | test_update_status (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 574 | 2026-03-09T10:56:08.002Z | DEBG | test_update_status (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 575 | 2026-03-09T10:56:08.011Z | DEBG | test_update_status (DataLoader): authorize result
action = CreateChild
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-074c-4000-8000-000000000001, lookup_type: ById(001de000-074c-4000-8000-000000000001) }
result = Ok(())
|
| 576 | 2026-03-09T10:56:08.011Z | TRAC | test_update_status (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 577 | 2026-03-09T10:56:08.011Z | DEBG | test_update_status (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 578 | 2026-03-09T10:56:08.012Z | DEBG | test_update_status (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 579 | 2026-03-09T10:56:08.021Z | TRAC | test_update_status (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 580 | 2026-03-09T10:56:08.021Z | DEBG | test_update_status (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 581 | 2026-03-09T10:56:08.022Z | DEBG | test_update_status (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 582 | 2026-03-09T10:56:08.026Z | INFO | test_update_status (DataLoader): created built-in services vpc subnets
|
| 583 | 2026-03-09T10:56:08.026Z | INFO | test_update_status (DataLoader): created built-in services vpc
|
| 584 | 2026-03-09T10:56:08.026Z | TRAC | test_update_status (DataLoader): authorize begin
action = Modify
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 585 | 2026-03-09T10:56:08.026Z | DEBG | test_update_status (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 586 | 2026-03-09T10:56:08.028Z | DEBG | test_update_status (DataLoader): authorize result
action = Modify
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 587 | 2026-03-09T10:56:08.028Z | DEBG | test_update_status (DataLoader): attempting to create silo users
|
| 588 | 2026-03-09T10:56:08.028Z | TRAC | test_update_status (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 589 | 2026-03-09T10:56:08.028Z | DEBG | test_update_status (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 590 | 2026-03-09T10:56:08.029Z | DEBG | test_update_status (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 591 | 2026-03-09T10:56:08.037Z | INFO | test_update_status (DataLoader): created 2 silo users
|
| 592 | 2026-03-09T10:56:08.037Z | DEBG | test_update_status (DataLoader): attempting to create silo user role assignments
|
| 593 | 2026-03-09T10:56:08.037Z | TRAC | test_update_status (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 594 | 2026-03-09T10:56:08.037Z | DEBG | test_update_status (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 595 | 2026-03-09T10:56:08.038Z | DEBG | test_update_status (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 596 | 2026-03-09T10:56:08.044Z | INFO | test_update_status (DataLoader): created 2 silo user role assignments
|
| 597 | 2026-03-09T10:56:08.044Z | TRAC | test_update_status (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 598 | 2026-03-09T10:56:08.044Z | DEBG | test_update_status (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 599 | 2026-03-09T10:56:08.046Z | DEBG | test_update_status (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 600 | 2026-03-09T10:56:08.058Z | TRAC | test_update_status (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 601 | 2026-03-09T10:56:08.058Z | DEBG | test_update_status (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 602 | 2026-03-09T10:56:08.065Z | DEBG | test_update_status (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 603 | 2026-03-09T10:56:08.084Z | TRAC | test_update_status (DataLoader): authorize begin
action = CreateChild
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = IpPoolList
|
| 604 | 2026-03-09T10:56:08.084Z | TRAC | test_update_status (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 605 | 2026-03-09T10:56:08.084Z | TRAC | test_update_status (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 606 | 2026-03-09T10:56:08.084Z | DEBG | test_update_status (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 607 | 2026-03-09T10:56:08.085Z | DEBG | test_update_status (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 608 | 2026-03-09T10:56:08.091Z | DEBG | test_update_status (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 609 | 2026-03-09T10:56:08.093Z | DEBG | test_update_status (DataLoader): authorize result
action = CreateChild
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = IpPoolList
result = Ok(())
|
| 610 | 2026-03-09T10:56:08.093Z | TRAC | test_update_status (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 611 | 2026-03-09T10:56:08.094Z | DEBG | test_update_status (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 612 | 2026-03-09T10:56:08.094Z | DEBG | test_update_status (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 613 | 2026-03-09T10:56:08.220Z | TRAC | test_update_status (DataLoader): authorize begin
action = CreateChild
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = IpPoolList
|
| 614 | 2026-03-09T10:56:08.220Z | TRAC | test_update_status (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 615 | 2026-03-09T10:56:08.220Z | TRAC | test_update_status (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 616 | 2026-03-09T10:56:08.220Z | DEBG | test_update_status (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 617 | 2026-03-09T10:56:08.221Z | DEBG | test_update_status (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 618 | 2026-03-09T10:56:08.224Z | DEBG | test_update_status (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 619 | 2026-03-09T10:56:08.226Z | DEBG | test_update_status (DataLoader): authorize result
action = CreateChild
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = IpPoolList
result = Ok(())
|
| 620 | 2026-03-09T10:56:08.226Z | TRAC | test_update_status (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 621 | 2026-03-09T10:56:08.226Z | DEBG | test_update_status (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 622 | 2026-03-09T10:56:08.226Z | DEBG | test_update_status (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 623 | 2026-03-09T10:56:08.230Z | INFO | test_update_status (nexus): populate complete
|
| 624 | 2026-03-09T10:56:08.230Z | TRAC | test_update_status (BackgroundTasks): authorize begin
action = Modify
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = BlueprintConfig
|
| 625 | 2026-03-09T10:56:08.230Z | TRAC | test_update_status (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 626 | 2026-03-09T10:56:08.230Z | TRAC | test_update_status (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 627 | 2026-03-09T10:56:08.230Z | DEBG | test_update_status (BackgroundTasks): roles
roles = RoleSet { roles: {} }
|
| 628 | 2026-03-09T10:56:08.230Z | DEBG | test_update_status (init_with_steps): Running step start_gateway_switch0
|
| 629 | 2026-03-09T10:56:08.230Z | DEBG | test_update_status: Starting Management Gateway
|
| 630 | 2026-03-09T10:56:08.231Z | DEBG | test_update_status (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 631 | 2026-03-09T10:56:08.236Z | DEBG | test_update_status (BackgroundTasks): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 632 | 2026-03-09T10:56:08.242Z | DEBG | test_update_status (BackgroundTasks): authorize result
action = Modify
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = BlueprintConfig
result = Ok(())
|
| 633 | 2026-03-09T10:56:08.242Z | TRAC | test_update_status (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 634 | 2026-03-09T10:56:08.242Z | DEBG | test_update_status (BackgroundTasks): roles
roles = RoleSet { roles: {} }
|
| 635 | 2026-03-09T10:56:08.242Z | DEBG | test_update_status (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 636 | 2026-03-09T10:56:08.249Z | INFO | test_update_status (nexus): activating background tasks
|
| 637 | 2026-03-09T10:56:08.254Z | DEBG | test_update_status (BackgroundTasks): activating
background_task = dns_propagation_internal
dns_group = internal
iteration = 1
reason = Timeout
|
| 638 | 2026-03-09T10:56:08.254Z | WARN | test_update_status (BackgroundTasks): DNS propagation: skipped
background_task = dns_propagation_internal
dns_group = internal
reason = no config nor servers
|
| 639 | 2026-03-09T10:56:08.254Z | DEBG | test_update_status (BackgroundTasks): activation complete
background_task = dns_propagation_internal
dns_group = internal
elapsed = 191.22\u{b5}s
iteration = 1
status = {"error":"no config nor servers"}
|
| 640 | 2026-03-09T10:56:08.254Z | DEBG | test_update_status (BackgroundTasks): activating
background_task = region_snapshot_replacement_step
iteration = 1
reason = Timeout
|
| 641 | 2026-03-09T10:56:08.254Z | TRAC | test_update_status (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = region_snapshot_replacement_step
resource = Database
|
| 642 | 2026-03-09T10:56:08.254Z | DEBG | test_update_status (BackgroundTasks): roles
background_task = region_snapshot_replacement_step
roles = RoleSet { roles: {} }
|
| 643 | 2026-03-09T10:56:08.254Z | DEBG | test_update_status (BackgroundTasks): activating
background_task = blueprint_loader
iteration = 1
reason = Timeout
|
| 644 | 2026-03-09T10:56:08.255Z | TRAC | test_update_status (BackgroundTasks): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = blueprint_loader
resource = BlueprintConfig
|
| 645 | 2026-03-09T10:56:08.255Z | TRAC | test_update_status (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = blueprint_loader
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 646 | 2026-03-09T10:56:08.255Z | TRAC | test_update_status (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = blueprint_loader
resource = Database
|
| 647 | 2026-03-09T10:56:08.255Z | DEBG | test_update_status (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = region_snapshot_replacement_step
resource = Database
result = Ok(())
|
| 648 | 2026-03-09T10:56:08.255Z | DEBG | test_update_status (BackgroundTasks): roles
background_task = blueprint_loader
roles = RoleSet { roles: {} }
|
| 649 | 2026-03-09T10:56:08.255Z | DEBG | test_update_status (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = blueprint_loader
resource = Database
result = Ok(())
|
| 650 | 2026-03-09T10:56:08.258Z | DEBG | test_update_status (BackgroundTasks): activating
background_task = crdb_node_id_collector
iteration = 1
reason = Timeout
|
| 651 | 2026-03-09T10:56:08.258Z | WARN | test_update_status (BackgroundTasks): Blueprint execution: skipped
background_task = crdb_node_id_collector
reason = no blueprint
|
| 652 | 2026-03-09T10:56:08.258Z | DEBG | test_update_status (BackgroundTasks): activation complete
background_task = crdb_node_id_collector
elapsed = 210.138\u{b5}s
iteration = 1
status = {"error":"no blueprint"}
|
| 653 | 2026-03-09T10:56:08.258Z | DEBG | test_update_status (BackgroundTasks): activating
background_task = instance_updater
iteration = 1
reason = Timeout
|
| 654 | 2026-03-09T10:56:08.258Z | INFO | test_update_status (BackgroundTasks): background instance updater explicitly disabled
background_task = instance_updater
|
| 655 | 2026-03-09T10:56:08.258Z | DEBG | test_update_status (BackgroundTasks): activation complete
background_task = instance_updater
elapsed = 501.102\u{b5}s
iteration = 1
status = {"destroyed_active_vmms":0,"disabled":true,"failed_active_vmms":0,"query_errors":[],"saga_errors":[],"sagas_completed":0,"sagas_started":0,"terminated_active_migrations":0}
|
| 656 | 2026-03-09T10:56:08.259Z | DEBG | test_update_status (BackgroundTasks): activating
background_task = physical_disk_adoption
iteration = 1
reason = Timeout
|
| 657 | 2026-03-09T10:56:08.259Z | DEBG | test_update_status (BackgroundTasks): activation complete
background_task = physical_disk_adoption
elapsed = 46.583\u{b5}s
iteration = 1
status = {"error":"task disabled"}
|
| 658 | 2026-03-09T10:56:08.259Z | DEBG | test_update_status (BackgroundTasks): activating
background_task = blueprint_rendezvous
iteration = 1
reason = Timeout
|
| 659 | 2026-03-09T10:56:08.259Z | WARN | test_update_status (BackgroundTasks): Blueprint rendezvous: skipped
background_task = blueprint_rendezvous
reason = no blueprint
|
| 660 | 2026-03-09T10:56:08.259Z | DEBG | test_update_status (BackgroundTasks): activation complete
background_task = blueprint_rendezvous
elapsed = 28.096\u{b5}s
iteration = 1
status = {"error":"no blueprint"}
|
| 661 | 2026-03-09T10:56:08.259Z | DEBG | test_update_status (BackgroundTasks): activating
background_task = trust_quorum_manager
iteration = 1
reason = Timeout
|
| 662 | 2026-03-09T10:56:08.259Z | TRAC | test_update_status (BackgroundTasks): authorize begin
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = trust_quorum_manager
bgtask = TrustQuorumManager
resource = Fleet
|
| 663 | 2026-03-09T10:56:08.259Z | TRAC | test_update_status (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = trust_quorum_manager
bgtask = TrustQuorumManager
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 664 | 2026-03-09T10:56:08.259Z | TRAC | test_update_status (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = trust_quorum_manager
bgtask = TrustQuorumManager
resource = Database
|
| 665 | 2026-03-09T10:56:08.259Z | DEBG | test_update_status (BackgroundTasks): roles
background_task = trust_quorum_manager
bgtask = TrustQuorumManager
roles = RoleSet { roles: {} }
|
| 666 | 2026-03-09T10:56:08.259Z | DEBG | test_update_status (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = trust_quorum_manager
bgtask = TrustQuorumManager
resource = Database
result = Ok(())
|
| 667 | 2026-03-09T10:56:08.267Z | DEBG | test_update_status (BackgroundTasks): activating
background_task = dns_config_internal
dns_group = internal
iteration = 1
reason = Timeout
|
| 668 | 2026-03-09T10:56:08.268Z | DEBG | test_update_status (BackgroundTasks): reading DNS version
background_task = dns_config_internal
dns_group = internal
|
| 669 | 2026-03-09T10:56:08.268Z | TRAC | test_update_status (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = dns_config_internal
dns_group = internal
resource = Database
|
| 670 | 2026-03-09T10:56:08.268Z | DEBG | test_update_status (BackgroundTasks): roles
background_task = dns_config_internal
dns_group = internal
roles = RoleSet { roles: {} }
|
| 671 | 2026-03-09T10:56:08.268Z | DEBG | test_update_status (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = dns_config_internal
dns_group = internal
resource = Database
result = Ok(())
|
| 672 | 2026-03-09T10:56:08.270Z | DEBG | test_update_status (BackgroundTasks): activating
background_task = decommissioned_disk_cleaner
iteration = 1
reason = Timeout
|
| 673 | 2026-03-09T10:56:08.270Z | INFO | test_update_status (BackgroundTasks): Decommissioned Disk Cleaner disabled
background_task = decommissioned_disk_cleaner
|
| 674 | 2026-03-09T10:56:08.270Z | DEBG | test_update_status (BackgroundTasks): activation complete
background_task = decommissioned_disk_cleaner
elapsed = 203.668\u{b5}s
iteration = 1
status = {"deleted":0,"error":null,"error_count":0,"found":0,"not_ready_to_be_deleted":0}
|
| 675 | 2026-03-09T10:56:08.270Z | DEBG | test_update_status (BackgroundTasks): activating
background_task = service_zone_nat_tracker
iteration = 1
reason = Timeout
|
| 676 | 2026-03-09T10:56:08.270Z | WARN | test_update_status (BackgroundTasks): inventory collection is None
background_task = service_zone_nat_tracker
|
| 677 | 2026-03-09T10:56:08.270Z | DEBG | test_update_status (BackgroundTasks): activation complete
background_task = service_zone_nat_tracker
elapsed = 70.669\u{b5}s
iteration = 1
status = {"error":"inventory collection is None"}
|
| 678 | 2026-03-09T10:56:08.270Z | DEBG | test_update_status (BackgroundTasks): activating
background_task = switch_port_config_manager
iteration = 1
reason = Timeout
|
| 679 | 2026-03-09T10:56:08.270Z | TRAC | test_update_status (BackgroundTasks): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = switch_port_config_manager
resource = Fleet
|
| 680 | 2026-03-09T10:56:08.270Z | TRAC | test_update_status (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = switch_port_config_manager
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 681 | 2026-03-09T10:56:08.270Z | TRAC | test_update_status (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = switch_port_config_manager
resource = Database
|
| 682 | 2026-03-09T10:56:08.270Z | DEBG | test_update_status (BackgroundTasks): roles
background_task = switch_port_config_manager
roles = RoleSet { roles: {} }
|
| 683 | 2026-03-09T10:56:08.271Z | DEBG | test_update_status (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = switch_port_config_manager
resource = Database
result = Ok(())
|
| 684 | 2026-03-09T10:56:08.272Z | DEBG | test_update_status (BackgroundTasks): activating
background_task = dns_servers_internal
dns_group = internal
iteration = 1
reason = Timeout
|
| 685 | 2026-03-09T10:56:08.272Z | TRAC | test_update_status (DnsResolver): lookup_all_socket_v6 srv
dns_name = _nameservice._tcp.control-plane.oxide.internal
|
| 686 | 2026-03-09T10:56:08.274Z | DEBG | test_update_status (BackgroundTasks): activating
background_task = support_bundle_collector
iteration = 1
reason = Timeout
|
| 687 | 2026-03-09T10:56:08.274Z | TRAC | test_update_status (BackgroundTasks): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = support_bundle_collector
resource = Fleet
|
| 688 | 2026-03-09T10:56:08.274Z | TRAC | test_update_status (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = support_bundle_collector
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 689 | 2026-03-09T10:56:08.274Z | TRAC | test_update_status (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = support_bundle_collector
resource = Database
|
| 690 | 2026-03-09T10:56:08.274Z | DEBG | test_update_status (BackgroundTasks): roles
background_task = support_bundle_collector
roles = RoleSet { roles: {} }
|
| 691 | 2026-03-09T10:56:08.274Z | DEBG | test_update_status (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = support_bundle_collector
resource = Database
result = Ok(())
|
| 692 | 2026-03-09T10:56:08.275Z | DEBG | test_update_status (BackgroundTasks): activating
background_task = v2p_manager
iteration = 1
reason = Timeout
|
| 693 | 2026-03-09T10:56:08.277Z | TRAC | test_update_status (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = v2p_manager
resource = Database
|
| 694 | 2026-03-09T10:56:08.277Z | DEBG | test_update_status (BackgroundTasks): roles
background_task = v2p_manager
roles = RoleSet { roles: {} }
|
| 695 | 2026-03-09T10:56:08.277Z | DEBG | test_update_status (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = v2p_manager
resource = Database
result = Ok(())
|
| 696 | 2026-03-09T10:56:08.278Z | DEBG | test_update_status (BackgroundTasks): activating
background_task = region_replacement
iteration = 1
reason = Timeout
|
| 697 | 2026-03-09T10:56:08.279Z | TRAC | test_update_status (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = region_replacement
resource = Database
|
| 698 | 2026-03-09T10:56:08.279Z | DEBG | test_update_status (BackgroundTasks): roles
background_task = region_replacement
roles = RoleSet { roles: {} }
|
| 699 | 2026-03-09T10:56:08.279Z | DEBG | test_update_status (BackgroundTasks): activating
background_task = dns_config_external
dns_group = external
iteration = 1
reason = Timeout
|
| 700 | 2026-03-09T10:56:08.279Z | DEBG | test_update_status (BackgroundTasks): reading DNS version
background_task = dns_config_external
dns_group = external
|
| 701 | 2026-03-09T10:56:08.279Z | DEBG | test_update_status (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = region_replacement
resource = Database
result = Ok(())
|
| 702 | 2026-03-09T10:56:08.279Z | TRAC | test_update_status (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = dns_config_external
dns_group = external
resource = Database
|
| 703 | 2026-03-09T10:56:08.279Z | DEBG | test_update_status (BackgroundTasks): roles
background_task = dns_config_external
dns_group = external
roles = RoleSet { roles: {} }
|
| 704 | 2026-03-09T10:56:08.280Z | DEBG | test_update_status (BackgroundTasks): activating
background_task = region_replacement_driver
iteration = 1
reason = Timeout
|
| 705 | 2026-03-09T10:56:08.280Z | TRAC | test_update_status (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = region_replacement_driver
resource = Database
|
| 706 | 2026-03-09T10:56:08.280Z | DEBG | test_update_status (BackgroundTasks): roles
background_task = region_replacement_driver
roles = RoleSet { roles: {} }
|
| 707 | 2026-03-09T10:56:08.281Z | DEBG | test_update_status (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = dns_config_external
dns_group = external
resource = Database
result = Ok(())
|
| 708 | 2026-03-09T10:56:08.281Z | DEBG | test_update_status (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = region_replacement_driver
resource = Database
result = Ok(())
|
| 709 | 2026-03-09T10:56:08.282Z | DEBG | test_update_status (BackgroundTasks): activating
background_task = dns_servers_external
dns_group = external
iteration = 1
reason = Timeout
|
| 710 | 2026-03-09T10:56:08.282Z | TRAC | test_update_status (DnsResolver): lookup_all_socket_v6 srv
dns_name = _external-dns._tcp.control-plane.oxide.internal
|
| 711 | 2026-03-09T10:56:08.282Z | DEBG | test_update_status (BackgroundTasks): activating
background_task = dns_propagation_external
dns_group = external
iteration = 1
reason = Timeout
|
| 712 | 2026-03-09T10:56:08.282Z | WARN | test_update_status (BackgroundTasks): DNS propagation: skipped
background_task = dns_propagation_external
dns_group = external
reason = no config nor servers
|
| 713 | 2026-03-09T10:56:08.282Z | DEBG | test_update_status (BackgroundTasks): activation complete
background_task = dns_propagation_external
dns_group = external
elapsed = 52.392\u{b5}s
iteration = 1
status = {"error":"no config nor servers"}
|
| 714 | 2026-03-09T10:56:08.282Z | DEBG | test_update_status (BackgroundTasks): activating
background_task = metrics_producer_gc
iteration = 1
reason = Timeout
|
| 715 | 2026-03-09T10:56:08.283Z | INFO | test_update_status (BackgroundTasks): Metric producer GC running
background_task = metrics_producer_gc
expiration = 2026-03-09 10:46:08.282943039 UTC
|
| 716 | 2026-03-09T10:56:08.283Z | DEBG | test_update_status (BackgroundTasks): activating
background_task = instance_watcher
iteration = 1
reason = Timeout
|
| 717 | 2026-03-09T10:56:08.283Z | TRAC | test_update_status (BackgroundTasks): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = instance_watcher
resource = Fleet
|
| 718 | 2026-03-09T10:56:08.283Z | TRAC | test_update_status (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = instance_watcher
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 719 | 2026-03-09T10:56:08.283Z | TRAC | test_update_status (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = instance_watcher
resource = Database
|
| 720 | 2026-03-09T10:56:08.283Z | DEBG | test_update_status (BackgroundTasks): roles
background_task = instance_watcher
roles = RoleSet { roles: {} }
|
| 721 | 2026-03-09T10:56:08.283Z | TRAC | test_update_status (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = metrics_producer_gc
resource = Database
|
| 722 | 2026-03-09T10:56:08.283Z | DEBG | test_update_status (BackgroundTasks): roles
background_task = metrics_producer_gc
roles = RoleSet { roles: {} }
|
| 723 | 2026-03-09T10:56:08.283Z | DEBG | test_update_status (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = instance_watcher
resource = Database
result = Ok(())
|
| 724 | 2026-03-09T10:56:08.284Z | DEBG | test_update_status (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = metrics_producer_gc
resource = Database
result = Ok(())
|
| 725 | 2026-03-09T10:56:08.284Z | DEBG | test_update_status (BackgroundTasks): activating
background_task = lookup_region_port
iteration = 1
reason = Timeout
|
| 726 | 2026-03-09T10:56:08.284Z | TRAC | test_update_status (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = lookup_region_port
resource = Database
|
| 727 | 2026-03-09T10:56:08.284Z | DEBG | test_update_status (BackgroundTasks): roles
background_task = lookup_region_port
roles = RoleSet { roles: {} }
|
| 728 | 2026-03-09T10:56:08.285Z | DEBG | test_update_status (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = lookup_region_port
resource = Database
result = Ok(())
|
| 729 | 2026-03-09T10:56:08.285Z | DEBG | test_update_status (BackgroundTasks): activating
background_task = instance_reincarnation
iteration = 1
reason = Timeout
|
| 730 | 2026-03-09T10:56:08.286Z | TRAC | test_update_status (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = instance_reincarnation
resource = Database
|
| 731 | 2026-03-09T10:56:08.286Z | DEBG | test_update_status (BackgroundTasks): roles
background_task = instance_reincarnation
roles = RoleSet { roles: {} }
|
| 732 | 2026-03-09T10:56:08.286Z | DEBG | test_update_status (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = instance_reincarnation
resource = Database
result = Ok(())
|
| 733 | 2026-03-09T10:56:08.287Z | DEBG | test_update_status (BackgroundTasks): activating
background_task = service_firewall_rule_propagation
iteration = 1
reason = Timeout
|
| 734 | 2026-03-09T10:56:08.287Z | DEBG | test_update_status (service-firewall-rule-progator): starting background task for service firewall rule propagation
background_task = service_firewall_rule_propagation
|
| 735 | 2026-03-09T10:56:08.287Z | TRAC | test_update_status (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
|
| 736 | 2026-03-09T10:56:08.287Z | DEBG | test_update_status (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {} }
|
| 737 | 2026-03-09T10:56:08.287Z | DEBG | test_update_status (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
result = Ok(())
|
| 738 | 2026-03-09T10:56:08.289Z | DEBG | test_update_status (BackgroundTasks): activating
background_task = external_endpoints
iteration = 1
reason = Timeout
|
| 739 | 2026-03-09T10:56:08.289Z | TRAC | test_update_status (BackgroundTasks): authorize begin
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = external_endpoints
resource = Fleet
|
| 740 | 2026-03-09T10:56:08.289Z | TRAC | test_update_status (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = external_endpoints
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 741 | 2026-03-09T10:56:08.289Z | TRAC | test_update_status (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = external_endpoints
resource = Database
|
| 742 | 2026-03-09T10:56:08.289Z | DEBG | test_update_status (BackgroundTasks): roles
background_task = external_endpoints
roles = RoleSet { roles: {} }
|
| 743 | 2026-03-09T10:56:08.294Z | DEBG | test_update_status (init_with_steps): Running step start_dendrite_switch0
|
| 744 | 2026-03-09T10:56:08.294Z | DEBG | test_update_status: Starting Dendrite for switch0
|
| 745 | 2026-03-09T10:56:08.294Z | DEBG | test_update_status (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = external_endpoints
resource = Database
result = Ok(())
|
| 746 | 2026-03-09T10:56:08.299Z | DEBG | test_update_status (BackgroundTasks): activating
background_task = nat_garbage_collector
iteration = 1
reason = Timeout
|
| 747 | 2026-03-09T10:56:08.299Z | TRAC | test_update_status (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = nat_garbage_collector
resource = Database
|
| 748 | 2026-03-09T10:56:08.299Z | DEBG | test_update_status (BackgroundTasks): roles
background_task = nat_garbage_collector
roles = RoleSet { roles: {} }
|
| 749 | 2026-03-09T10:56:08.300Z | DEBG | test_update_status (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = nat_garbage_collector
resource = Database
result = Ok(())
|
| 750 | 2026-03-09T10:56:08.301Z | DEBG | test_update_status (BackgroundTasks): activating
background_task = vpc_route_manager
iteration = 1
reason = Timeout
|
| 751 | 2026-03-09T10:56:08.301Z | INFO | test_update_status (BackgroundTasks): VPC route manager running
background_task = vpc_route_manager
|
| 752 | 2026-03-09T10:56:08.301Z | TRAC | test_update_status (BackgroundTasks): authorize begin
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = vpc_route_manager
resource = Fleet
|
| 753 | 2026-03-09T10:56:08.301Z | TRAC | test_update_status (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = vpc_route_manager
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 754 | 2026-03-09T10:56:08.301Z | TRAC | test_update_status (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = vpc_route_manager
resource = Database
|
| 755 | 2026-03-09T10:56:08.301Z | DEBG | test_update_status (BackgroundTasks): roles
background_task = vpc_route_manager
roles = RoleSet { roles: {} }
|
| 756 | 2026-03-09T10:56:08.302Z | DEBG | test_update_status (BackgroundTasks): activating
background_task = bfd_manager
iteration = 1
reason = Timeout
|
| 757 | 2026-03-09T10:56:08.302Z | TRAC | test_update_status (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = bfd_manager
resource = Database
|
| 758 | 2026-03-09T10:56:08.302Z | DEBG | test_update_status (BackgroundTasks): roles
background_task = bfd_manager
roles = RoleSet { roles: {} }
|
| 759 | 2026-03-09T10:56:08.303Z | DEBG | test_update_status (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = vpc_route_manager
resource = Database
result = Ok(())
|
| 760 | 2026-03-09T10:56:08.303Z | DEBG | test_update_status (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = bfd_manager
resource = Database
result = Ok(())
|
| 761 | 2026-03-09T10:56:08.304Z | DEBG | test_update_status (BackgroundTasks): activating
background_task = abandoned_vmm_reaper
iteration = 1
reason = Timeout
|
| 762 | 2026-03-09T10:56:08.304Z | TRAC | test_update_status (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = abandoned_vmm_reaper
resource = Database
|
| 763 | 2026-03-09T10:56:08.304Z | DEBG | test_update_status (BackgroundTasks): roles
background_task = abandoned_vmm_reaper
roles = RoleSet { roles: {} }
|
| 764 | 2026-03-09T10:56:08.304Z | DEBG | test_update_status (BackgroundTasks): activating
background_task = phantom_disks
iteration = 1
reason = Timeout
|
| 765 | 2026-03-09T10:56:08.306Z | DEBG | test_update_status (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = abandoned_vmm_reaper
resource = Database
result = Ok(())
|
| 766 | 2026-03-09T10:56:08.307Z | DEBG | test_update_status (BackgroundTasks): activating
background_task = blueprint_executor
iteration = 1
reason = Timeout
|
| 767 | 2026-03-09T10:56:08.307Z | WARN | test_update_status (BackgroundTasks): Blueprint execution: skipped
background_task = blueprint_executor
reason = no blueprint
|
| 768 | 2026-03-09T10:56:08.308Z | DEBG | test_update_status (BackgroundTasks): activation complete
background_task = blueprint_executor
elapsed = 762.961\u{b5}s
iteration = 1
status = {"error":"no blueprint"}
|
| 769 | 2026-03-09T10:56:08.308Z | DEBG | test_update_status (BackgroundTasks): activating
background_task = inventory_collection
iteration = 1
reason = Timeout
|
| 770 | 2026-03-09T10:56:08.308Z | TRAC | test_update_status (BackgroundTasks): authorize begin
action = Modify
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = inventory_collection
resource = Inventory
|
| 771 | 2026-03-09T10:56:08.308Z | TRAC | test_update_status (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = inventory_collection
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 772 | 2026-03-09T10:56:08.309Z | TRAC | test_update_status (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = inventory_collection
resource = Database
|
| 773 | 2026-03-09T10:56:08.309Z | DEBG | test_update_status (BackgroundTasks): roles
background_task = inventory_collection
roles = RoleSet { roles: {} }
|
| 774 | 2026-03-09T10:56:08.309Z | DEBG | test_update_status (BackgroundTasks): activating
background_task = saga_recovery
iteration = 1
reason = Timeout
|
| 775 | 2026-03-09T10:56:08.310Z | INFO | test_update_status (SagaQuiesceHandle): saga recovery pass starting
|
| 776 | 2026-03-09T10:56:08.310Z | DEBG | test_update_status (SagaRecoverer): listing candidate sagas for recovery
|
| 777 | 2026-03-09T10:56:08.310Z | TRAC | test_update_status (SagaRecoverer): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000003a8a (built_in_user), .. })
resource = Database
|
| 778 | 2026-03-09T10:56:08.310Z | DEBG | test_update_status (SagaRecoverer): roles
roles = RoleSet { roles: {} }
|
| 779 | 2026-03-09T10:56:08.312Z | DEBG | test_update_status (SagaRecoverer): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000003a8a (built_in_user), .. })
resource = Database
result = Ok(())
|
| 780 | 2026-03-09T10:56:08.312Z | DEBG | test_update_status (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = inventory_collection
resource = Database
result = Ok(())
|
| 781 | 2026-03-09T10:56:08.313Z | DEBG | test_update_status (BackgroundTasks): activating
background_task = region_snapshot_replacement_start
iteration = 1
reason = Timeout
|
| 782 | 2026-03-09T10:56:08.313Z | TRAC | test_update_status (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = region_snapshot_replacement_start
resource = Database
|
| 783 | 2026-03-09T10:56:08.313Z | DEBG | test_update_status (BackgroundTasks): roles
background_task = region_snapshot_replacement_start
roles = RoleSet { roles: {} }
|
| 784 | 2026-03-09T10:56:08.313Z | DEBG | test_update_status (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = region_snapshot_replacement_start
resource = Database
result = Ok(())
|
| 785 | 2026-03-09T10:56:08.314Z | DEBG | test_update_status (BackgroundTasks): activating
background_task = region_snapshot_replacement_garbage_collection
iteration = 1
reason = Timeout
|
| 786 | 2026-03-09T10:56:08.314Z | TRAC | test_update_status (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = region_snapshot_replacement_garbage_collection
resource = Database
|
| 787 | 2026-03-09T10:56:08.314Z | DEBG | test_update_status (BackgroundTasks): roles
background_task = region_snapshot_replacement_garbage_collection
roles = RoleSet { roles: {} }
|
| 788 | 2026-03-09T10:56:08.315Z | DEBG | test_update_status (BackgroundTasks): activating
background_task = inventory_loader
iteration = 1
reason = Timeout
|
| 789 | 2026-03-09T10:56:08.315Z | DEBG | test_update_status (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = region_snapshot_replacement_garbage_collection
resource = Database
result = Ok(())
|
| 790 | 2026-03-09T10:56:08.315Z | TRAC | test_update_status (BackgroundTasks): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = inventory_loader
resource = Inventory
|
| 791 | 2026-03-09T10:56:08.315Z | TRAC | test_update_status (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = inventory_loader
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 792 | 2026-03-09T10:56:08.315Z | TRAC | test_update_status (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = inventory_loader
resource = Database
|
| 793 | 2026-03-09T10:56:08.315Z | DEBG | test_update_status (BackgroundTasks): roles
background_task = inventory_loader
roles = RoleSet { roles: {} }
|
| 794 | 2026-03-09T10:56:08.316Z | DEBG | test_update_status (BackgroundTasks): activating
background_task = tuf_artifact_replication
iteration = 1
reason = Timeout
|
| 795 | 2026-03-09T10:56:08.316Z | TRAC | test_update_status (BackgroundTasks): authorize begin
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = tuf_artifact_replication
resource = Fleet
|
| 796 | 2026-03-09T10:56:08.316Z | TRAC | test_update_status (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = tuf_artifact_replication
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 797 | 2026-03-09T10:56:08.316Z | TRAC | test_update_status (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = tuf_artifact_replication
resource = Database
|
| 798 | 2026-03-09T10:56:08.316Z | DEBG | test_update_status (BackgroundTasks): roles
background_task = tuf_artifact_replication
roles = RoleSet { roles: {} }
|
| 799 | 2026-03-09T10:56:08.316Z | DEBG | test_update_status (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = inventory_loader
resource = Database
result = Ok(())
|
| 800 | 2026-03-09T10:56:08.317Z | DEBG | test_update_status (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = tuf_artifact_replication
resource = Database
result = Ok(())
|
| 801 | 2026-03-09T10:56:08.317Z | DEBG | test_update_status (BackgroundTasks): activating
background_task = reconfigurator_config_watcher
iteration = 1
reason = Timeout
|
| 802 | 2026-03-09T10:56:08.317Z | TRAC | test_update_status (BackgroundTasks): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = reconfigurator_config_watcher
resource = BlueprintConfig
|
| 803 | 2026-03-09T10:56:08.317Z | TRAC | test_update_status (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = reconfigurator_config_watcher
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 804 | 2026-03-09T10:56:08.317Z | TRAC | test_update_status (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = reconfigurator_config_watcher
resource = Database
|
| 805 | 2026-03-09T10:56:08.317Z | DEBG | test_update_status (BackgroundTasks): roles
background_task = reconfigurator_config_watcher
roles = RoleSet { roles: {} }
|
| 806 | 2026-03-09T10:56:08.318Z | DEBG | test_update_status (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = reconfigurator_config_watcher
resource = Database
result = Ok(())
|
| 807 | 2026-03-09T10:56:08.318Z | DEBG | test_update_status (BackgroundTasks): activating
background_task = blueprint_planner
iteration = 1
reason = Timeout
|
| 808 | 2026-03-09T10:56:08.319Z | DEBG | test_update_status (BackgroundTasks): reconfigurator config not yet loaded; doing nothing
background_task = blueprint_planner
|
| 809 | 2026-03-09T10:56:08.319Z | DEBG | test_update_status (BackgroundTasks): activation complete
background_task = blueprint_planner
elapsed = 106.863\u{b5}s
iteration = 1
status = "Disabled"
|
| 810 | 2026-03-09T10:56:08.319Z | DEBG | test_update_status (BackgroundTasks): activating
background_task = sp_ereport_ingester
iteration = 1
reason = Timeout
|
| 811 | 2026-03-09T10:56:08.319Z | TRAC | test_update_status (DnsResolver): lookup_all_socket_v6 srv
dns_name = _mgs._tcp.control-plane.oxide.internal
|
| 812 | 2026-03-09T10:56:08.319Z | DEBG | test_update_status (BackgroundTasks): activating
background_task = region_snapshot_replacement_finish
iteration = 1
reason = Timeout
|
| 813 | 2026-03-09T10:56:08.319Z | TRAC | test_update_status (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = region_snapshot_replacement_finish
resource = Database
|
| 814 | 2026-03-09T10:56:08.319Z | DEBG | test_update_status (BackgroundTasks): roles
background_task = region_snapshot_replacement_finish
roles = RoleSet { roles: {} }
|
| 815 | 2026-03-09T10:56:08.319Z | DEBG | test_update_status (BackgroundTasks): activating
background_task = fm_sitrep_loader
iteration = 1
reason = Timeout
|
| 816 | 2026-03-09T10:56:08.319Z | TRAC | test_update_status (BackgroundTasks): authorize begin
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = fm_sitrep_loader
resource = Fleet
|
| 817 | 2026-03-09T10:56:08.319Z | TRAC | test_update_status (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = fm_sitrep_loader
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 818 | 2026-03-09T10:56:08.319Z | TRAC | test_update_status (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = fm_sitrep_loader
resource = Database
|
| 819 | 2026-03-09T10:56:08.319Z | DEBG | test_update_status (BackgroundTasks): roles
background_task = fm_sitrep_loader
roles = RoleSet { roles: {} }
|
| 820 | 2026-03-09T10:56:08.320Z | DEBG | test_update_status (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = fm_sitrep_loader
resource = Database
result = Ok(())
|
| 821 | 2026-03-09T10:56:08.321Z | DEBG | test_update_status (BackgroundTasks): activating
background_task = fm_sitrep_gc
iteration = 1
reason = Timeout
|
| 822 | 2026-03-09T10:56:08.321Z | TRAC | test_update_status (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = fm_sitrep_gc
resource = Database
|
| 823 | 2026-03-09T10:56:08.321Z | DEBG | test_update_status (BackgroundTasks): roles
background_task = fm_sitrep_gc
roles = RoleSet { roles: {} }
|
| 824 | 2026-03-09T10:56:08.321Z | DEBG | test_update_status (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = region_snapshot_replacement_finish
resource = Database
result = Ok(())
|
| 825 | 2026-03-09T10:56:08.321Z | DEBG | test_update_status (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = fm_sitrep_gc
resource = Database
result = Ok(())
|
| 826 | 2026-03-09T10:56:08.321Z | TRAC | test_update_status (BackgroundTasks): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = dns_config_internal
dns_group = internal
resource = DnsConfig
|
| 827 | 2026-03-09T10:56:08.321Z | TRAC | test_update_status (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = dns_config_internal
dns_group = internal
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 828 | 2026-03-09T10:56:08.321Z | TRAC | test_update_status (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = dns_config_internal
dns_group = internal
resource = Database
|
| 829 | 2026-03-09T10:56:08.321Z | DEBG | test_update_status (BackgroundTasks): roles
background_task = dns_config_internal
dns_group = internal
roles = RoleSet { roles: {} }
|
| 830 | 2026-03-09T10:56:08.322Z | DEBG | test_update_status (BackgroundTasks): activating
background_task = probe_distributor
iteration = 1
reason = Timeout
|
| 831 | 2026-03-09T10:56:08.322Z | INFO | test_update_status (BackgroundTasks): distributing networking probes to sleds
background_task = probe_distributor
|
| 832 | 2026-03-09T10:56:08.322Z | TRAC | test_update_status (BackgroundTasks): authorize begin
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = probe_distributor
resource = Fleet
|
| 833 | 2026-03-09T10:56:08.322Z | TRAC | test_update_status (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = probe_distributor
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 834 | 2026-03-09T10:56:08.322Z | TRAC | test_update_status (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = probe_distributor
resource = Database
|
| 835 | 2026-03-09T10:56:08.322Z | DEBG | test_update_status (BackgroundTasks): roles
background_task = probe_distributor
roles = RoleSet { roles: {} }
|
| 836 | 2026-03-09T10:56:08.322Z | DEBG | test_update_status (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = dns_config_internal
dns_group = internal
resource = Database
result = Ok(())
|
| 837 | 2026-03-09T10:56:08.322Z | DEBG | test_update_status (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = probe_distributor
resource = Database
result = Ok(())
|
| 838 | 2026-03-09T10:56:08.322Z | DEBG | test_update_status (BackgroundTasks): activating
background_task = tuf_repo_pruner
iteration = 1
reason = Timeout
|
| 839 | 2026-03-09T10:56:08.322Z | INFO | test_update_status (BackgroundTasks): reconfigurator config not yet loaded; doing nothing
background_task = tuf_repo_pruner
|
| 840 | 2026-03-09T10:56:08.322Z | DEBG | test_update_status (BackgroundTasks): activation complete
background_task = tuf_repo_pruner
elapsed = 64.22\u{b5}s
iteration = 1
status = {"reason":"reconfigurator config not yet loaded","status":"disabled"}
|
| 841 | 2026-03-09T10:56:08.322Z | DEBG | test_update_status (BackgroundTasks): roles
background_task = blueprint_loader
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 842 | 2026-03-09T10:56:08.337Z | TRAC | test_update_status (BackgroundTasks): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = dns_config_external
dns_group = external
resource = DnsConfig
|
| 843 | 2026-03-09T10:56:08.337Z | TRAC | test_update_status (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = dns_config_external
dns_group = external
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 844 | 2026-03-09T10:56:08.337Z | TRAC | test_update_status (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = dns_config_external
dns_group = external
resource = Database
|
| 845 | 2026-03-09T10:56:08.338Z | DEBG | test_update_status (BackgroundTasks): roles
background_task = dns_config_external
dns_group = external
roles = RoleSet { roles: {} }
|
| 846 | 2026-03-09T10:56:08.361Z | DEBG | test_update_status (BackgroundTasks): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = blueprint_loader
resource = BlueprintConfig
result = Ok(())
|
| 847 | 2026-03-09T10:56:08.361Z | TRAC | test_update_status (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = blueprint_loader
resource = Database
|
| 848 | 2026-03-09T10:56:08.361Z | DEBG | test_update_status (BackgroundTasks): roles
background_task = blueprint_loader
roles = RoleSet { roles: {} }
|
| 849 | 2026-03-09T10:56:08.361Z | DEBG | test_update_status (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = blueprint_loader
resource = Database
result = Ok(())
|
| 850 | 2026-03-09T10:56:08.362Z | DEBG | test_update_status (BackgroundTasks): activating
background_task = read_only_region_replacement_start
iteration = 1
reason = Timeout
|
| 851 | 2026-03-09T10:56:08.362Z | TRAC | test_update_status (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = read_only_region_replacement_start
resource = Database
|
| 852 | 2026-03-09T10:56:08.362Z | DEBG | test_update_status (BackgroundTasks): roles
background_task = read_only_region_replacement_start
roles = RoleSet { roles: {} }
|
| 853 | 2026-03-09T10:56:08.362Z | DEBG | test_update_status (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = read_only_region_replacement_start
resource = Database
result = Ok(())
|
| 854 | 2026-03-09T10:56:08.363Z | DEBG | test_update_status (BackgroundTasks): activating
background_task = attached_subnet_manager
iteration = 1
reason = Timeout
|
| 855 | 2026-03-09T10:56:08.363Z | INFO | test_update_status (BackgroundTasks): starting attached subnet manager work
background_task = attached_subnet_manager
|
| 856 | 2026-03-09T10:56:08.363Z | TRAC | test_update_status (DnsResolver): lookup_all_socket_v6 srv
dns_name = _dendrite._tcp.control-plane.oxide.internal
|
| 857 | 2026-03-09T10:56:08.363Z | DEBG | test_update_status (BackgroundTasks): activating
background_task = alert_dispatcher
iteration = 1
reason = Timeout
|
| 858 | 2026-03-09T10:56:08.363Z | TRAC | test_update_status (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = alert_dispatcher
resource = Database
|
| 859 | 2026-03-09T10:56:08.363Z | DEBG | test_update_status (BackgroundTasks): roles
background_task = alert_dispatcher
roles = RoleSet { roles: {} }
|
| 860 | 2026-03-09T10:56:08.366Z | DEBG | test_update_status (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = alert_dispatcher
resource = Database
result = Ok(())
|
| 861 | 2026-03-09T10:56:08.367Z | DEBG | test_update_status (BackgroundTasks): activating
background_task = webhook_deliverator
iteration = 1
reason = Timeout
|
| 862 | 2026-03-09T10:56:08.367Z | TRAC | test_update_status (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = webhook_deliverator
resource = Database
|
| 863 | 2026-03-09T10:56:08.367Z | DEBG | test_update_status (BackgroundTasks): roles
background_task = webhook_deliverator
roles = RoleSet { roles: {} }
|
| 864 | 2026-03-09T10:56:08.367Z | DEBG | test_update_status (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = webhook_deliverator
resource = Database
result = Ok(())
|
| 865 | 2026-03-09T10:56:08.367Z | DEBG | test_update_status (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = dns_config_external
dns_group = external
resource = Database
result = Ok(())
|
| 866 | 2026-03-09T10:56:08.367Z | DEBG | test_update_status (BackgroundTasks): activating
background_task = multicast_reconciler
iteration = 1
reason = Timeout
|
| 867 | 2026-03-09T10:56:08.368Z | TRAC | test_update_status (BackgroundTasks): multicast group reconciler activating
background_task = multicast_reconciler
|
| 868 | 2026-03-09T10:56:08.369Z | TRAC | test_update_status (BackgroundTasks): starting multicast reconciliation pass
background_task = multicast_reconciler
|
| 869 | 2026-03-09T10:56:08.369Z | DEBG | test_update_status (BackgroundTasks): skipping cache invalidation check: no inventory available
background_task = multicast_reconciler
|
| 870 | 2026-03-09T10:56:08.369Z | TRAC | test_update_status (DnsResolver): lookup_all_socket_v6 srv
dns_name = _dendrite._tcp.control-plane.oxide.internal
|
| 871 | 2026-03-09T10:56:08.370Z | DEBG | test_update_status (init_with_steps): Running step start_mgd_switch0
|
| 872 | 2026-03-09T10:56:08.370Z | DEBG | test_update_status: Starting mgd for switch0
|
| 873 | 2026-03-09T10:56:08.392Z | TRAC | test_update_status (dns): buffer
buffer = Length: 72 (0x48) bytes\n0000: d1 a0 01 00 00 01 00 00 00 00 00 01 09 5f 64 65 ............._de\n0010: 6e 64 72 69 74 65 04 5f 74 63 70 0d 63 6f 6e 74 ndrite._tcp.cont\n0020: 72 6f 6c 2d 70 6c 61 6e 65 05 6f 78 69 64 65 08 rol-plane.oxide.\n0030: 69 6e 74 65 72 6e 61 6c 00 00 21 00 01 00 00 29 internal..!....)\n0040: 04 d0 00 00 00 00 00 00 ........
kind = dns
peer_addr = [::1]:47214
req_id = 7c2ad7d0-79a1-4415-bc29-33bcbadb7eb7
|
| 874 | 2026-03-09T10:56:08.392Z | DEBG | test_update_status (dns): message_request
kind = dns
mr = MessageRequest {\n header: Header {\n id: 53664,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n queries: Queries {\n queries: [\n LowerQuery {\n name: LowerName(\n Name("_dendrite._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_dendrite._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n ],\n original: [\n 9,\n 95,\n 100,\n 101,\n 110,\n 100,\n 114,\n 105,\n 116,\n 101,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n flags: EdnsFlags {\n dnssec_ok: false,\n z: 0,\n },\n max_payload: 1232,\n options: OPT {\n options: [],\n },\n },\n ),\n}
peer_addr = [::1]:47214
req_id = 7c2ad7d0-79a1-4415-bc29-33bcbadb7eb7
|
| 875 | 2026-03-09T10:56:08.394Z | ERRO | test_update_status (dns): failed to handle incoming DNS message: MessageRequest {
header: Header {
id: 53664,
message_type: Query,
op_code: Query,
authoritative: false,
truncation: false,
recursion_desired: true,
recursion_available: false,
authentic_data: false,
checking_disabled: false,
response_code: NoError,
query_count: 1,
answer_count: 0,
name_server_count: 0,
additional_count: 1,
},
queries: Queries {
queries: [
LowerQuery {
name: LowerName(
Name("_dendrite._tcp.control-plane.oxide.internal."),
),
original: Query {
name: Name("_dendrite._tcp.control-plane.oxide.internal."),
query_type: SRV,
query_class: IN,
},
},
],
original: [
9,
95,
100,
101,
110,
100,
114,
105,
116,
101,
4,
95,
116,
99,
112,
13,
99,
111,
110,
116,
114,
111,
108,
45,
112,
108,
97,
110,
101,
5,
111,
120,
105,
100,
101,
8,
105,
110,
116,
101,
114,
110,
97,
108,
0,
0,
33,
0,
1,
],
},
answers: [],
name_servers: [],
additionals: [],
sig0: [],
edns: Some(
Edns {
rcode_high: 0,
version: 0,
flags: EdnsFlags {
dnssec_ok: false,
z: 0,
},
max_payload: 1232,
options: OPT {
options: [],
},
},
),
} SERVFAIL: server is not authoritative for name: "_dendrite._tcp.control-plane.oxide.internal."
kind = dns
peer_addr = [::1]:47214
req_id = 7c2ad7d0-79a1-4415-bc29-33bcbadb7eb7
|
| 876 | 2026-03-09T10:56:08.418Z | DEBG | test_update_status (BackgroundTasks): roles
background_task = support_bundle_collector
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 877 | 2026-03-09T10:56:08.424Z | DEBG | test_update_status (BackgroundTasks): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = support_bundle_collector
resource = Fleet
result = Ok(())
|
| 878 | 2026-03-09T10:56:08.424Z | TRAC | test_update_status (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = support_bundle_collector
resource = Database
|
| 879 | 2026-03-09T10:56:08.424Z | DEBG | test_update_status (BackgroundTasks): roles
background_task = support_bundle_collector
roles = RoleSet { roles: {} }
|
| 880 | 2026-03-09T10:56:08.425Z | DEBG | test_update_status (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = support_bundle_collector
resource = Database
result = Ok(())
|
| 881 | 2026-03-09T10:56:08.427Z | DEBG | test_update_status (BackgroundTasks): roles
background_task = trust_quorum_manager
bgtask = TrustQuorumManager
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 882 | 2026-03-09T10:56:08.428Z | TRAC | test_update_status (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = region_snapshot_replacement_step
resource = Database
|
| 883 | 2026-03-09T10:56:08.428Z | DEBG | test_update_status (BackgroundTasks): roles
background_task = region_snapshot_replacement_step
roles = RoleSet { roles: {} }
|
| 884 | 2026-03-09T10:56:08.429Z | DEBG | test_update_status (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = region_snapshot_replacement_step
resource = Database
result = Ok(())
|
| 885 | 2026-03-09T10:56:08.430Z | DEBG | test_update_status (BackgroundTasks): roles
background_task = switch_port_config_manager
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 886 | 2026-03-09T10:56:08.432Z | DEBG | test_update_status (BackgroundTasks): authorize result
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = trust_quorum_manager
bgtask = TrustQuorumManager
resource = Fleet
result = Ok(())
|
| 887 | 2026-03-09T10:56:08.432Z | TRAC | test_update_status (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = trust_quorum_manager
bgtask = TrustQuorumManager
resource = Database
|
| 888 | 2026-03-09T10:56:08.432Z | DEBG | test_update_status (BackgroundTasks): roles
background_task = trust_quorum_manager
bgtask = TrustQuorumManager
roles = RoleSet { roles: {} }
|
| 889 | 2026-03-09T10:56:08.432Z | DEBG | test_update_status (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = trust_quorum_manager
bgtask = TrustQuorumManager
resource = Database
result = Ok(())
|
| 890 | 2026-03-09T10:56:08.433Z | INFO | test_update_status (BackgroundTasks): Metric producer GC complete (no errors)
background_task = metrics_producer_gc
expiration = 2026-03-09 10:46:08.282943039 UTC
pruned = {}
|
| 891 | 2026-03-09T10:56:08.433Z | DEBG | test_update_status (BackgroundTasks): activation complete
background_task = metrics_producer_gc
elapsed = 150.880679ms
iteration = 1
status = {"expiration":"2026-03-09T10:46:08.282943039Z","pruned":[]}
|
| 892 | 2026-03-09T10:56:08.433Z | TRAC | test_update_status (dns): buffer
buffer = Length: 67 (0x43) bytes\n0000: 54 7e 01 00 00 01 00 00 00 00 00 01 04 5f 6d 67 T~..........._mg\n0010: 73 04 5f 74 63 70 0d 63 6f 6e 74 72 6f 6c 2d 70 s._tcp.control-p\n0020: 6c 61 6e 65 05 6f 78 69 64 65 08 69 6e 74 65 72 lane.oxide.inter\n0030: 6e 61 6c 00 00 21 00 01 00 00 29 04 d0 00 00 00 nal..!....).....\n0040: 00 00 00 ...
kind = dns
peer_addr = [::1]:4098
req_id = f82e2f50-c60a-4afc-923f-398698229a19
|
| 893 | 2026-03-09T10:56:08.433Z | DEBG | test_update_status (dns): message_request
kind = dns
mr = MessageRequest {\n header: Header {\n id: 21630,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n queries: Queries {\n queries: [\n LowerQuery {\n name: LowerName(\n Name("_mgs._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_mgs._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n ],\n original: [\n 4,\n 95,\n 109,\n 103,\n 115,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n flags: EdnsFlags {\n dnssec_ok: false,\n z: 0,\n },\n max_payload: 1232,\n options: OPT {\n options: [],\n },\n },\n ),\n}
peer_addr = [::1]:4098
req_id = f82e2f50-c60a-4afc-923f-398698229a19
|
| 894 | 2026-03-09T10:56:08.434Z | DEBG | test_update_status (BackgroundTasks): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = switch_port_config_manager
resource = Fleet
result = Ok(())
|
| 895 | 2026-03-09T10:56:08.434Z | TRAC | test_update_status (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = switch_port_config_manager
resource = Database
|
| 896 | 2026-03-09T10:56:08.434Z | DEBG | test_update_status (BackgroundTasks): roles
background_task = switch_port_config_manager
roles = RoleSet { roles: {} }
|
| 897 | 2026-03-09T10:56:08.434Z | ERRO | test_update_status (dns): failed to handle incoming DNS message: MessageRequest {
header: Header {
id: 21630,
message_type: Query,
op_code: Query,
authoritative: false,
truncation: false,
recursion_desired: true,
recursion_available: false,
authentic_data: false,
checking_disabled: false,
response_code: NoError,
query_count: 1,
answer_count: 0,
name_server_count: 0,
additional_count: 1,
},
queries: Queries {
queries: [
LowerQuery {
name: LowerName(
Name("_mgs._tcp.control-plane.oxide.internal."),
),
original: Query {
name: Name("_mgs._tcp.control-plane.oxide.internal."),
query_type: SRV,
query_class: IN,
},
},
],
original: [
4,
95,
109,
103,
115,
4,
95,
116,
99,
112,
13,
99,
111,
110,
116,
114,
111,
108,
45,
112,
108,
97,
110,
101,
5,
111,
120,
105,
100,
101,
8,
105,
110,
116,
101,
114,
110,
97,
108,
0,
0,
33,
0,
1,
],
},
answers: [],
name_servers: [],
additionals: [],
sig0: [],
edns: Some(
Edns {
rcode_high: 0,
version: 0,
flags: EdnsFlags {
dnssec_ok: false,
z: 0,
},
max_payload: 1232,
options: OPT {
options: [],
},
},
),
} SERVFAIL: server is not authoritative for name: "_mgs._tcp.control-plane.oxide.internal."
kind = dns
peer_addr = [::1]:4098
req_id = f82e2f50-c60a-4afc-923f-398698229a19
|
| 898 | 2026-03-09T10:56:08.434Z | TRAC | test_update_status (dns): buffer
buffer = Length: 75 (0x4b) bytes\n0000: 55 c8 01 00 00 01 00 00 00 00 00 01 0c 5f 6e 61 U............_na\n0010: 6d 65 73 65 72 76 69 63 65 04 5f 74 63 70 0d 63 meservice._tcp.c\n0020: 6f 6e 74 72 6f 6c 2d 70 6c 61 6e 65 05 6f 78 69 ontrol-plane.oxi\n0030: 64 65 08 69 6e 74 65 72 6e 61 6c 00 00 21 00 01 de.internal..!..\n0040: 00 00 29 04 d0 00 00 00 00 00 00 ..)........
kind = dns
peer_addr = [::1]:30589
req_id = a3d60b84-be28-4a12-a72a-e9d6715a7aeb
|
| 899 | 2026-03-09T10:56:08.434Z | DEBG | test_update_status (dns): message_request
kind = dns
mr = MessageRequest {\n header: Header {\n id: 21960,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n queries: Queries {\n queries: [\n LowerQuery {\n name: LowerName(\n Name("_nameservice._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_nameservice._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n ],\n original: [\n 12,\n 95,\n 110,\n 97,\n 109,\n 101,\n 115,\n 101,\n 114,\n 118,\n 105,\n 99,\n 101,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n flags: EdnsFlags {\n dnssec_ok: false,\n z: 0,\n },\n max_payload: 1232,\n options: OPT {\n options: [],\n },\n },\n ),\n}
peer_addr = [::1]:30589
req_id = a3d60b84-be28-4a12-a72a-e9d6715a7aeb
|
| 900 | 2026-03-09T10:56:08.434Z | DEBG | test_update_status (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = switch_port_config_manager
resource = Database
result = Ok(())
|
| 901 | 2026-03-09T10:56:08.434Z | ERRO | test_update_status (dns): failed to handle incoming DNS message: MessageRequest {
header: Header {
id: 21960,
message_type: Query,
op_code: Query,
authoritative: false,
truncation: false,
recursion_desired: true,
recursion_available: false,
authentic_data: false,
checking_disabled: false,
response_code: NoError,
query_count: 1,
answer_count: 0,
name_server_count: 0,
additional_count: 1,
},
queries: Queries {
queries: [
LowerQuery {
name: LowerName(
Name("_nameservice._tcp.control-plane.oxide.internal."),
),
original: Query {
name: Name("_nameservice._tcp.control-plane.oxide.internal."),
query_type: SRV,
query_class: IN,
},
},
],
original: [
12,
95,
110,
97,
109,
101,
115,
101,
114,
118,
105,
99,
101,
4,
95,
116,
99,
112,
13,
99,
111,
110,
116,
114,
111,
108,
45,
112,
108,
97,
110,
101,
5,
111,
120,
105,
100,
101,
8,
105,
110,
116,
101,
114,
110,
97,
108,
0,
0,
33,
0,
1,
],
},
answers: [],
name_servers: [],
additionals: [],
sig0: [],
edns: Some(
Edns {
rcode_high: 0,
version: 0,
flags: EdnsFlags {
dnssec_ok: false,
z: 0,
},
max_payload: 1232,
options: OPT {
options: [],
},
},
),
} SERVFAIL: server is not authoritative for name: "_nameservice._tcp.control-plane.oxide.internal."
kind = dns
peer_addr = [::1]:30589
req_id = a3d60b84-be28-4a12-a72a-e9d6715a7aeb
|
| 902 | 2026-03-09T10:56:08.434Z | TRAC | test_update_status (dns): buffer
buffer = Length: 76 (0x4c) bytes\n0000: 5e fb 01 00 00 01 00 00 00 00 00 01 0d 5f 65 78 ^............_ex\n0010: 74 65 72 6e 61 6c 2d 64 6e 73 04 5f 74 63 70 0d ternal-dns._tcp.\n0020: 63 6f 6e 74 72 6f 6c 2d 70 6c 61 6e 65 05 6f 78 control-plane.ox\n0030: 69 64 65 08 69 6e 74 65 72 6e 61 6c 00 00 21 00 ide.internal..!.\n0040: 01 00 00 29 04 d0 00 00 00 00 00 00 ...)........
kind = dns
peer_addr = [::1]:23372
req_id = 40d0b523-4d91-4d2d-822f-f29403aecac4
|
| 903 | 2026-03-09T10:56:08.434Z | DEBG | test_update_status (dns): message_request
kind = dns
mr = MessageRequest {\n header: Header {\n id: 24315,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n queries: Queries {\n queries: [\n LowerQuery {\n name: LowerName(\n Name("_external-dns._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_external-dns._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n ],\n original: [\n 13,\n 95,\n 101,\n 120,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 45,\n 100,\n 110,\n 115,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n flags: EdnsFlags {\n dnssec_ok: false,\n z: 0,\n },\n max_payload: 1232,\n options: OPT {\n options: [],\n },\n },\n ),\n}
peer_addr = [::1]:23372
req_id = 40d0b523-4d91-4d2d-822f-f29403aecac4
|
| 904 | 2026-03-09T10:56:08.435Z | DEBG | test_update_status (BackgroundTasks): activation complete
background_task = lookup_region_port
elapsed = 150.887618ms
iteration = 1
status = {"errors":[],"found_port_ok":[]}
|
| 905 | 2026-03-09T10:56:08.436Z | ERRO | test_update_status (dns): failed to handle incoming DNS message: MessageRequest {
header: Header {
id: 24315,
message_type: Query,
op_code: Query,
authoritative: false,
truncation: false,
recursion_desired: true,
recursion_available: false,
authentic_data: false,
checking_disabled: false,
response_code: NoError,
query_count: 1,
answer_count: 0,
name_server_count: 0,
additional_count: 1,
},
queries: Queries {
queries: [
LowerQuery {
name: LowerName(
Name("_external-dns._tcp.control-plane.oxide.internal."),
),
original: Query {
name: Name("_external-dns._tcp.control-plane.oxide.internal."),
query_type: SRV,
query_class: IN,
},
},
],
original: [
13,
95,
101,
120,
116,
101,
114,
110,
97,
108,
45,
100,
110,
115,
4,
95,
116,
99,
112,
13,
99,
111,
110,
116,
114,
111,
108,
45,
112,
108,
97,
110,
101,
5,
111,
120,
105,
100,
101,
8,
105,
110,
116,
101,
114,
110,
97,
108,
0,
0,
33,
0,
1,
],
},
answers: [],
name_servers: [],
additionals: [],
sig0: [],
edns: Some(
Edns {
rcode_high: 0,
version: 0,
flags: EdnsFlags {
dnssec_ok: false,
z: 0,
},
max_payload: 1232,
options: OPT {
options: [],
},
},
),
} SERVFAIL: server is not authoritative for name: "_external-dns._tcp.control-plane.oxide.internal."
kind = dns
peer_addr = [::1]:23372
req_id = 40d0b523-4d91-4d2d-822f-f29403aecac4
|
| 906 | 2026-03-09T10:56:08.436Z | TRAC | test_update_status (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
|
| 907 | 2026-03-09T10:56:08.436Z | DEBG | test_update_status (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {} }
|
| 908 | 2026-03-09T10:56:08.436Z | DEBG | test_update_status (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
result = Ok(())
|
| 909 | 2026-03-09T10:56:08.444Z | TRAC | test_update_status (dns): buffer
buffer = Length: 72 (0x48) bytes\n0000: 3c e7 01 00 00 01 00 00 00 00 00 01 09 5f 64 65 <............_de\n0010: 6e 64 72 69 74 65 04 5f 74 63 70 0d 63 6f 6e 74 ndrite._tcp.cont\n0020: 72 6f 6c 2d 70 6c 61 6e 65 05 6f 78 69 64 65 08 rol-plane.oxide.\n0030: 69 6e 74 65 72 6e 61 6c 00 00 21 00 01 00 00 29 internal..!....)\n0040: 04 d0 00 00 00 00 00 00 ........
kind = dns
peer_addr = [::1]:2512
req_id = 25215cb3-2f7e-49f2-ad6a-d56d1cde4e4d
|
| 910 | 2026-03-09T10:56:08.444Z | DEBG | test_update_status (dns): message_request
kind = dns
mr = MessageRequest {\n header: Header {\n id: 15591,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n queries: Queries {\n queries: [\n LowerQuery {\n name: LowerName(\n Name("_dendrite._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_dendrite._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n ],\n original: [\n 9,\n 95,\n 100,\n 101,\n 110,\n 100,\n 114,\n 105,\n 116,\n 101,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n flags: EdnsFlags {\n dnssec_ok: false,\n z: 0,\n },\n max_payload: 1232,\n options: OPT {\n options: [],\n },\n },\n ),\n}
peer_addr = [::1]:2512
req_id = 25215cb3-2f7e-49f2-ad6a-d56d1cde4e4d
|
| 911 | 2026-03-09T10:56:08.445Z | ERRO | test_update_status (dns): failed to handle incoming DNS message: MessageRequest {
header: Header {
id: 15591,
message_type: Query,
op_code: Query,
authoritative: false,
truncation: false,
recursion_desired: true,
recursion_available: false,
authentic_data: false,
checking_disabled: false,
response_code: NoError,
query_count: 1,
answer_count: 0,
name_server_count: 0,
additional_count: 1,
},
queries: Queries {
queries: [
LowerQuery {
name: LowerName(
Name("_dendrite._tcp.control-plane.oxide.internal."),
),
original: Query {
name: Name("_dendrite._tcp.control-plane.oxide.internal."),
query_type: SRV,
query_class: IN,
},
},
],
original: [
9,
95,
100,
101,
110,
100,
114,
105,
116,
101,
4,
95,
116,
99,
112,
13,
99,
111,
110,
116,
114,
111,
108,
45,
112,
108,
97,
110,
101,
5,
111,
120,
105,
100,
101,
8,
105,
110,
116,
101,
114,
110,
97,
108,
0,
0,
33,
0,
1,
],
},
answers: [],
name_servers: [],
additionals: [],
sig0: [],
edns: Some(
Edns {
rcode_high: 0,
version: 0,
flags: EdnsFlags {
dnssec_ok: false,
z: 0,
},
max_payload: 1232,
options: OPT {
options: [],
},
},
),
} SERVFAIL: server is not authoritative for name: "_dendrite._tcp.control-plane.oxide.internal."
kind = dns
peer_addr = [::1]:2512
req_id = 25215cb3-2f7e-49f2-ad6a-d56d1cde4e4d
|
| 912 | 2026-03-09T10:56:08.445Z | TRAC | test_update_status (DnsResolver): lookup_all_socket_v6 srv
dns_name = _dendrite._tcp.control-plane.oxide.internal
|
| 913 | 2026-03-09T10:56:08.446Z | ERRO | test_update_status (BackgroundTasks): failed to resolve addresses for Dendrite services
background_task = attached_subnet_manager
error = proto error: no records found for Query { name: Name("_dendrite._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN }
|
| 914 | 2026-03-09T10:56:08.446Z | ERRO | test_update_status (BackgroundTasks): failed to lookup Dendrite clients, will not be able to forward attachments to Dendrite
background_task = attached_subnet_manager
error = proto error: no records found for Query { name: Name("_dendrite._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN }
|
| 915 | 2026-03-09T10:56:08.446Z | TRAC | test_update_status (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = attached_subnet_manager
resource = Database
|
| 916 | 2026-03-09T10:56:08.446Z | DEBG | test_update_status (BackgroundTasks): roles
background_task = attached_subnet_manager
roles = RoleSet { roles: {} }
|
| 917 | 2026-03-09T10:56:08.446Z | WARN | test_update_status (BackgroundTasks): failed to lookup DNS servers
background_task = dns_servers_external
dns_group = external
error = proto error: no records found for Query { name: Name("_external-dns._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN }
|
| 918 | 2026-03-09T10:56:08.446Z | DEBG | test_update_status (BackgroundTasks): activation complete
background_task = dns_servers_external
dns_group = external
elapsed = 164.788249ms
iteration = 1
status = {"error":"failed to read list of DNS servers: proto error: no records found for Query { name: Name(\\"_external-dns._tcp.control-plane.oxide.internal.\\"), query_type: SRV, query_class: IN }"}
|
| 919 | 2026-03-09T10:56:08.446Z | WARN | test_update_status (BackgroundTasks): failed to lookup DNS servers
background_task = dns_servers_internal
dns_group = internal
error = proto error: no records found for Query { name: Name("_nameservice._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN }
|
| 920 | 2026-03-09T10:56:08.446Z | DEBG | test_update_status (BackgroundTasks): activation complete
background_task = dns_servers_internal
dns_group = internal
elapsed = 174.298705ms
iteration = 1
status = {"error":"failed to read list of DNS servers: proto error: no records found for Query { name: Name(\\"_nameservice._tcp.control-plane.oxide.internal.\\"), query_type: SRV, query_class: IN }"}
|
| 921 | 2026-03-09T10:56:08.446Z | DEBG | test_update_status (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = attached_subnet_manager
resource = Database
result = Ok(())
|
| 922 | 2026-03-09T10:56:08.447Z | ERRO | test_update_status (BackgroundTasks): failed to resolve MGS addresses
background_task = sp_ereport_ingester
error = Resolve(ResolveError { kind: Proto(ProtoError { kind: NoRecordsFound { query: Query { name: Name("_mgs._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN }, soa: None, ns: None, negative_ttl: None, response_code: ServFail, trusted: true, authorities: None } }) })
|
| 923 | 2026-03-09T10:56:08.447Z | DEBG | test_update_status (BackgroundTasks): activation complete
background_task = sp_ereport_ingester
elapsed = 128.228964ms
iteration = 1
status = {"disabled":false,"errors":["failed to resolve MGS addresses: proto error: no records found for Query { name: Name(\\"_mgs._tcp.control-plane.oxide.internal.\\"), query_type: SRV, query_class: IN }"],"sps":[]}
|
| 924 | 2026-03-09T10:56:08.449Z | ERRO | test_update_status (BackgroundTasks): failed to resolve addresses for Dendrite services
background_task = multicast_reconciler
error = proto error: no records found for Query { name: Name("_dendrite._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN }
|
| 925 | 2026-03-09T10:56:08.449Z | ERRO | test_update_status (BackgroundTasks): failed to build DPD clients
background_task = multicast_reconciler
error = proto error: no records found for Query { name: Name("_dendrite._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN }
|
| 926 | 2026-03-09T10:56:08.449Z | ERRO | test_update_status (BackgroundTasks): multicast RPW reconciliation pass completed with dataplane inconsistencies
active_groups_verified = 0
background_task = multicast_reconciler
dataplane_error_count = 1
external_groups_created = 0
external_groups_deleted = 0
member_state_transitions = 0
orphaned_members_cleaned = 0
|
| 927 | 2026-03-09T10:56:08.449Z | DEBG | test_update_status (BackgroundTasks): activation complete
background_task = multicast_reconciler
elapsed = 81.684735ms
iteration = 1
status = {"disabled":false,"empty_groups_marked":0,"errors":["failed to create multicast dataplane client: Internal Error: failed to build DPD clients"],"groups_created":0,"groups_deleted":0,"groups_verified":0,"members_deleted":0,"members_processed":0}
|
| 928 | 2026-03-09T10:56:08.451Z | TRAC | test_update_status (dns): buffer
buffer = Length: 72 (0x48) bytes\n0000: ea 0a 01 00 00 01 00 00 00 00 00 01 09 5f 64 65 ............._de\n0010: 6e 64 72 69 74 65 04 5f 74 63 70 0d 63 6f 6e 74 ndrite._tcp.cont\n0020: 72 6f 6c 2d 70 6c 61 6e 65 05 6f 78 69 64 65 08 rol-plane.oxide.\n0030: 69 6e 74 65 72 6e 61 6c 00 00 21 00 01 00 00 29 internal..!....)\n0040: 04 d0 00 00 00 00 00 00 ........
kind = dns
peer_addr = [::1]:63902
req_id = c2628270-542c-4120-a51c-f4705810e3ba
|
| 929 | 2026-03-09T10:56:08.451Z | DEBG | test_update_status (dns): message_request
kind = dns
mr = MessageRequest {\n header: Header {\n id: 59914,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n queries: Queries {\n queries: [\n LowerQuery {\n name: LowerName(\n Name("_dendrite._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_dendrite._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n ],\n original: [\n 9,\n 95,\n 100,\n 101,\n 110,\n 100,\n 114,\n 105,\n 116,\n 101,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n flags: EdnsFlags {\n dnssec_ok: false,\n z: 0,\n },\n max_payload: 1232,\n options: OPT {\n options: [],\n },\n },\n ),\n}
peer_addr = [::1]:63902
req_id = c2628270-542c-4120-a51c-f4705810e3ba
|
| 930 | 2026-03-09T10:56:08.453Z | ERRO | test_update_status (dns): failed to handle incoming DNS message: MessageRequest {
header: Header {
id: 59914,
message_type: Query,
op_code: Query,
authoritative: false,
truncation: false,
recursion_desired: true,
recursion_available: false,
authentic_data: false,
checking_disabled: false,
response_code: NoError,
query_count: 1,
answer_count: 0,
name_server_count: 0,
additional_count: 1,
},
queries: Queries {
queries: [
LowerQuery {
name: LowerName(
Name("_dendrite._tcp.control-plane.oxide.internal."),
),
original: Query {
name: Name("_dendrite._tcp.control-plane.oxide.internal."),
query_type: SRV,
query_class: IN,
},
},
],
original: [
9,
95,
100,
101,
110,
100,
114,
105,
116,
101,
4,
95,
116,
99,
112,
13,
99,
111,
110,
116,
114,
111,
108,
45,
112,
108,
97,
110,
101,
5,
111,
120,
105,
100,
101,
8,
105,
110,
116,
101,
114,
110,
97,
108,
0,
0,
33,
0,
1,
],
},
answers: [],
name_servers: [],
additionals: [],
sig0: [],
edns: Some(
Edns {
rcode_high: 0,
version: 0,
flags: EdnsFlags {
dnssec_ok: false,
z: 0,
},
max_payload: 1232,
options: OPT {
options: [],
},
},
),
} SERVFAIL: server is not authoritative for name: "_dendrite._tcp.control-plane.oxide.internal."
kind = dns
peer_addr = [::1]:63902
req_id = c2628270-542c-4120-a51c-f4705810e3ba
|
| 931 | 2026-03-09T10:56:08.453Z | ERRO | test_update_status (BackgroundTasks): failed to resolve addresses for Dendrite services
background_task = nat_garbage_collector
error = proto error: no records found for Query { name: Name("_dendrite._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN }
|
| 932 | 2026-03-09T10:56:08.453Z | ERRO | test_update_status (BackgroundTasks): failed to resolve addresses for Dendrite services
background_task = nat_garbage_collector
error = proto error: no records found for Query { name: Name("_dendrite._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN }
|
| 933 | 2026-03-09T10:56:08.453Z | DEBG | test_update_status (BackgroundTasks): activation complete
background_task = nat_garbage_collector
elapsed = 153.783036ms
iteration = 1
status = {"error":"failed to resolve addresses for Dendrite services: proto error: no records found for Query { name: Name(\\"_dendrite._tcp.control-plane.oxide.internal.\\"), query_type: SRV, query_class: IN }"}
|
| 934 | 2026-03-09T10:56:08.453Z | TRAC | test_update_status (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = region_replacement
resource = Database
|
| 935 | 2026-03-09T10:56:08.453Z | DEBG | test_update_status (BackgroundTasks): roles
background_task = region_replacement
roles = RoleSet { roles: {} }
|
| 936 | 2026-03-09T10:56:08.453Z | DEBG | test_update_status (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = region_replacement
resource = Database
result = Ok(())
|
| 937 | 2026-03-09T10:56:08.455Z | DEBG | test_update_status (BackgroundTasks): roles
background_task = vpc_route_manager
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 938 | 2026-03-09T10:56:08.458Z | DEBG | test_update_status (BackgroundTasks): authorize result
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = vpc_route_manager
resource = Fleet
result = Ok(())
|
| 939 | 2026-03-09T10:56:08.458Z | TRAC | test_update_status (BackgroundTasks): authorize begin
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = vpc_route_manager
resource = Fleet
|
| 940 | 2026-03-09T10:56:08.458Z | TRAC | test_update_status (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = vpc_route_manager
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 941 | 2026-03-09T10:56:08.458Z | TRAC | test_update_status (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = vpc_route_manager
resource = Database
|
| 942 | 2026-03-09T10:56:08.458Z | DEBG | test_update_status (BackgroundTasks): roles
background_task = vpc_route_manager
roles = RoleSet { roles: {} }
|
| 943 | 2026-03-09T10:56:08.458Z | DEBG | test_update_status (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = vpc_route_manager
resource = Database
result = Ok(())
|
| 944 | 2026-03-09T10:56:08.469Z | TRAC | test_update_status (DnsResolver): lookup_all_ipv6 srv
dns_name = _dendrite._tcp.control-plane.oxide.internal
|
| 945 | 2026-03-09T10:56:08.471Z | TRAC | test_update_status (dns): buffer
buffer = Length: 72 (0x48) bytes\n0000: 9a 17 01 00 00 01 00 00 00 00 00 01 09 5f 64 65 ............._de\n0010: 6e 64 72 69 74 65 04 5f 74 63 70 0d 63 6f 6e 74 ndrite._tcp.cont\n0020: 72 6f 6c 2d 70 6c 61 6e 65 05 6f 78 69 64 65 08 rol-plane.oxide.\n0030: 69 6e 74 65 72 6e 61 6c 00 00 21 00 01 00 00 29 internal..!....)\n0040: 04 d0 00 00 00 00 00 00 ........
kind = dns
peer_addr = [::1]:62528
req_id = ef5ba2c6-a581-4c2a-9601-10dc6e9a3d7c
|
| 946 | 2026-03-09T10:56:08.471Z | DEBG | test_update_status (dns): message_request
kind = dns
mr = MessageRequest {\n header: Header {\n id: 39447,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n queries: Queries {\n queries: [\n LowerQuery {\n name: LowerName(\n Name("_dendrite._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_dendrite._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n ],\n original: [\n 9,\n 95,\n 100,\n 101,\n 110,\n 100,\n 114,\n 105,\n 116,\n 101,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n flags: EdnsFlags {\n dnssec_ok: false,\n z: 0,\n },\n max_payload: 1232,\n options: OPT {\n options: [],\n },\n },\n ),\n}
peer_addr = [::1]:62528
req_id = ef5ba2c6-a581-4c2a-9601-10dc6e9a3d7c
|
| 947 | 2026-03-09T10:56:08.472Z | ERRO | test_update_status (dns): failed to handle incoming DNS message: MessageRequest {
header: Header {
id: 39447,
message_type: Query,
op_code: Query,
authoritative: false,
truncation: false,
recursion_desired: true,
recursion_available: false,
authentic_data: false,
checking_disabled: false,
response_code: NoError,
query_count: 1,
answer_count: 0,
name_server_count: 0,
additional_count: 1,
},
queries: Queries {
queries: [
LowerQuery {
name: LowerName(
Name("_dendrite._tcp.control-plane.oxide.internal."),
),
original: Query {
name: Name("_dendrite._tcp.control-plane.oxide.internal."),
query_type: SRV,
query_class: IN,
},
},
],
original: [
9,
95,
100,
101,
110,
100,
114,
105,
116,
101,
4,
95,
116,
99,
112,
13,
99,
111,
110,
116,
114,
111,
108,
45,
112,
108,
97,
110,
101,
5,
111,
120,
105,
100,
101,
8,
105,
110,
116,
101,
114,
110,
97,
108,
0,
0,
33,
0,
1,
],
},
answers: [],
name_servers: [],
additionals: [],
sig0: [],
edns: Some(
Edns {
rcode_high: 0,
version: 0,
flags: EdnsFlags {
dnssec_ok: false,
z: 0,
},
max_payload: 1232,
options: OPT {
options: [],
},
},
),
} SERVFAIL: server is not authoritative for name: "_dendrite._tcp.control-plane.oxide.internal."
kind = dns
peer_addr = [::1]:62528
req_id = ef5ba2c6-a581-4c2a-9601-10dc6e9a3d7c
|
| 948 | 2026-03-09T10:56:08.472Z | DEBG | test_update_status: mgd port is 47898
|
| 949 | 2026-03-09T10:56:08.472Z | DEBG | test_update_status (init_with_steps): Running step record_switch_dns
|
| 950 | 2026-03-09T10:56:08.472Z | ERRO | test_update_status (BackgroundTasks): failed to resolve addresses for Dendrite services
background_task = bfd_manager
error = proto error: no records found for Query { name: Name("_dendrite._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN }
|
| 951 | 2026-03-09T10:56:08.472Z | ERRO | test_update_status (BackgroundTasks): failed to resolve addresses for Dendrite services
background_task = bfd_manager
error = proto error: no records found for Query { name: Name("_dendrite._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN }
|
| 952 | 2026-03-09T10:56:08.472Z | DEBG | test_update_status: Recording DNS for the switch zones
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
switch_location = switch0
|
| 953 | 2026-03-09T10:56:08.472Z | DEBG | test_update_status (BackgroundTasks): activation complete
background_task = bfd_manager
elapsed = 170.188586ms
iteration = 1
status = {"error":"failed to resolve addresses for Dendrite services: proto error: no records found for Query { name: Name(\\"_dendrite._tcp.control-plane.oxide.internal.\\"), query_type: SRV, query_class: IN }"}
|
| 954 | 2026-03-09T10:56:08.472Z | DEBG | test_update_status (init_with_steps): Running step start_sled1
|
| 955 | 2026-03-09T10:56:08.472Z | INFO | test_update_status (omicron_sled_agent::sim::Server): setting up sled agent server
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
| 956 | 2026-03-09T10:56:08.481Z | DEBG | test_update_status (BackgroundTasks): activation complete
background_task = phantom_disks
elapsed = 176.623172ms
iteration = 1
status = {"phantom_disk_deleted_err":0,"phantom_disk_deleted_ok":0}
|
| 957 | 2026-03-09T10:56:08.487Z | DEBG | test_update_status (BackgroundTasks): roles
background_task = reconfigurator_config_watcher
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 958 | 2026-03-09T10:56:08.493Z | DEBG | test_update_status (BackgroundTasks): roles
background_task = tuf_artifact_replication
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 959 | 2026-03-09T10:56:08.494Z | DEBG | test_update_status (BackgroundTasks): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = reconfigurator_config_watcher
resource = BlueprintConfig
result = Ok(())
|
| 960 | 2026-03-09T10:56:08.494Z | TRAC | test_update_status (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = reconfigurator_config_watcher
resource = Database
|
| 961 | 2026-03-09T10:56:08.494Z | DEBG | test_update_status (BackgroundTasks): roles
background_task = reconfigurator_config_watcher
roles = RoleSet { roles: {} }
|
| 962 | 2026-03-09T10:56:08.495Z | DEBG | test_update_status (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = reconfigurator_config_watcher
resource = Database
result = Ok(())
|
| 963 | 2026-03-09T10:56:08.497Z | DEBG | test_update_status (BackgroundTasks): authorize result
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = tuf_artifact_replication
resource = Fleet
result = Ok(())
|
| 964 | 2026-03-09T10:56:08.497Z | TRAC | test_update_status (BackgroundTasks): authorize begin
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = tuf_artifact_replication
resource = Fleet
|
| 965 | 2026-03-09T10:56:08.497Z | TRAC | test_update_status (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = tuf_artifact_replication
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 966 | 2026-03-09T10:56:08.497Z | TRAC | test_update_status (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = tuf_artifact_replication
resource = Database
|
| 967 | 2026-03-09T10:56:08.497Z | DEBG | test_update_status (BackgroundTasks): roles
background_task = tuf_artifact_replication
roles = RoleSet { roles: {} }
|
| 968 | 2026-03-09T10:56:08.499Z | DEBG | test_update_status (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = tuf_artifact_replication
resource = Database
result = Ok(())
|
| 969 | 2026-03-09T10:56:08.506Z | TRAC | test_update_status (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = region_replacement_driver
resource = Database
|
| 970 | 2026-03-09T10:56:08.506Z | DEBG | test_update_status (BackgroundTasks): roles
background_task = region_replacement_driver
roles = RoleSet { roles: {} }
|
| 971 | 2026-03-09T10:56:08.506Z | DEBG | test_update_status (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = region_replacement_driver
resource = Database
result = Ok(())
|
| 972 | 2026-03-09T10:56:08.519Z | TRAC | test_update_status (BackgroundTasks): authorize begin
action = Modify
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = fm_sitrep_gc
resource = Fleet
|
| 973 | 2026-03-09T10:56:08.519Z | TRAC | test_update_status (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = fm_sitrep_gc
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 974 | 2026-03-09T10:56:08.519Z | TRAC | test_update_status (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = fm_sitrep_gc
resource = Database
|
| 975 | 2026-03-09T10:56:08.519Z | DEBG | test_update_status (BackgroundTasks): roles
background_task = fm_sitrep_gc
roles = RoleSet { roles: {} }
|
| 976 | 2026-03-09T10:56:08.520Z | DEBG | test_update_status (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = fm_sitrep_gc
resource = Database
result = Ok(())
|
| 977 | 2026-03-09T10:56:08.528Z | DEBG | test_update_status (BackgroundTasks): roles
background_task = instance_watcher
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 978 | 2026-03-09T10:56:08.528Z | INFO | test_update_status (dropshot_internal): accepted connection
local_addr = 127.0.0.1:38163
remote_addr = 127.0.0.1:58817
|
| 979 | 2026-03-09T10:56:08.530Z | TRAC | test_update_status (dropshot_internal): incoming request
local_addr = 127.0.0.1:38163
method = GET
remote_addr = 127.0.0.1:58817
req_id = 0f821288-7beb-4f5e-8fc3-620c3a636ba4
uri = /nat/ipv4/changeset/0?limit=100
|
| 980 | 2026-03-09T10:56:08.530Z | DEBG | test_update_status (dropshot_internal): determined request API version
local_addr = 127.0.0.1:38163
method = GET
remote_addr = 127.0.0.1:58817
req_id = 0f821288-7beb-4f5e-8fc3-620c3a636ba4
uri = /nat/ipv4/changeset/0?limit=100
version = 1.0.0
|
| 981 | 2026-03-09T10:56:08.531Z | TRAC | test_update_status (dropshot_internal): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
authenticated = true
local_addr = 127.0.0.1:38163
method = GET
remote_addr = 127.0.0.1:58817
req_id = 0f821288-7beb-4f5e-8fc3-620c3a636ba4
resource = Database
type = user_builtin
uri = /nat/ipv4/changeset/0?limit=100
user_builtin_id = 001de000-05e4-4000-8000-000000000002
|
| 982 | 2026-03-09T10:56:08.531Z | DEBG | test_update_status (dropshot_internal): roles
authenticated = true
local_addr = 127.0.0.1:38163
method = GET
remote_addr = 127.0.0.1:58817
req_id = 0f821288-7beb-4f5e-8fc3-620c3a636ba4
roles = RoleSet { roles: {} }
type = user_builtin
uri = /nat/ipv4/changeset/0?limit=100
user_builtin_id = 001de000-05e4-4000-8000-000000000002
|
| 983 | 2026-03-09T10:56:08.532Z | DEBG | test_update_status (dropshot_internal): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
authenticated = true
local_addr = 127.0.0.1:38163
method = GET
remote_addr = 127.0.0.1:58817
req_id = 0f821288-7beb-4f5e-8fc3-620c3a636ba4
resource = Database
result = Ok(())
type = user_builtin
uri = /nat/ipv4/changeset/0?limit=100
user_builtin_id = 001de000-05e4-4000-8000-000000000002
|
| 984 | 2026-03-09T10:56:08.534Z | DEBG | test_update_status (BackgroundTasks): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = instance_watcher
resource = Fleet
result = Ok(())
|
| 985 | 2026-03-09T10:56:08.534Z | TRAC | test_update_status (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = instance_watcher
resource = Database
|
| 986 | 2026-03-09T10:56:08.534Z | DEBG | test_update_status (BackgroundTasks): roles
background_task = instance_watcher
roles = RoleSet { roles: {} }
|
| 987 | 2026-03-09T10:56:08.535Z | DEBG | test_update_status (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = instance_watcher
resource = Database
result = Ok(())
|
| 988 | 2026-03-09T10:56:08.585Z | DEBG | test_update_status (BackgroundTasks): roles
background_task = external_endpoints
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 989 | 2026-03-09T10:56:08.585Z | INFO | test_update_status (SledAgent): created simulated sled agent
server = b6d65341-167c-41df-9b5c-41cded99c229
sim_mode = Explicit
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
| 990 | 2026-03-09T10:56:08.586Z | TRAC | test_update_status (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = region_snapshot_replacement_start
resource = Database
|
| 991 | 2026-03-09T10:56:08.586Z | DEBG | test_update_status (BackgroundTasks): roles
background_task = region_snapshot_replacement_start
roles = RoleSet { roles: {} }
|
| 992 | 2026-03-09T10:56:08.586Z | DEBG | test_update_status (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = region_snapshot_replacement_start
resource = Database
result = Ok(())
|
| 993 | 2026-03-09T10:56:08.587Z | INFO | test_update_status (SagaRecoverer): listed in-progress sagas
count = 0
|
| 994 | 2026-03-09T10:56:08.587Z | INFO | test_update_status (SagaQuiesceHandle): saga recovery pass finished
blueprint_id = None
generation = 1
|
| 995 | 2026-03-09T10:56:08.587Z | DEBG | test_update_status (BackgroundTasks): activation complete
background_task = saga_recovery
elapsed = 277.680575ms
iteration = 1
status = {"last_pass":{"Success":{"nfailed":0,"nfound":0,"nrecovered":0,"nremoved":0,"nskipped":0}},"ntotal_failures":0,"ntotal_finished":0,"ntotal_recovered":0,"ntotal_sec_errors_bad_state":0,"ntotal_sec_errors_missing":0,"ntotal_started":0,"recent_failures":[],"recent_recoveries":[]}
|
| 996 | 2026-03-09T10:56:08.588Z | DEBG | test_update_status (BackgroundTasks): Found abandoned VMMs
background_task = abandoned_vmm_reaper
count = 0
total = 0
|
| 997 | 2026-03-09T10:56:08.588Z | INFO | test_update_status (BackgroundTasks): Abandoned VMMs reaped
background_task = abandoned_vmm_reaper
sled_reservations_deleted = 0
vmms_already_deleted = 0
vmms_deleted = 0
vmms_found = 0
|
| 998 | 2026-03-09T10:56:08.588Z | DEBG | test_update_status (BackgroundTasks): activation complete
background_task = abandoned_vmm_reaper
elapsed = 283.936289ms
iteration = 1
status = {"errors":[],"sled_reservations_deleted":0,"vmms_already_deleted":0,"vmms_deleted":0,"vmms_found":0}
|
| 999 | 2026-03-09T10:56:08.588Z | DEBG | test_update_status (BackgroundTasks): authorize result
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = external_endpoints
resource = Fleet
result = Ok(())
|
| 1000 | 2026-03-09T10:56:08.588Z | TRAC | test_update_status (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = external_endpoints
resource = Database
|
| 1001 | 2026-03-09T10:56:08.588Z | DEBG | test_update_status (BackgroundTasks): roles
background_task = external_endpoints
roles = RoleSet { roles: {} }
|
| 1002 | 2026-03-09T10:56:08.589Z | DEBG | test_update_status (BackgroundTasks): roles
background_task = inventory_collection
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 1003 | 2026-03-09T10:56:08.591Z | DEBG | test_update_status (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = external_endpoints
resource = Database
result = Ok(())
|
| 1004 | 2026-03-09T10:56:08.592Z | DEBG | test_update_status (BackgroundTasks): authorize result
action = Modify
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = inventory_collection
resource = Inventory
result = Ok(())
|
| 1005 | 2026-03-09T10:56:08.592Z | TRAC | test_update_status (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = inventory_collection
resource = Database
|
| 1006 | 2026-03-09T10:56:08.592Z | DEBG | test_update_status (BackgroundTasks): roles
background_task = inventory_collection
roles = RoleSet { roles: {} }
|
| 1007 | 2026-03-09T10:56:08.592Z | DEBG | test_update_status (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = inventory_collection
resource = Database
result = Ok(())
|
| 1008 | 2026-03-09T10:56:08.593Z | INFO | test_update_status (omicron_sled_agent::sim::SimulatedUpstairs): registered sled b6d65341-167c-41df-9b5c-41cded99c229 storage
|
| 1009 | 2026-03-09T10:56:08.596Z | DEBG | test_update_status (BackgroundTasks): roles
background_task = probe_distributor
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 1010 | 2026-03-09T10:56:08.596Z | DEBG | test_update_status (BackgroundTasks): roles
background_task = inventory_loader
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 1011 | 2026-03-09T10:56:08.598Z | INFO | test_update_status (ArtifactStore): No ledger in /var/tmp/omicron_tmp/.tmpmF05a5/artifact-config.json
server = b6d65341-167c-41df-9b5c-41cded99c229
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
| 1012 | 2026-03-09T10:56:08.598Z | DEBG | test_update_status (ArtifactStore): Failed to read ledger: Not found in storage
path = /var/tmp/omicron_tmp/.tmpmF05a5/artifact-config.json
server = b6d65341-167c-41df-9b5c-41cded99c229
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
| 1013 | 2026-03-09T10:56:08.598Z | INFO | test_update_status (ArtifactStore): No ledger in /var/tmp/omicron_tmp/.tmp2n6G3x/artifact-config.json
server = b6d65341-167c-41df-9b5c-41cded99c229
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
| 1014 | 2026-03-09T10:56:08.598Z | DEBG | test_update_status (ArtifactStore): Failed to read ledger: Not found in storage
path = /var/tmp/omicron_tmp/.tmp2n6G3x/artifact-config.json
server = b6d65341-167c-41df-9b5c-41cded99c229
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
| 1015 | 2026-03-09T10:56:08.602Z | DEBG | test_update_status (BackgroundTasks): authorize result
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = probe_distributor
resource = Fleet
result = Ok(())
|
| 1016 | 2026-03-09T10:56:08.602Z | TRAC | test_update_status (BackgroundTasks): authorize begin
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = probe_distributor
resource = Fleet
|
| 1017 | 2026-03-09T10:56:08.602Z | TRAC | test_update_status (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = probe_distributor
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 1018 | 2026-03-09T10:56:08.602Z | TRAC | test_update_status (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = probe_distributor
resource = Database
|
| 1019 | 2026-03-09T10:56:08.602Z | DEBG | test_update_status (BackgroundTasks): roles
background_task = probe_distributor
roles = RoleSet { roles: {} }
|
| 1020 | 2026-03-09T10:56:08.603Z | DEBG | test_update_status (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = probe_distributor
resource = Database
result = Ok(())
|
| 1021 | 2026-03-09T10:56:08.603Z | DEBG | test_update_status (BackgroundTasks): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = inventory_loader
resource = Inventory
result = Ok(())
|
| 1022 | 2026-03-09T10:56:08.604Z | TRAC | test_update_status (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = inventory_loader
resource = Database
|
| 1023 | 2026-03-09T10:56:08.604Z | DEBG | test_update_status (BackgroundTasks): roles
background_task = inventory_loader
roles = RoleSet { roles: {} }
|
| 1024 | 2026-03-09T10:56:08.605Z | DEBG | test_update_status (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = inventory_loader
resource = Database
result = Ok(())
|
| 1025 | 2026-03-09T10:56:08.605Z | DEBG | test_update_status (BackgroundTasks): roles
background_task = dns_config_external
dns_group = external
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 1026 | 2026-03-09T10:56:08.605Z | INFO | test_update_status (BackgroundTasks): all webhook delivery tasks completed
background_task = webhook_deliverator
num_receivers = 0
|
| 1027 | 2026-03-09T10:56:08.605Z | DEBG | test_update_status (BackgroundTasks): activation complete
background_task = webhook_deliverator
elapsed = 238.740371ms
iteration = 1
status = {"by_rx":{},"error":null}
|
| 1028 | 2026-03-09T10:56:08.605Z | DEBG | test_update_status (BackgroundTasks): activation complete
background_task = region_snapshot_replacement_garbage_collection
elapsed = 291.202655ms
iteration = 1
status = {"errors":[],"garbage_collect_requested":[]}
|
| 1029 | 2026-03-09T10:56:08.605Z | DEBG | test_update_status (BackgroundTasks): activation complete
background_task = region_snapshot_replacement_finish
elapsed = 286.325956ms
iteration = 1
status = {"errors":[],"finish_invoked_ok":[]}
|
| 1030 | 2026-03-09T10:56:08.606Z | WARN | test_update_status (BackgroundTasks): failed to read target blueprint
background_task = blueprint_loader
error = Internal Error: no target blueprint set
|
| 1031 | 2026-03-09T10:56:08.606Z | DEBG | test_update_status (BackgroundTasks): activation complete
background_task = blueprint_loader
elapsed = 351.515445ms
iteration = 1
status = {"error":"failed to read target blueprint: Internal Error: no target blueprint set"}
|
| 1032 | 2026-03-09T10:56:08.616Z | TRAC | test_update_status (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
|
| 1033 | 2026-03-09T10:56:08.616Z | DEBG | test_update_status (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {} }
|
| 1034 | 2026-03-09T10:56:08.617Z | DEBG | test_update_status (BackgroundTasks): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = dns_config_external
dns_group = external
resource = DnsConfig
result = Ok(())
|
| 1035 | 2026-03-09T10:56:08.617Z | DEBG | test_update_status (BackgroundTasks): activation complete
background_task = switch_port_config_manager
elapsed = 347.548394ms
iteration = 1
status = {}
|
| 1036 | 2026-03-09T10:56:08.617Z | DEBG | test_update_status (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
result = Ok(())
|
| 1037 | 2026-03-09T10:56:08.639Z | DEBG | test_update_status (BackgroundTasks): roles
background_task = vpc_route_manager
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 1038 | 2026-03-09T10:56:08.640Z | DEBG | test_update_status (BackgroundTasks): reconfigurator config load complete
background_task = reconfigurator_config_watcher
switches = Loaded(ReconfiguratorConfigView { version: 1, config: ReconfiguratorConfig { planner_enabled: false, planner_config: PlannerConfig { add_zones_with_mupdate_override: false }, tuf_repo_pruner_enabled: true }, time_modified: 2026-03-09T10:56:08.230279Z })
|
| 1039 | 2026-03-09T10:56:08.640Z | DEBG | test_update_status (BackgroundTasks): activation complete
background_task = reconfigurator_config_watcher
elapsed = 323.050916ms
iteration = 1
status = {"config_updated":true}
|
| 1040 | 2026-03-09T10:56:08.640Z | DEBG | test_update_status (BackgroundTasks): activating
background_task = blueprint_planner
iteration = 2
reason = Dependency
|
| 1041 | 2026-03-09T10:56:08.640Z | DEBG | test_update_status (BackgroundTasks): blueprint planning disabled, doing nothing
background_task = blueprint_planner
|
| 1042 | 2026-03-09T10:56:08.640Z | DEBG | test_update_status (BackgroundTasks): activation complete
background_task = blueprint_planner
elapsed = 18.757\u{b5}s
iteration = 2
status = "Disabled"
|
| 1043 | 2026-03-09T10:56:08.640Z | DEBG | test_update_status (BackgroundTasks): activating
background_task = tuf_repo_pruner
iteration = 2
reason = Dependency
|
| 1044 | 2026-03-09T10:56:08.641Z | TRAC | test_update_status (BackgroundTasks): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = tuf_repo_pruner
resource = Fleet
|
| 1045 | 2026-03-09T10:56:08.641Z | TRAC | test_update_status (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = tuf_repo_pruner
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 1046 | 2026-03-09T10:56:08.641Z | TRAC | test_update_status (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = tuf_repo_pruner
resource = Database
|
| 1047 | 2026-03-09T10:56:08.641Z | DEBG | test_update_status (BackgroundTasks): roles
background_task = tuf_repo_pruner
roles = RoleSet { roles: {} }
|
| 1048 | 2026-03-09T10:56:08.642Z | DEBG | test_update_status (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = tuf_repo_pruner
resource = Database
result = Ok(())
|
| 1049 | 2026-03-09T10:56:08.646Z | DEBG | test_update_status (BackgroundTasks): authorize result
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = vpc_route_manager
resource = Fleet
result = Ok(())
|
| 1050 | 2026-03-09T10:56:08.646Z | TRAC | test_update_status (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = vpc_route_manager
resource = Database
|
| 1051 | 2026-03-09T10:56:08.646Z | DEBG | test_update_status (BackgroundTasks): roles
background_task = vpc_route_manager
roles = RoleSet { roles: {} }
|
| 1052 | 2026-03-09T10:56:08.646Z | DEBG | test_update_status (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = vpc_route_manager
resource = Database
result = Ok(())
|
| 1053 | 2026-03-09T10:56:08.652Z | DEBG | test_update_status (BackgroundTasks): roles
background_task = dns_config_internal
dns_group = internal
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 1054 | 2026-03-09T10:56:08.653Z | DEBG | test_update_status (BackgroundTasks): roles
background_task = fm_sitrep_loader
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 1055 | 2026-03-09T10:56:08.658Z | DEBG | test_update_status (BackgroundTasks): authorize result
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = fm_sitrep_loader
resource = Fleet
result = Ok(())
|
| 1056 | 2026-03-09T10:56:08.658Z | TRAC | test_update_status (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = fm_sitrep_loader
resource = Database
|
| 1057 | 2026-03-09T10:56:08.658Z | DEBG | test_update_status (BackgroundTasks): roles
background_task = fm_sitrep_loader
roles = RoleSet { roles: {} }
|
| 1058 | 2026-03-09T10:56:08.658Z | DEBG | test_update_status (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = fm_sitrep_loader
resource = Database
result = Ok(())
|
| 1059 | 2026-03-09T10:56:08.662Z | DEBG | test_update_status (BackgroundTasks): roles
background_task = tuf_artifact_replication
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 1060 | 2026-03-09T10:56:08.667Z | DEBG | test_update_status (BackgroundTasks): authorize result
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = tuf_artifact_replication
resource = Fleet
result = Ok(())
|
| 1061 | 2026-03-09T10:56:08.667Z | TRAC | test_update_status (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = tuf_artifact_replication
resource = Database
|
| 1062 | 2026-03-09T10:56:08.667Z | DEBG | test_update_status (BackgroundTasks): roles
background_task = tuf_artifact_replication
roles = RoleSet { roles: {} }
|
| 1063 | 2026-03-09T10:56:08.667Z | DEBG | test_update_status (BackgroundTasks): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = dns_config_internal
dns_group = internal
resource = DnsConfig
result = Ok(())
|
| 1064 | 2026-03-09T10:56:08.667Z | DEBG | test_update_status (BackgroundTasks): roles
background_task = fm_sitrep_gc
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 1065 | 2026-03-09T10:56:08.668Z | DEBG | test_update_status (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = tuf_artifact_replication
resource = Database
result = Ok(())
|
| 1066 | 2026-03-09T10:56:08.669Z | TRAC | test_update_status (BackgroundTasks): no more instances in need of reincarnation
background_task = instance_reincarnation
reincarnation_reason = instance failed
total_found = 0
|
| 1067 | 2026-03-09T10:56:08.669Z | TRAC | test_update_status (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = instance_reincarnation
resource = Database
|
| 1068 | 2026-03-09T10:56:08.669Z | DEBG | test_update_status (BackgroundTasks): roles
background_task = instance_reincarnation
roles = RoleSet { roles: {} }
|
| 1069 | 2026-03-09T10:56:08.669Z | DEBG | test_update_status (BackgroundTasks): authorize result
action = Modify
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = fm_sitrep_gc
resource = Fleet
result = Ok(())
|
| 1070 | 2026-03-09T10:56:08.670Z | DEBG | test_update_status (BackgroundTasks): activation complete
background_task = region_replacement_driver
elapsed = 389.524385ms
iteration = 1
status = {"drive_invoked_ok":[],"errors":[],"finish_invoked_ok":[]}
|
| 1071 | 2026-03-09T10:56:08.670Z | DEBG | test_update_status (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = instance_reincarnation
resource = Database
result = Ok(())
|
| 1072 | 2026-03-09T10:56:08.673Z | INFO | test_update_status (dropshot_internal): request completed
latency_us = 143743
local_addr = 127.0.0.1:38163
method = GET
remote_addr = 127.0.0.1:58817
req_id = 0f821288-7beb-4f5e-8fc3-620c3a636ba4
response_code = 200
uri = /nat/ipv4/changeset/0?limit=100
|
| 1073 | 2026-03-09T10:56:08.693Z | TRAC | test_update_status (BackgroundTasks): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = external_endpoints
resource = DnsConfig
|
| 1074 | 2026-03-09T10:56:08.694Z | TRAC | test_update_status (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = external_endpoints
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 1075 | 2026-03-09T10:56:08.694Z | TRAC | test_update_status (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = external_endpoints
resource = Database
|
| 1076 | 2026-03-09T10:56:08.694Z | DEBG | test_update_status (BackgroundTasks): roles
background_task = external_endpoints
roles = RoleSet { roles: {} }
|
| 1077 | 2026-03-09T10:56:08.694Z | TRAC | test_update_status (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = v2p_manager
resource = Database
|
| 1078 | 2026-03-09T10:56:08.698Z | DEBG | test_update_status (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = external_endpoints
resource = Database
result = Ok(())
|
| 1079 | 2026-03-09T10:56:08.698Z | DEBG | test_update_status (BackgroundTasks): roles
background_task = v2p_manager
roles = RoleSet { roles: {} }
|
| 1080 | 2026-03-09T10:56:08.699Z | DEBG | test_update_status (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = v2p_manager
resource = Database
result = Ok(())
|
| 1081 | 2026-03-09T10:56:08.700Z | DEBG | test_update_status (BackgroundTasks): inventory_prune_one: nothing eligible for removal (too few)
background_task = inventory_collection
candidates = []
|
| 1082 | 2026-03-09T10:56:08.700Z | TRAC | test_update_status (DnsResolver): lookup_all_socket_v6 srv
dns_name = _mgs._tcp.control-plane.oxide.internal
|
| 1083 | 2026-03-09T10:56:08.701Z | TRAC | test_update_status (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = fm_sitrep_gc
resource = Database
|
| 1084 | 2026-03-09T10:56:08.701Z | DEBG | test_update_status (BackgroundTasks): roles
background_task = fm_sitrep_gc
roles = RoleSet { roles: {} }
|
| 1085 | 2026-03-09T10:56:08.702Z | DEBG | test_update_status (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = fm_sitrep_gc
resource = Database
result = Ok(())
|
| 1086 | 2026-03-09T10:56:08.708Z | TRAC | test_update_status (dns): buffer
buffer = Length: 67 (0x43) bytes\n0000: 0f 47 01 00 00 01 00 00 00 00 00 01 04 5f 6d 67 .G..........._mg\n0010: 73 04 5f 74 63 70 0d 63 6f 6e 74 72 6f 6c 2d 70 s._tcp.control-p\n0020: 6c 61 6e 65 05 6f 78 69 64 65 08 69 6e 74 65 72 lane.oxide.inter\n0030: 6e 61 6c 00 00 21 00 01 00 00 29 04 d0 00 00 00 nal..!....).....\n0040: 00 00 00 ...
kind = dns
peer_addr = [::1]:42254
req_id = 72b3a466-46b0-45e7-961b-a86157d13efd
|
| 1087 | 2026-03-09T10:56:08.708Z | DEBG | test_update_status (dns): message_request
kind = dns
mr = MessageRequest {\n header: Header {\n id: 3911,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n queries: Queries {\n queries: [\n LowerQuery {\n name: LowerName(\n Name("_mgs._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_mgs._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n ],\n original: [\n 4,\n 95,\n 109,\n 103,\n 115,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n flags: EdnsFlags {\n dnssec_ok: false,\n z: 0,\n },\n max_payload: 1232,\n options: OPT {\n options: [],\n },\n },\n ),\n}
peer_addr = [::1]:42254
req_id = 72b3a466-46b0-45e7-961b-a86157d13efd
|
| 1088 | 2026-03-09T10:56:08.708Z | ERRO | test_update_status (dns): failed to handle incoming DNS message: MessageRequest {
header: Header {
id: 3911,
message_type: Query,
op_code: Query,
authoritative: false,
truncation: false,
recursion_desired: true,
recursion_available: false,
authentic_data: false,
checking_disabled: false,
response_code: NoError,
query_count: 1,
answer_count: 0,
name_server_count: 0,
additional_count: 1,
},
queries: Queries {
queries: [
LowerQuery {
name: LowerName(
Name("_mgs._tcp.control-plane.oxide.internal."),
),
original: Query {
name: Name("_mgs._tcp.control-plane.oxide.internal."),
query_type: SRV,
query_class: IN,
},
},
],
original: [
4,
95,
109,
103,
115,
4,
95,
116,
99,
112,
13,
99,
111,
110,
116,
114,
111,
108,
45,
112,
108,
97,
110,
101,
5,
111,
120,
105,
100,
101,
8,
105,
110,
116,
101,
114,
110,
97,
108,
0,
0,
33,
0,
1,
],
},
answers: [],
name_servers: [],
additionals: [],
sig0: [],
edns: Some(
Edns {
rcode_high: 0,
version: 0,
flags: EdnsFlags {
dnssec_ok: false,
z: 0,
},
max_payload: 1232,
options: OPT {
options: [],
},
},
),
} SERVFAIL: server is not authoritative for name: "_mgs._tcp.control-plane.oxide.internal."
kind = dns
peer_addr = [::1]:42254
req_id = 72b3a466-46b0-45e7-961b-a86157d13efd
|
| 1089 | 2026-03-09T10:56:08.709Z | WARN | test_update_status (BackgroundTasks): inventory collection failed
background_task = inventory_collection
error = failed to collect inventory: looking up MGS addresses: proto error: no records found for Query { name: Name("_mgs._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN }
|
| 1090 | 2026-03-09T10:56:08.709Z | DEBG | test_update_status (BackgroundTasks): activation complete
background_task = inventory_collection
elapsed = 400.673115ms
iteration = 1
status = {"error":"failed to collect inventory: looking up MGS addresses: proto error: no records found for Query { name: Name(\\"_mgs._tcp.control-plane.oxide.internal.\\"), query_type: SRV, query_class: IN }"}
|
| 1091 | 2026-03-09T10:56:08.710Z | DEBG | test_update_status (BackgroundTasks): activation complete
background_task = read_only_region_replacement_start
elapsed = 341.089572ms
iteration = 1
status = {"errors":[],"requests_created_ok":[]}
|
| 1092 | 2026-03-09T10:56:08.718Z | TRAC | test_update_status (BackgroundTasks): reprocessing 0 outdated webhook globs...
background_task = alert_dispatcher
|
| 1093 | 2026-03-09T10:56:08.718Z | TRAC | test_update_status (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = alert_dispatcher
resource = Database
|
| 1094 | 2026-03-09T10:56:08.718Z | DEBG | test_update_status (BackgroundTasks): roles
background_task = alert_dispatcher
roles = RoleSet { roles: {} }
|
| 1095 | 2026-03-09T10:56:08.718Z | DEBG | test_update_status (dropshot (Repo Depot)): registered endpoint
local_addr = [::1]:42508
method = GET
path = /artifact/sha256/{sha256}
server = b6d65341-167c-41df-9b5c-41cded99c229
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
| 1096 | 2026-03-09T10:56:08.718Z | INFO | test_update_status (dropshot (Repo Depot)): listening
local_addr = [::1]:42508
server = b6d65341-167c-41df-9b5c-41cded99c229
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
| 1097 | 2026-03-09T10:56:08.718Z | DEBG | test_update_status (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = alert_dispatcher
resource = Database
result = Ok(())
|
| 1098 | 2026-03-09T10:56:08.719Z | DEBG | test_update_status (dropshot (Repo Depot)): successfully registered DTrace USDT probes
local_addr = [::1]:42508
server = b6d65341-167c-41df-9b5c-41cded99c229
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
| 1099 | 2026-03-09T10:56:08.727Z | DEBG | test_update_status (BackgroundTasks): roles
background_task = probe_distributor
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 1100 | 2026-03-09T10:56:08.730Z | DEBG | test_update_status (dropshot): registered endpoint
local_addr = [::1]:53204
method = GET
path = /artifacts
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
| 1101 | 2026-03-09T10:56:08.730Z | DEBG | test_update_status (dropshot): registered endpoint
local_addr = [::1]:53204
method = PUT
path = /artifacts/{sha256}
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
| 1102 | 2026-03-09T10:56:08.730Z | DEBG | test_update_status (dropshot): registered endpoint
local_addr = [::1]:53204
method = POST
path = /artifacts/{sha256}/copy-from-depot
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
| 1103 | 2026-03-09T10:56:08.730Z | DEBG | test_update_status (dropshot): registered endpoint
local_addr = [::1]:53204
method = GET
path = /artifacts-config
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
| 1104 | 2026-03-09T10:56:08.730Z | DEBG | test_update_status (dropshot): registered endpoint
local_addr = [::1]:53204
method = PUT
path = /artifacts-config
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
| 1105 | 2026-03-09T10:56:08.730Z | DEBG | test_update_status (dropshot): registered endpoint
local_addr = [::1]:53204
method = GET
path = /bootstore/status
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
| 1106 | 2026-03-09T10:56:08.730Z | DEBG | test_update_status (dropshot): registered endpoint
local_addr = [::1]:53204
method = GET
path = /chicken-switch/destroy-orphaned-datasets
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all ending with 2.0.0
|
| 1107 | 2026-03-09T10:56:08.730Z | DEBG | test_update_status (dropshot): registered endpoint
local_addr = [::1]:53204
method = PUT
path = /chicken-switch/destroy-orphaned-datasets
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all ending with 3.0.0
|
| 1108 | 2026-03-09T10:56:08.730Z | DEBG | test_update_status (dropshot): registered endpoint
local_addr = [::1]:53204
method = GET
path = /debug/switch-zone-policy
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all starting from 3.0.0
|
| 1109 | 2026-03-09T10:56:08.730Z | DEBG | test_update_status (dropshot): registered endpoint
local_addr = [::1]:53204
method = PUT
path = /debug/switch-zone-policy
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all starting from 3.0.0
|
| 1110 | 2026-03-09T10:56:08.730Z | DEBG | test_update_status (dropshot): registered endpoint
local_addr = [::1]:53204
method = PUT
path = /disks/{disk_id}
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all ending with 21.0.0
|
| 1111 | 2026-03-09T10:56:08.730Z | DEBG | test_update_status (dropshot): registered endpoint
local_addr = [::1]:53204
method = PUT
path = /eip-gateways
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
| 1112 | 2026-03-09T10:56:08.731Z | DEBG | test_update_status (dropshot): registered endpoint
local_addr = [::1]:53204
method = GET
path = /inventory
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all starting from 24.0.0
|
| 1113 | 2026-03-09T10:56:08.731Z | DEBG | test_update_status (dropshot): registered endpoint
local_addr = [::1]:53204
method = GET
path = /inventory
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = from 22.0.0 to 24.0.0
|
| 1114 | 2026-03-09T10:56:08.731Z | DEBG | test_update_status (dropshot): registered endpoint
local_addr = [::1]:53204
method = GET
path = /inventory
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = from 16.0.0 to 22.0.0
|
| 1115 | 2026-03-09T10:56:08.731Z | DEBG | test_update_status (dropshot): registered endpoint
local_addr = [::1]:53204
method = GET
path = /inventory
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = from 14.0.0 to 16.0.0
|
| 1116 | 2026-03-09T10:56:08.731Z | DEBG | test_update_status (dropshot): registered endpoint
local_addr = [::1]:53204
method = GET
path = /inventory
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = from 12.0.0 to 14.0.0
|
| 1117 | 2026-03-09T10:56:08.731Z | DEBG | test_update_status (dropshot): registered endpoint
local_addr = [::1]:53204
method = GET
path = /inventory
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = from 11.0.0 to 12.0.0
|
| 1118 | 2026-03-09T10:56:08.731Z | DEBG | test_update_status (dropshot): registered endpoint
local_addr = [::1]:53204
method = GET
path = /inventory
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = from 10.0.0 to 11.0.0
|
| 1119 | 2026-03-09T10:56:08.731Z | DEBG | test_update_status (dropshot): registered endpoint
local_addr = [::1]:53204
method = GET
path = /inventory
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = from 4.0.0 to 10.0.0
|
| 1120 | 2026-03-09T10:56:08.731Z | DEBG | test_update_status (dropshot): registered endpoint
local_addr = [::1]:53204
method = GET
path = /inventory
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all ending with 4.0.0
|
| 1121 | 2026-03-09T10:56:08.731Z | DEBG | test_update_status (dropshot): registered endpoint
local_addr = [::1]:53204
method = DELETE
path = /local-storage
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all starting from 17.0.0
|
| 1122 | 2026-03-09T10:56:08.731Z | DEBG | test_update_status (dropshot): registered endpoint
local_addr = [::1]:53204
method = POST
path = /local-storage
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all starting from 17.0.0
|
| 1123 | 2026-03-09T10:56:08.731Z | DEBG | test_update_status (dropshot): registered endpoint
local_addr = [::1]:53204
method = DELETE
path = /local-storage/{zpool_id}/{dataset_id}
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = from 9.0.0 to 17.0.0
|
| 1124 | 2026-03-09T10:56:08.731Z | DEBG | test_update_status (dropshot): registered endpoint
local_addr = [::1]:53204
method = POST
path = /local-storage/{zpool_id}/{dataset_id}
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = from 9.0.0 to 17.0.0
|
| 1125 | 2026-03-09T10:56:08.731Z | DEBG | test_update_status (dropshot): registered endpoint
local_addr = [::1]:53204
method = GET
path = /network-bootstore-config
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = from 20.0.0 to 23.0.0
|
| 1126 | 2026-03-09T10:56:08.731Z | DEBG | test_update_status (dropshot): registered endpoint
local_addr = [::1]:53204
method = GET
path = /network-bootstore-config
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all ending with 20.0.0
|
| 1127 | 2026-03-09T10:56:08.731Z | DEBG | test_update_status (dropshot): registered endpoint
local_addr = [::1]:53204
method = PUT
path = /network-bootstore-config
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all starting from 26.0.0
|
| 1128 | 2026-03-09T10:56:08.731Z | DEBG | test_update_status (dropshot): registered endpoint
local_addr = [::1]:53204
method = PUT
path = /network-bootstore-config
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = from 25.0.0 to 26.0.0
|
| 1129 | 2026-03-09T10:56:08.731Z | DEBG | test_update_status (dropshot): registered endpoint
local_addr = [::1]:53204
method = PUT
path = /network-bootstore-config
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = from 20.0.0 to 25.0.0
|
| 1130 | 2026-03-09T10:56:08.731Z | DEBG | test_update_status (dropshot): registered endpoint
local_addr = [::1]:53204
method = PUT
path = /network-bootstore-config
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all ending with 20.0.0
|
| 1131 | 2026-03-09T10:56:08.731Z | DEBG | test_update_status (dropshot): registered endpoint
local_addr = [::1]:53204
method = PUT
path = /omicron-config
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all starting from 14.0.0
|
| 1132 | 2026-03-09T10:56:08.731Z | DEBG | test_update_status (dropshot): registered endpoint
local_addr = [::1]:53204
method = PUT
path = /omicron-config
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = from 11.0.0 to 14.0.0
|
| 1133 | 2026-03-09T10:56:08.731Z | DEBG | test_update_status (dropshot): registered endpoint
local_addr = [::1]:53204
method = PUT
path = /omicron-config
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = from 10.0.0 to 11.0.0
|
| 1134 | 2026-03-09T10:56:08.731Z | DEBG | test_update_status (dropshot): registered endpoint
local_addr = [::1]:53204
method = PUT
path = /omicron-config
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = from 4.0.0 to 10.0.0
|
| 1135 | 2026-03-09T10:56:08.731Z | DEBG | test_update_status (dropshot): registered endpoint
local_addr = [::1]:53204
method = PUT
path = /omicron-config
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all ending with 4.0.0
|
| 1136 | 2026-03-09T10:56:08.731Z | DEBG | test_update_status (dropshot): registered endpoint
local_addr = [::1]:53204
method = PUT
path = /probes
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all starting from 10.0.0
|
| 1137 | 2026-03-09T10:56:08.731Z | DEBG | test_update_status (dropshot): registered endpoint
local_addr = [::1]:53204
method = PUT
path = /probes
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = from 6.0.0 to 10.0.0
|
| 1138 | 2026-03-09T10:56:08.731Z | DEBG | test_update_status (dropshot): registered endpoint
local_addr = [::1]:53204
method = POST
path = /rot/{rot}/attest
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all starting from 19.0.0
|
| 1139 | 2026-03-09T10:56:08.731Z | DEBG | test_update_status (dropshot): registered endpoint
local_addr = [::1]:53204
method = GET
path = /rot/{rot}/certificate-chain
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all starting from 19.0.0
|
| 1140 | 2026-03-09T10:56:08.731Z | DEBG | test_update_status (dropshot): registered endpoint
local_addr = [::1]:53204
method = GET
path = /rot/{rot}/measurement-log
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all starting from 19.0.0
|
| 1141 | 2026-03-09T10:56:08.731Z | DEBG | test_update_status (dropshot): registered endpoint
local_addr = [::1]:53204
method = GET
path = /sled-identifiers
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
| 1142 | 2026-03-09T10:56:08.731Z | DEBG | test_update_status (dropshot): registered endpoint
local_addr = [::1]:53204
method = GET
path = /sled-role
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all ending with 8.0.0
|
| 1143 | 2026-03-09T10:56:08.732Z | DEBG | test_update_status (dropshot): registered endpoint
local_addr = [::1]:53204
method = PUT
path = /sleds
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
| 1144 | 2026-03-09T10:56:08.732Z | DEBG | test_update_status (dropshot): registered endpoint
local_addr = [::1]:53204
method = GET
path = /support/dladm-info
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
| 1145 | 2026-03-09T10:56:08.732Z | DEBG | test_update_status (dropshot): registered endpoint
local_addr = [::1]:53204
method = GET
path = /support/health-check
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
| 1146 | 2026-03-09T10:56:08.732Z | DEBG | test_update_status (dropshot): registered endpoint
local_addr = [::1]:53204
method = GET
path = /support/ipadm-info
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
| 1147 | 2026-03-09T10:56:08.732Z | DEBG | test_update_status (dropshot): registered endpoint
local_addr = [::1]:53204
method = GET
path = /support/logs/download/{zone}
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
| 1148 | 2026-03-09T10:56:08.732Z | DEBG | test_update_status (dropshot): registered endpoint
local_addr = [::1]:53204
method = GET
path = /support/logs/zones
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
| 1149 | 2026-03-09T10:56:08.732Z | DEBG | test_update_status (dropshot): registered endpoint
local_addr = [::1]:53204
method = GET
path = /support/nvmeadm-info
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
| 1150 | 2026-03-09T10:56:08.732Z | DEBG | test_update_status (dropshot): registered endpoint
local_addr = [::1]:53204
method = GET
path = /support/pargs-info
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
| 1151 | 2026-03-09T10:56:08.732Z | DEBG | test_update_status (dropshot): registered endpoint
local_addr = [::1]:53204
method = GET
path = /support/pfiles-info
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
| 1152 | 2026-03-09T10:56:08.732Z | DEBG | test_update_status (dropshot): registered endpoint
local_addr = [::1]:53204
method = GET
path = /support/pstack-info
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
| 1153 | 2026-03-09T10:56:08.732Z | DEBG | test_update_status (dropshot): registered endpoint
local_addr = [::1]:53204
method = GET
path = /support/zfs-info
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
| 1154 | 2026-03-09T10:56:08.732Z | DEBG | test_update_status (dropshot): registered endpoint
local_addr = [::1]:53204
method = GET
path = /support/zoneadm-info
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
| 1155 | 2026-03-09T10:56:08.732Z | DEBG | test_update_status (dropshot): registered endpoint
local_addr = [::1]:53204
method = GET
path = /support/zpool-info
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
| 1156 | 2026-03-09T10:56:08.732Z | DEBG | test_update_status (dropshot): registered endpoint
local_addr = [::1]:53204
method = GET
path = /support-bundles/{zpool_id}/{dataset_id}
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
| 1157 | 2026-03-09T10:56:08.732Z | DEBG | test_update_status (dropshot): registered endpoint
local_addr = [::1]:53204
method = DELETE
path = /support-bundles/{zpool_id}/{dataset_id}/{support_bundle_id}
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
| 1158 | 2026-03-09T10:56:08.732Z | DEBG | test_update_status (dropshot): registered endpoint
local_addr = [::1]:53204
method = POST
path = /support-bundles/{zpool_id}/{dataset_id}/{support_bundle_id}
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
| 1159 | 2026-03-09T10:56:08.732Z | DEBG | test_update_status (dropshot): registered endpoint
local_addr = [::1]:53204
method = GET
path = /support-bundles/{zpool_id}/{dataset_id}/{support_bundle_id}/download
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
| 1160 | 2026-03-09T10:56:08.732Z | DEBG | test_update_status (dropshot): registered endpoint
local_addr = [::1]:53204
method = HEAD
path = /support-bundles/{zpool_id}/{dataset_id}/{support_bundle_id}/download
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
| 1161 | 2026-03-09T10:56:08.732Z | DEBG | test_update_status (dropshot): registered endpoint
local_addr = [::1]:53204
method = GET
path = /support-bundles/{zpool_id}/{dataset_id}/{support_bundle_id}/download/{file}
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
| 1162 | 2026-03-09T10:56:08.732Z | DEBG | test_update_status (dropshot): registered endpoint
local_addr = [::1]:53204
method = HEAD
path = /support-bundles/{zpool_id}/{dataset_id}/{support_bundle_id}/download/{file}
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
| 1163 | 2026-03-09T10:56:08.732Z | DEBG | test_update_status (dropshot): registered endpoint
local_addr = [::1]:53204
method = POST
path = /support-bundles/{zpool_id}/{dataset_id}/{support_bundle_id}/finalize
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
| 1164 | 2026-03-09T10:56:08.732Z | DEBG | test_update_status (dropshot): registered endpoint
local_addr = [::1]:53204
method = GET
path = /support-bundles/{zpool_id}/{dataset_id}/{support_bundle_id}/index
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
| 1165 | 2026-03-09T10:56:08.732Z | DEBG | test_update_status (dropshot): registered endpoint
local_addr = [::1]:53204
method = HEAD
path = /support-bundles/{zpool_id}/{dataset_id}/{support_bundle_id}/index
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
| 1166 | 2026-03-09T10:56:08.732Z | DEBG | test_update_status (dropshot): registered endpoint
local_addr = [::1]:53204
method = PUT
path = /support-bundles/{zpool_id}/{dataset_id}/{support_bundle_id}/transfer
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
| 1167 | 2026-03-09T10:56:08.732Z | DEBG | test_update_status (dropshot): registered endpoint
local_addr = [::1]:53204
method = POST
path = /switch-ports
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all starting from 20.0.0
|
| 1168 | 2026-03-09T10:56:08.732Z | DEBG | test_update_status (dropshot): registered endpoint
local_addr = [::1]:53204
method = POST
path = /switch-ports
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all ending with 20.0.0
|
| 1169 | 2026-03-09T10:56:08.732Z | DEBG | test_update_status (dropshot): registered endpoint
local_addr = [::1]:53204
method = PUT
path = /trust-quorum/commit
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all starting from 13.0.0
|
| 1170 | 2026-03-09T10:56:08.732Z | DEBG | test_update_status (dropshot): registered endpoint
local_addr = [::1]:53204
method = POST
path = /trust-quorum/configuration
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all starting from 13.0.0
|
| 1171 | 2026-03-09T10:56:08.732Z | DEBG | test_update_status (dropshot): registered endpoint
local_addr = [::1]:53204
method = GET
path = /trust-quorum/coordinator-status
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all starting from 13.0.0
|
| 1172 | 2026-03-09T10:56:08.733Z | DEBG | test_update_status (dropshot): registered endpoint
local_addr = [::1]:53204
method = GET
path = /trust-quorum/network-config
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all starting from 15.0.0
|
| 1173 | 2026-03-09T10:56:08.733Z | DEBG | test_update_status (dropshot): registered endpoint
local_addr = [::1]:53204
method = PUT
path = /trust-quorum/network-config
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all starting from 15.0.0
|
| 1174 | 2026-03-09T10:56:08.733Z | DEBG | test_update_status (dropshot): registered endpoint
local_addr = [::1]:53204
method = PUT
path = /trust-quorum/prepare-and-commit
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all starting from 13.0.0
|
| 1175 | 2026-03-09T10:56:08.733Z | DEBG | test_update_status (dropshot): registered endpoint
local_addr = [::1]:53204
method = PUT
path = /trust-quorum/proxy/commit
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all starting from 13.0.0
|
| 1176 | 2026-03-09T10:56:08.733Z | DEBG | test_update_status (dropshot): registered endpoint
local_addr = [::1]:53204
method = PUT
path = /trust-quorum/proxy/prepare-and-commit
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all starting from 13.0.0
|
| 1177 | 2026-03-09T10:56:08.733Z | DEBG | test_update_status (dropshot): registered endpoint
local_addr = [::1]:53204
method = GET
path = /trust-quorum/proxy/status
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all starting from 13.0.0
|
| 1178 | 2026-03-09T10:56:08.733Z | DEBG | test_update_status (dropshot): registered endpoint
local_addr = [::1]:53204
method = GET
path = /trust-quorum/status
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all starting from 15.0.0
|
| 1179 | 2026-03-09T10:56:08.733Z | DEBG | test_update_status (dropshot): registered endpoint
local_addr = [::1]:53204
method = POST
path = /trust-quorum/upgrade
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all starting from 13.0.0
|
| 1180 | 2026-03-09T10:56:08.733Z | DEBG | test_update_status (dropshot): registered endpoint
local_addr = [::1]:53204
method = DELETE
path = /v2p
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
| 1181 | 2026-03-09T10:56:08.733Z | DEBG | test_update_status (dropshot): registered endpoint
local_addr = [::1]:53204
method = GET
path = /v2p
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
| 1182 | 2026-03-09T10:56:08.733Z | DEBG | test_update_status (dropshot): registered endpoint
local_addr = [::1]:53204
method = PUT
path = /v2p
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
| 1183 | 2026-03-09T10:56:08.733Z | DEBG | test_update_status (dropshot): registered endpoint
local_addr = [::1]:53204
method = DELETE
path = /vmms/{propolis_id}
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
| 1184 | 2026-03-09T10:56:08.733Z | DEBG | test_update_status (dropshot): registered endpoint
local_addr = [::1]:53204
method = PUT
path = /vmms/{propolis_id}
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all starting from 18.0.0
|
| 1185 | 2026-03-09T10:56:08.733Z | DEBG | test_update_status (dropshot): registered endpoint
local_addr = [::1]:53204
method = PUT
path = /vmms/{propolis_id}
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = from 17.0.0 to 18.0.0
|
| 1186 | 2026-03-09T10:56:08.733Z | DEBG | test_update_status (dropshot): registered endpoint
local_addr = [::1]:53204
method = PUT
path = /vmms/{propolis_id}
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = from 11.0.0 to 17.0.0
|
| 1187 | 2026-03-09T10:56:08.733Z | DEBG | test_update_status (dropshot): registered endpoint
local_addr = [::1]:53204
method = PUT
path = /vmms/{propolis_id}
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = from 10.0.0 to 11.0.0
|
| 1188 | 2026-03-09T10:56:08.733Z | DEBG | test_update_status (dropshot): registered endpoint
local_addr = [::1]:53204
method = PUT
path = /vmms/{propolis_id}
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = from 9.0.0 to 10.0.0
|
| 1189 | 2026-03-09T10:56:08.733Z | DEBG | test_update_status (dropshot): registered endpoint
local_addr = [::1]:53204
method = PUT
path = /vmms/{propolis_id}
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = from 7.0.0 to 9.0.0
|
| 1190 | 2026-03-09T10:56:08.733Z | DEBG | test_update_status (dropshot): registered endpoint
local_addr = [::1]:53204
method = PUT
path = /vmms/{propolis_id}
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all ending with 7.0.0
|
| 1191 | 2026-03-09T10:56:08.733Z | DEBG | test_update_status (dropshot): registered endpoint
local_addr = [::1]:53204
method = DELETE
path = /vmms/{propolis_id}/attached-subnets
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all starting from 18.0.0
|
| 1192 | 2026-03-09T10:56:08.733Z | DEBG | test_update_status (dropshot): registered endpoint
local_addr = [::1]:53204
method = POST
path = /vmms/{propolis_id}/attached-subnets
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all starting from 18.0.0
|
| 1193 | 2026-03-09T10:56:08.733Z | DEBG | test_update_status (dropshot): registered endpoint
local_addr = [::1]:53204
method = PUT
path = /vmms/{propolis_id}/attached-subnets
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all starting from 18.0.0
|
| 1194 | 2026-03-09T10:56:08.733Z | DEBG | test_update_status (dropshot): registered endpoint
local_addr = [::1]:53204
method = DELETE
path = /vmms/{propolis_id}/attached-subnets/{subnet}
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all starting from 18.0.0
|
| 1195 | 2026-03-09T10:56:08.733Z | DEBG | test_update_status (dropshot): registered endpoint
local_addr = [::1]:53204
method = POST
path = /vmms/{propolis_id}/disks/{disk_id}/snapshot
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
| 1196 | 2026-03-09T10:56:08.733Z | DEBG | test_update_status (dropshot): registered endpoint
local_addr = [::1]:53204
method = DELETE
path = /vmms/{propolis_id}/external-ip
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
| 1197 | 2026-03-09T10:56:08.733Z | DEBG | test_update_status (dropshot): registered endpoint
local_addr = [::1]:53204
method = PUT
path = /vmms/{propolis_id}/external-ip
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
| 1198 | 2026-03-09T10:56:08.733Z | DEBG | test_update_status (dropshot): registered endpoint
local_addr = [::1]:53204
method = DELETE
path = /vmms/{propolis_id}/multicast-group
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all starting from 7.0.0
|
| 1199 | 2026-03-09T10:56:08.733Z | DEBG | test_update_status (dropshot): registered endpoint
local_addr = [::1]:53204
method = PUT
path = /vmms/{propolis_id}/multicast-group
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all starting from 7.0.0
|
| 1200 | 2026-03-09T10:56:08.733Z | DEBG | test_update_status (dropshot): registered endpoint
local_addr = [::1]:53204
method = POST
path = /vmms/{propolis_id}/poke
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
| 1201 | 2026-03-09T10:56:08.733Z | DEBG | test_update_status (dropshot): registered endpoint
local_addr = [::1]:53204
method = POST
path = /vmms/{propolis_id}/poke-single-step
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
| 1202 | 2026-03-09T10:56:08.733Z | DEBG | test_update_status (dropshot): registered endpoint
local_addr = [::1]:53204
method = POST
path = /vmms/{propolis_id}/sim-migration-source
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
| 1203 | 2026-03-09T10:56:08.733Z | DEBG | test_update_status (dropshot): registered endpoint
local_addr = [::1]:53204
method = GET
path = /vmms/{propolis_id}/state
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
| 1204 | 2026-03-09T10:56:08.733Z | DEBG | test_update_status (dropshot): registered endpoint
local_addr = [::1]:53204
method = PUT
path = /vmms/{propolis_id}/state
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
| 1205 | 2026-03-09T10:56:08.733Z | DEBG | test_update_status (dropshot): registered endpoint
local_addr = [::1]:53204
method = PUT
path = /vpc/{vpc_id}/firewall/rules
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all starting from 10.0.0
|
| 1206 | 2026-03-09T10:56:08.733Z | DEBG | test_update_status (dropshot): registered endpoint
local_addr = [::1]:53204
method = PUT
path = /vpc/{vpc_id}/firewall/rules
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all ending with 10.0.0
|
| 1207 | 2026-03-09T10:56:08.733Z | DEBG | test_update_status (dropshot): registered endpoint
local_addr = [::1]:53204
method = GET
path = /vpc-routes
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
| 1208 | 2026-03-09T10:56:08.733Z | DEBG | test_update_status (dropshot): registered endpoint
local_addr = [::1]:53204
method = PUT
path = /vpc-routes
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
| 1209 | 2026-03-09T10:56:08.733Z | DEBG | test_update_status (dropshot): registered endpoint
local_addr = [::1]:53204
method = GET
path = /zones
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
| 1210 | 2026-03-09T10:56:08.733Z | DEBG | test_update_status (dropshot): registered endpoint
local_addr = [::1]:53204
method = POST
path = /zones/bundle-cleanup
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
| 1211 | 2026-03-09T10:56:08.734Z | DEBG | test_update_status (dropshot): registered endpoint
local_addr = [::1]:53204
method = GET
path = /zones/bundle-cleanup/context
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
| 1212 | 2026-03-09T10:56:08.734Z | DEBG | test_update_status (dropshot): registered endpoint
local_addr = [::1]:53204
method = PUT
path = /zones/bundle-cleanup/context
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
| 1213 | 2026-03-09T10:56:08.734Z | DEBG | test_update_status (dropshot): registered endpoint
local_addr = [::1]:53204
method = GET
path = /zones/bundle-cleanup/utilization
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
| 1214 | 2026-03-09T10:56:08.734Z | DEBG | test_update_status (dropshot): registered endpoint
local_addr = [::1]:53204
method = GET
path = /zones/bundles
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
| 1215 | 2026-03-09T10:56:08.734Z | DEBG | test_update_status (dropshot): registered endpoint
local_addr = [::1]:53204
method = GET
path = /zones/bundles/{zone_name}
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
| 1216 | 2026-03-09T10:56:08.734Z | DEBG | test_update_status (dropshot): registered endpoint
local_addr = [::1]:53204
method = DELETE
path = /zones/bundles/{zone_name}/{bundle_id}
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
| 1217 | 2026-03-09T10:56:08.734Z | DEBG | test_update_status (dropshot): registered endpoint
local_addr = [::1]:53204
method = GET
path = /zones/bundles/{zone_name}/{bundle_id}
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
| 1218 | 2026-03-09T10:56:08.734Z | INFO | test_update_status (dropshot): listening
local_addr = [::1]:53204
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
| 1219 | 2026-03-09T10:56:08.734Z | DEBG | test_update_status (dropshot): successfully registered DTrace USDT probes
local_addr = [::1]:53204
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
| 1220 | 2026-03-09T10:56:08.734Z | DEBG | test_update_status (BackgroundTasks): authorize result
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = probe_distributor
resource = Fleet
result = Ok(())
|
| 1221 | 2026-03-09T10:56:08.734Z | TRAC | test_update_status (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = probe_distributor
resource = Database
|
| 1222 | 2026-03-09T10:56:08.734Z | DEBG | test_update_status (BackgroundTasks): roles
background_task = probe_distributor
roles = RoleSet { roles: {} }
|
| 1223 | 2026-03-09T10:56:08.734Z | DEBG | test_update_status (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = probe_distributor
resource = Database
result = Ok(())
|
| 1224 | 2026-03-09T10:56:08.734Z | DEBG | test_update_status (BackgroundTasks): activation complete
background_task = fm_sitrep_loader
elapsed = 413.322211ms
iteration = 1
status = "NoSitrep"
|
| 1225 | 2026-03-09T10:56:08.734Z | TRAC | test_update_status (BackgroundTasks): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
|
| 1226 | 2026-03-09T10:56:08.734Z | TRAC | test_update_status (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = service_firewall_rule_propagation
resource_id = 001de000-4401-4000-8000-000000000000
resource_type = Project
|
| 1227 | 2026-03-09T10:56:08.734Z | TRAC | test_update_status (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
|
| 1228 | 2026-03-09T10:56:08.734Z | DEBG | test_update_status (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {} }
|
| 1229 | 2026-03-09T10:56:08.734Z | DEBG | test_update_status (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
result = Ok(())
|
| 1230 | 2026-03-09T10:56:08.734Z | DEBG | test_update_status (BackgroundTasks): activation complete
background_task = region_replacement
elapsed = 455.361462ms
iteration = 1
status = {"errors":[],"requests_completed_ok":[],"requests_created_ok":[],"start_invoked_ok":[]}
|
| 1231 | 2026-03-09T10:56:08.736Z | WARN | test_update_status (BackgroundTasks): failed to read DNS config
background_task = dns_config_external
dns_group = external
error = Internal Error: expected exactly one latest version for DNS group External, found 0
|
| 1232 | 2026-03-09T10:56:08.736Z | DEBG | test_update_status (BackgroundTasks): activation complete
background_task = dns_config_external
dns_group = external
elapsed = 456.441043ms
iteration = 1
status = {"error":"failed to read DNS config: Internal Error: expected exactly one latest version for DNS group External, found 0"}
|
| 1233 | 2026-03-09T10:56:08.742Z | TRAC | test_update_status (BackgroundTasks): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = support_bundle_collector
resource = Fleet
|
| 1234 | 2026-03-09T10:56:08.742Z | TRAC | test_update_status (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = support_bundle_collector
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 1235 | 2026-03-09T10:56:08.742Z | TRAC | test_update_status (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = support_bundle_collector
resource = Database
|
| 1236 | 2026-03-09T10:56:08.742Z | DEBG | test_update_status (BackgroundTasks): roles
background_task = support_bundle_collector
roles = RoleSet { roles: {} }
|
| 1237 | 2026-03-09T10:56:08.742Z | DEBG | test_update_status (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = support_bundle_collector
resource = Database
result = Ok(())
|
| 1238 | 2026-03-09T10:56:08.743Z | DEBG | test_update_status (omicron_sled_agent::sim::Server): contacting server nexus
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
| 1239 | 2026-03-09T10:56:08.746Z | DEBG | test_update_status (NexusClient): client request
body = Some(Body)
method = POST
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
uri = http://127.0.0.1:38163/sled-agents/b6d65341-167c-41df-9b5c-41cded99c229
|
| 1240 | 2026-03-09T10:56:08.750Z | TRAC | test_update_status (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = region_snapshot_replacement_step
resource = Database
|
| 1241 | 2026-03-09T10:56:08.750Z | DEBG | test_update_status (BackgroundTasks): roles
background_task = region_snapshot_replacement_step
roles = RoleSet { roles: {} }
|
| 1242 | 2026-03-09T10:56:08.751Z | DEBG | test_update_status (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = region_snapshot_replacement_step
resource = Database
result = Ok(())
|
| 1243 | 2026-03-09T10:56:08.751Z | INFO | test_update_status (BackgroundTasks): Loaded 0 active trust quorum configurations from database
background_task = trust_quorum_manager
bgtask = TrustQuorumManager
|
| 1244 | 2026-03-09T10:56:08.751Z | DEBG | test_update_status (BackgroundTasks): activation complete
background_task = trust_quorum_manager
elapsed = 492.781603ms
iteration = 1
status = {"PerRackStatus":{"errors":[],"statuses":[]}}
|
| 1245 | 2026-03-09T10:56:08.754Z | INFO | test_update_status (dropshot_internal): accepted connection
local_addr = 127.0.0.1:38163
remote_addr = 127.0.0.1:60472
|
| 1246 | 2026-03-09T10:56:08.754Z | TRAC | test_update_status (dropshot_internal): incoming request
local_addr = 127.0.0.1:38163
method = POST
remote_addr = 127.0.0.1:60472
req_id = 373a617e-e6c3-4cbd-8e06-9ba7d2d8649b
uri = /sled-agents/b6d65341-167c-41df-9b5c-41cded99c229
|
| 1247 | 2026-03-09T10:56:08.754Z | DEBG | test_update_status (dropshot_internal): determined request API version
local_addr = 127.0.0.1:38163
method = POST
remote_addr = 127.0.0.1:60472
req_id = 373a617e-e6c3-4cbd-8e06-9ba7d2d8649b
uri = /sled-agents/b6d65341-167c-41df-9b5c-41cded99c229
version = 1.0.0
|
| 1248 | 2026-03-09T10:56:08.757Z | TRAC | test_update_status (BackgroundTasks): authorize begin
action = Modify
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = fm_sitrep_gc
resource = Fleet
|
| 1249 | 2026-03-09T10:56:08.757Z | TRAC | test_update_status (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = fm_sitrep_gc
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 1250 | 2026-03-09T10:56:08.757Z | TRAC | test_update_status (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = fm_sitrep_gc
resource = Database
|
| 1251 | 2026-03-09T10:56:08.757Z | DEBG | test_update_status (BackgroundTasks): roles
background_task = fm_sitrep_gc
roles = RoleSet { roles: {} }
|
| 1252 | 2026-03-09T10:56:08.758Z | DEBG | test_update_status (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = fm_sitrep_gc
resource = Database
result = Ok(())
|
| 1253 | 2026-03-09T10:56:08.761Z | INFO | test_update_status (nexus): registered sled agent
sled_uuid = b6d65341-167c-41df-9b5c-41cded99c229
|
| 1254 | 2026-03-09T10:56:08.761Z | DEBG | test_update_status (BackgroundTasks): activation complete
background_task = inventory_loader
elapsed = 445.89257ms
iteration = 1
status = "NoCollections"
|
| 1255 | 2026-03-09T10:56:08.761Z | WARN | test_update_status (BackgroundTasks): failed to read DNS config
background_task = dns_config_internal
dns_group = internal
error = Internal Error: expected exactly one latest version for DNS group Internal, found 0
|
| 1256 | 2026-03-09T10:56:08.761Z | DEBG | test_update_status (BackgroundTasks): activation complete
background_task = dns_config_internal
dns_group = internal
elapsed = 493.710748ms
iteration = 1
status = {"error":"failed to read DNS config: Internal Error: expected exactly one latest version for DNS group Internal, found 0"}
|
| 1257 | 2026-03-09T10:56:08.761Z | DEBG | test_update_status (BackgroundTasks): roles
background_task = support_bundle_collector
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 1258 | 2026-03-09T10:56:08.764Z | DEBG | test_update_status (BackgroundTasks): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = support_bundle_collector
resource = Fleet
result = Ok(())
|
| 1259 | 2026-03-09T10:56:08.764Z | TRAC | test_update_status (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = support_bundle_collector
resource = Database
|
| 1260 | 2026-03-09T10:56:08.764Z | DEBG | test_update_status (BackgroundTasks): roles
background_task = support_bundle_collector
roles = RoleSet { roles: {} }
|
| 1261 | 2026-03-09T10:56:08.765Z | DEBG | test_update_status (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = support_bundle_collector
resource = Database
result = Ok(())
|
| 1262 | 2026-03-09T10:56:08.765Z | DEBG | test_update_status (BackgroundTasks): roles
background_task = external_endpoints
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 1263 | 2026-03-09T10:56:08.769Z | DEBG | test_update_status (BackgroundTasks): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = external_endpoints
resource = DnsConfig
result = Ok(())
|
| 1264 | 2026-03-09T10:56:08.769Z | TRAC | test_update_status (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = external_endpoints
resource = Database
|
| 1265 | 2026-03-09T10:56:08.769Z | DEBG | test_update_status (BackgroundTasks): roles
background_task = external_endpoints
roles = RoleSet { roles: {} }
|
| 1266 | 2026-03-09T10:56:08.770Z | DEBG | test_update_status (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = external_endpoints
resource = Database
result = Ok(())
|
| 1267 | 2026-03-09T10:56:08.770Z | TRAC | test_update_status (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = service_firewall_rule_propagation
resource_id = 001de000-5110-4000-8000-000000000001
resource_type = Silo
|
| 1268 | 2026-03-09T10:56:08.770Z | TRAC | test_update_status (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
|
| 1269 | 2026-03-09T10:56:08.770Z | DEBG | test_update_status (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {} }
|
| 1270 | 2026-03-09T10:56:08.771Z | DEBG | test_update_status (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
result = Ok(())
|
| 1271 | 2026-03-09T10:56:08.774Z | TRAC | test_update_status (BackgroundTasks): webhook dispatching completed successfully
background_task = alert_dispatcher
events_dispatched = 0
events_without_receivers = 0
|
| 1272 | 2026-03-09T10:56:08.774Z | DEBG | test_update_status (BackgroundTasks): activation complete
background_task = alert_dispatcher
elapsed = 410.943732ms
iteration = 1
status = {"dispatched":[],"errors":[],"glob_version":"236.0.0","globs_reprocessed":{},"no_receivers":[]}
|
| 1273 | 2026-03-09T10:56:08.824Z | TRAC | test_update_status (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = service_firewall_rule_propagation
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 1274 | 2026-03-09T10:56:08.824Z | TRAC | test_update_status (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
|
| 1275 | 2026-03-09T10:56:08.824Z | DEBG | test_update_status (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {} }
|
| 1276 | 2026-03-09T10:56:08.825Z | DEBG | test_update_status (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
result = Ok(())
|
| 1277 | 2026-03-09T10:56:08.829Z | DEBG | test_update_status (BackgroundTasks): activation complete
background_task = region_snapshot_replacement_start
elapsed = 516.07288ms
iteration = 1
status = {"errors":[],"requests_completed_ok":[],"requests_created_ok":[],"start_invoked_ok":[]}
|
| 1278 | 2026-03-09T10:56:08.852Z | INFO | test_update_status (BackgroundTasks): all instance checks complete
background_task = instance_watcher
pruned_instances = 0
total_completed = 0
total_failed = 0
total_incomplete = 0
total_instances = 0
update_sagas_queued = 0
|
| 1279 | 2026-03-09T10:56:08.853Z | DEBG | test_update_status (BackgroundTasks): activation complete
background_task = instance_watcher
elapsed = 569.914139ms
iteration = 1
status = {"failed_checks":{},"incomplete_checks":{},"instance_states":{},"pruned_instances":0,"total_instances":0,"update_sagas_queued":0}
|
| 1280 | 2026-03-09T10:56:08.853Z | DEBG | test_update_status (BackgroundTasks): roles
background_task = tuf_repo_pruner
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 1281 | 2026-03-09T10:56:08.854Z | DEBG | test_update_status (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 1282 | 2026-03-09T10:56:08.862Z | DEBG | test_update_status (BackgroundTasks): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = tuf_repo_pruner
resource = Fleet
result = Ok(())
|
| 1283 | 2026-03-09T10:56:08.862Z | TRAC | test_update_status (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = tuf_repo_pruner
resource = Database
|
| 1284 | 2026-03-09T10:56:08.863Z | DEBG | test_update_status (BackgroundTasks): roles
background_task = tuf_repo_pruner
roles = RoleSet { roles: {} }
|
| 1285 | 2026-03-09T10:56:08.863Z | DEBG | test_update_status (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = tuf_repo_pruner
resource = Database
result = Ok(())
|
| 1286 | 2026-03-09T10:56:08.868Z | DEBG | test_update_status (BackgroundTasks): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
result = Ok(())
|
| 1287 | 2026-03-09T10:56:08.868Z | TRAC | test_update_status (BackgroundTasks): successful lookup of siloed resource "Vpc" using built-in user
background_task = service_firewall_rule_propagation
|
| 1288 | 2026-03-09T10:56:08.868Z | TRAC | test_update_status (BackgroundTasks): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
|
| 1289 | 2026-03-09T10:56:08.868Z | TRAC | test_update_status (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = service_firewall_rule_propagation
resource_id = 001de000-4401-4000-8000-000000000000
resource_type = Project
|
| 1290 | 2026-03-09T10:56:08.868Z | TRAC | test_update_status (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
|
| 1291 | 2026-03-09T10:56:08.868Z | DEBG | test_update_status (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {} }
|
| 1292 | 2026-03-09T10:56:08.868Z | DEBG | test_update_status (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
result = Ok(())
|
| 1293 | 2026-03-09T10:56:08.930Z | TRAC | test_update_status (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = service_firewall_rule_propagation
resource_id = 001de000-5110-4000-8000-000000000001
resource_type = Silo
|
| 1294 | 2026-03-09T10:56:08.931Z | TRAC | test_update_status (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
|
| 1295 | 2026-03-09T10:56:08.931Z | DEBG | test_update_status (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {} }
|
| 1296 | 2026-03-09T10:56:08.931Z | DEBG | test_update_status (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
result = Ok(())
|
| 1297 | 2026-03-09T10:56:08.956Z | TRAC | test_update_status (BackgroundTasks): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = tuf_repo_pruner
resource = Fleet
|
| 1298 | 2026-03-09T10:56:08.957Z | TRAC | test_update_status (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = tuf_repo_pruner
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 1299 | 2026-03-09T10:56:08.957Z | TRAC | test_update_status (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = tuf_repo_pruner
resource = Database
|
| 1300 | 2026-03-09T10:56:08.957Z | DEBG | test_update_status (BackgroundTasks): roles
background_task = tuf_repo_pruner
roles = RoleSet { roles: {} }
|
| 1301 | 2026-03-09T10:56:08.957Z | DEBG | test_update_status (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = tuf_repo_pruner
resource = Database
result = Ok(())
|
| 1302 | 2026-03-09T10:56:08.958Z | TRAC | test_update_status (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = service_firewall_rule_propagation
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 1303 | 2026-03-09T10:56:08.958Z | TRAC | test_update_status (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
|
| 1304 | 2026-03-09T10:56:08.958Z | DEBG | test_update_status (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {} }
|
| 1305 | 2026-03-09T10:56:08.959Z | DEBG | test_update_status (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
result = Ok(())
|
| 1306 | 2026-03-09T10:56:08.960Z | DEBG | test_update_status (BackgroundTasks): roles
background_task = fm_sitrep_gc
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 1307 | 2026-03-09T10:56:08.961Z | DEBG | test_update_status (BackgroundTasks): activation complete
background_task = region_snapshot_replacement_step
elapsed = 706.920793ms
iteration = 1
status = {"errors":[],"step_garbage_collect_invoked_ok":[],"step_invoked_ok":[],"step_records_created_ok":[],"step_set_volume_deleted_ok":[]}
|
| 1308 | 2026-03-09T10:56:08.962Z | DEBG | test_update_status (BackgroundTasks): authorize result
action = Modify
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = fm_sitrep_gc
resource = Fleet
result = Ok(())
|
| 1309 | 2026-03-09T10:56:08.965Z | DEBG | test_update_status (BackgroundTasks): listed attached subnets
background_task = attached_subnet_manager
n_subnets = 0
|
| 1310 | 2026-03-09T10:56:08.966Z | DEBG | test_update_status (BackgroundTasks): activation complete
background_task = attached_subnet_manager
elapsed = 602.65908ms
iteration = 1
status = {"db_error":null,"dendrite":{},"sled":{}}
|
| 1311 | 2026-03-09T10:56:08.968Z | DEBG | test_update_status (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 1312 | 2026-03-09T10:56:08.968Z | DEBG | test_update_status (BackgroundTasks): roles
background_task = tuf_repo_pruner
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 1313 | 2026-03-09T10:56:08.976Z | DEBG | test_update_status (BackgroundTasks): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = tuf_repo_pruner
resource = Fleet
result = Ok(())
|
| 1314 | 2026-03-09T10:56:08.976Z | TRAC | test_update_status (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = tuf_repo_pruner
resource = Database
|
| 1315 | 2026-03-09T10:56:08.976Z | DEBG | test_update_status (BackgroundTasks): roles
background_task = tuf_repo_pruner
roles = RoleSet { roles: {} }
|
| 1316 | 2026-03-09T10:56:08.977Z | DEBG | test_update_status (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = tuf_repo_pruner
resource = Database
result = Ok(())
|
| 1317 | 2026-03-09T10:56:08.978Z | DEBG | test_update_status (BackgroundTasks): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
result = Ok(())
|
| 1318 | 2026-03-09T10:56:08.978Z | TRAC | test_update_status (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
|
| 1319 | 2026-03-09T10:56:08.978Z | DEBG | test_update_status (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {} }
|
| 1320 | 2026-03-09T10:56:08.979Z | DEBG | test_update_status (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
result = Ok(())
|
| 1321 | 2026-03-09T10:56:09.043Z | TRAC | test_update_status (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
|
| 1322 | 2026-03-09T10:56:09.043Z | DEBG | test_update_status (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {} }
|
| 1323 | 2026-03-09T10:56:09.049Z | DEBG | test_update_status (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
result = Ok(())
|
| 1324 | 2026-03-09T10:56:09.049Z | INFO | test_update_status (BackgroundTasks): No bundles to collect
background_task = support_bundle_collector
|
| 1325 | 2026-03-09T10:56:09.049Z | DEBG | test_update_status (BackgroundTasks): activation complete
background_task = support_bundle_collector
elapsed = 771.051936ms
iteration = 1
status = {"cleanup_err":null,"cleanup_report":{"db_destroying_bundles_removed":0,"db_failing_bundles_updated":0,"sled_bundles_delete_failed":0,"sled_bundles_deleted_not_found":0,"sled_bundles_deleted_ok":0},"collection_err":null,"collection_report":null}
|
| 1326 | 2026-03-09T10:56:09.081Z | WARN | test_update_status (BackgroundTasks): failed to read Silo/DNS/TLS configuration
background_task = external_endpoints
error = Internal Error: expected at least one external DNS zone
|
| 1327 | 2026-03-09T10:56:09.081Z | DEBG | test_update_status (BackgroundTasks): activation complete
background_task = external_endpoints
elapsed = 792.231232ms
iteration = 1
status = {"error":"failed to read Silo/DNS/TLS configuration: Internal Error: expected at least one external DNS zone"}
|
| 1328 | 2026-03-09T10:56:09.082Z | TRAC | test_update_status (BackgroundTasks): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = tuf_repo_pruner
resource = TargetReleaseConfig
|
| 1329 | 2026-03-09T10:56:09.082Z | TRAC | test_update_status (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = tuf_repo_pruner
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 1330 | 2026-03-09T10:56:09.082Z | TRAC | test_update_status (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = tuf_repo_pruner
resource = Database
|
| 1331 | 2026-03-09T10:56:09.082Z | DEBG | test_update_status (BackgroundTasks): roles
background_task = tuf_repo_pruner
roles = RoleSet { roles: {} }
|
| 1332 | 2026-03-09T10:56:09.083Z | DEBG | test_update_status (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = tuf_repo_pruner
resource = Database
result = Ok(())
|
| 1333 | 2026-03-09T10:56:09.107Z | TRAC | test_update_status (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
|
| 1334 | 2026-03-09T10:56:09.117Z | DEBG | test_update_status (BackgroundTasks): activation complete
background_task = vpc_route_manager
elapsed = 811.180955ms
iteration = 1
status = {}
|
| 1335 | 2026-03-09T10:56:09.117Z | DEBG | test_update_status (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {} }
|
| 1336 | 2026-03-09T10:56:09.117Z | TRAC | test_update_status (BackgroundTasks): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = tuf_artifact_replication
resource = Fleet
|
| 1337 | 2026-03-09T10:56:09.117Z | TRAC | test_update_status (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = tuf_artifact_replication
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 1338 | 2026-03-09T10:56:09.117Z | TRAC | test_update_status (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = tuf_artifact_replication
resource = Database
|
| 1339 | 2026-03-09T10:56:09.117Z | DEBG | test_update_status (BackgroundTasks): roles
background_task = tuf_artifact_replication
roles = RoleSet { roles: {} }
|
| 1340 | 2026-03-09T10:56:09.118Z | DEBG | test_update_status (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
result = Ok(())
|
| 1341 | 2026-03-09T10:56:09.118Z | DEBG | test_update_status (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = tuf_artifact_replication
resource = Database
result = Ok(())
|
| 1342 | 2026-03-09T10:56:09.119Z | INFO | test_update_status (BackgroundTasks): finished distributing probes to sleds
background_task = probe_distributor
n_pushed_probes = 0
|
| 1343 | 2026-03-09T10:56:09.119Z | DEBG | test_update_status (BackgroundTasks): activation complete
background_task = probe_distributor
elapsed = 797.398546ms
iteration = 1
status = {"errors":[],"probes_by_sled":{}}
|
| 1344 | 2026-03-09T10:56:09.119Z | DEBG | test_update_status (BackgroundTasks): activating
background_task = vpc_route_manager
iteration = 2
reason = Dependency
|
| 1345 | 2026-03-09T10:56:09.119Z | INFO | test_update_status (BackgroundTasks): VPC route manager running
background_task = vpc_route_manager
|
| 1346 | 2026-03-09T10:56:09.119Z | TRAC | test_update_status (BackgroundTasks): authorize begin
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = vpc_route_manager
resource = Fleet
|
| 1347 | 2026-03-09T10:56:09.119Z | TRAC | test_update_status (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = vpc_route_manager
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 1348 | 2026-03-09T10:56:09.119Z | TRAC | test_update_status (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = vpc_route_manager
resource = Database
|
| 1349 | 2026-03-09T10:56:09.119Z | DEBG | test_update_status (BackgroundTasks): roles
background_task = vpc_route_manager
roles = RoleSet { roles: {} }
|
| 1350 | 2026-03-09T10:56:09.120Z | DEBG | test_update_status (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = vpc_route_manager
resource = Database
result = Ok(())
|
| 1351 | 2026-03-09T10:56:09.164Z | DEBG | test_update_status (BackgroundTasks): roles
background_task = tuf_repo_pruner
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 1352 | 2026-03-09T10:56:09.168Z | DEBG | test_update_status (BackgroundTasks): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = tuf_repo_pruner
resource = TargetReleaseConfig
result = Ok(())
|
| 1353 | 2026-03-09T10:56:09.168Z | TRAC | test_update_status (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = tuf_repo_pruner
resource = Database
|
| 1354 | 2026-03-09T10:56:09.168Z | DEBG | test_update_status (BackgroundTasks): roles
background_task = tuf_repo_pruner
roles = RoleSet { roles: {} }
|
| 1355 | 2026-03-09T10:56:09.168Z | DEBG | test_update_status (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = tuf_repo_pruner
resource = Database
result = Ok(())
|
| 1356 | 2026-03-09T10:56:09.169Z | TRAC | test_update_status (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
|
| 1357 | 2026-03-09T10:56:09.169Z | DEBG | test_update_status (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {} }
|
| 1358 | 2026-03-09T10:56:09.170Z | DEBG | test_update_status (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
result = Ok(())
|
| 1359 | 2026-03-09T10:56:09.173Z | DEBG | test_update_status (BackgroundTasks): roles
background_task = vpc_route_manager
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 1360 | 2026-03-09T10:56:09.176Z | DEBG | test_update_status (BackgroundTasks): authorize result
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = vpc_route_manager
resource = Fleet
result = Ok(())
|
| 1361 | 2026-03-09T10:56:09.176Z | TRAC | test_update_status (BackgroundTasks): authorize begin
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = vpc_route_manager
resource = Fleet
|
| 1362 | 2026-03-09T10:56:09.176Z | TRAC | test_update_status (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = vpc_route_manager
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 1363 | 2026-03-09T10:56:09.176Z | TRAC | test_update_status (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = vpc_route_manager
resource = Database
|
| 1364 | 2026-03-09T10:56:09.176Z | DEBG | test_update_status (BackgroundTasks): roles
background_task = vpc_route_manager
roles = RoleSet { roles: {} }
|
| 1365 | 2026-03-09T10:56:09.176Z | DEBG | test_update_status (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = vpc_route_manager
resource = Database
result = Ok(())
|
| 1366 | 2026-03-09T10:56:09.217Z | INFO | test_update_status (BackgroundTasks): tuf_repo_prune decision
background_task = tuf_repo_pruner
status = TufRepoPrunerDetails { nkeep_recent_releases: 3, nkeep_recent_uploads: 2, repos_keep_target_release: {}, repos_keep_recent_uploads: {}, repo_prune: None, other_repos_eligible_to_prune: {}, warnings: [] }
|
| 1367 | 2026-03-09T10:56:09.217Z | DEBG | test_update_status (BackgroundTasks): activation complete
background_task = tuf_repo_pruner
elapsed = 576.614604ms
iteration = 2
status = {"nkeep_recent_releases":3,"nkeep_recent_uploads":2,"other_repos_eligible_to_prune":[],"repo_prune":null,"repos_keep_recent_uploads":[],"repos_keep_target_release":[],"status":"enabled","warnings":[]}
|
| 1368 | 2026-03-09T10:56:09.233Z | DEBG | test_update_status (BackgroundTasks): roles
background_task = vpc_route_manager
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 1369 | 2026-03-09T10:56:09.234Z | TRAC | test_update_status (BackgroundTasks): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
|
| 1370 | 2026-03-09T10:56:09.234Z | TRAC | test_update_status (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = service_firewall_rule_propagation
resource_id = 001de000-4401-4000-8000-000000000000
resource_type = Project
|
| 1371 | 2026-03-09T10:56:09.234Z | TRAC | test_update_status (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
|
| 1372 | 2026-03-09T10:56:09.234Z | DEBG | test_update_status (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {} }
|
| 1373 | 2026-03-09T10:56:09.235Z | DEBG | test_update_status (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
result = Ok(())
|
| 1374 | 2026-03-09T10:56:09.239Z | DEBG | test_update_status (BackgroundTasks): authorize result
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = vpc_route_manager
resource = Fleet
result = Ok(())
|
| 1375 | 2026-03-09T10:56:09.239Z | TRAC | test_update_status (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = vpc_route_manager
resource = Database
|
| 1376 | 2026-03-09T10:56:09.240Z | DEBG | test_update_status (BackgroundTasks): roles
background_task = vpc_route_manager
roles = RoleSet { roles: {} }
|
| 1377 | 2026-03-09T10:56:09.241Z | DEBG | test_update_status (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = vpc_route_manager
resource = Database
result = Ok(())
|
| 1378 | 2026-03-09T10:56:09.250Z | INFO | test_update_status (BackgroundTasks): deleted 0 of 0 sitreps sitreps
background_task = fm_sitrep_gc
case_ereports_deleted = 0
cases_deleted = 0
ids = []
sitreps_deleted = 0
|
| 1379 | 2026-03-09T10:56:09.250Z | TRAC | test_update_status (BackgroundTasks): all 0 orphaned sitreps in this batch have already been deleted
background_task = fm_sitrep_gc
|
| 1380 | 2026-03-09T10:56:09.250Z | INFO | test_update_status (BackgroundTasks): sitrep garbage collection found 0 orphaned sitreps, deleted 0
background_task = fm_sitrep_gc
|
| 1381 | 2026-03-09T10:56:09.250Z | DEBG | test_update_status (BackgroundTasks): activation complete
background_task = fm_sitrep_gc
elapsed = 929.433115ms
iteration = 1
status = {"errors":[],"orphaned_sitreps_deleted":0,"orphaned_sitreps_found":0}
|
| 1382 | 2026-03-09T10:56:09.256Z | TRAC | test_update_status (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = service_firewall_rule_propagation
resource_id = 001de000-5110-4000-8000-000000000001
resource_type = Silo
|
| 1383 | 2026-03-09T10:56:09.256Z | TRAC | test_update_status (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
|
| 1384 | 2026-03-09T10:56:09.256Z | DEBG | test_update_status (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {} }
|
| 1385 | 2026-03-09T10:56:09.256Z | DEBG | test_update_status (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
result = Ok(())
|
| 1386 | 2026-03-09T10:56:09.259Z | TRAC | test_update_status (BackgroundTasks): authorize begin
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = v2p_manager
resource = Fleet
|
| 1387 | 2026-03-09T10:56:09.260Z | TRAC | test_update_status (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = v2p_manager
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 1388 | 2026-03-09T10:56:09.260Z | TRAC | test_update_status (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = v2p_manager
resource = Database
|
| 1389 | 2026-03-09T10:56:09.260Z | DEBG | test_update_status (BackgroundTasks): roles
background_task = v2p_manager
roles = RoleSet { roles: {} }
|
| 1390 | 2026-03-09T10:56:09.260Z | DEBG | test_update_status (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = v2p_manager
resource = Database
result = Ok(())
|
| 1391 | 2026-03-09T10:56:09.262Z | TRAC | test_update_status (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = service_firewall_rule_propagation
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 1392 | 2026-03-09T10:56:09.262Z | TRAC | test_update_status (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
|
| 1393 | 2026-03-09T10:56:09.262Z | DEBG | test_update_status (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {} }
|
| 1394 | 2026-03-09T10:56:09.266Z | DEBG | test_update_status (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
result = Ok(())
|
| 1395 | 2026-03-09T10:56:09.298Z | DEBG | test_update_status (BackgroundTasks): roles
background_task = v2p_manager
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 1396 | 2026-03-09T10:56:09.302Z | DEBG | test_update_status (BackgroundTasks): authorize result
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = v2p_manager
resource = Fleet
result = Ok(())
|
| 1397 | 2026-03-09T10:56:09.302Z | TRAC | test_update_status (BackgroundTasks): authorize begin
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = v2p_manager
resource = Fleet
|
| 1398 | 2026-03-09T10:56:09.302Z | TRAC | test_update_status (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = v2p_manager
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 1399 | 2026-03-09T10:56:09.302Z | TRAC | test_update_status (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = v2p_manager
resource = Database
|
| 1400 | 2026-03-09T10:56:09.302Z | DEBG | test_update_status (BackgroundTasks): roles
background_task = v2p_manager
roles = RoleSet { roles: {} }
|
| 1401 | 2026-03-09T10:56:09.302Z | DEBG | test_update_status (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = v2p_manager
resource = Database
result = Ok(())
|
| 1402 | 2026-03-09T10:56:09.303Z | DEBG | test_update_status (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 1403 | 2026-03-09T10:56:09.310Z | DEBG | test_update_status (BackgroundTasks): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
result = Ok(())
|
| 1404 | 2026-03-09T10:56:09.311Z | TRAC | test_update_status (BackgroundTasks): successful lookup of siloed resource "Vpc" using built-in user
background_task = service_firewall_rule_propagation
|
| 1405 | 2026-03-09T10:56:09.311Z | TRAC | test_update_status (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
|
| 1406 | 2026-03-09T10:56:09.311Z | DEBG | test_update_status (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {} }
|
| 1407 | 2026-03-09T10:56:09.311Z | DEBG | test_update_status (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
result = Ok(())
|
| 1408 | 2026-03-09T10:56:09.403Z | DEBG | test_update_status (BackgroundTasks): roles
background_task = v2p_manager
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 1409 | 2026-03-09T10:56:09.407Z | DEBG | test_update_status (BackgroundTasks): authorize result
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = v2p_manager
resource = Fleet
result = Ok(())
|
| 1410 | 2026-03-09T10:56:09.407Z | TRAC | test_update_status (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = v2p_manager
resource = Database
|
| 1411 | 2026-03-09T10:56:09.407Z | DEBG | test_update_status (BackgroundTasks): roles
background_task = v2p_manager
roles = RoleSet { roles: {} }
|
| 1412 | 2026-03-09T10:56:09.408Z | DEBG | test_update_status (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = v2p_manager
resource = Database
result = Ok(())
|
| 1413 | 2026-03-09T10:56:09.409Z | TRAC | test_update_status (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
|
| 1414 | 2026-03-09T10:56:09.409Z | DEBG | test_update_status (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {} }
|
| 1415 | 2026-03-09T10:56:09.413Z | DEBG | test_update_status (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
result = Ok(())
|
| 1416 | 2026-03-09T10:56:09.424Z | DEBG | test_update_status (BackgroundTasks): roles
background_task = tuf_artifact_replication
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 1417 | 2026-03-09T10:56:09.429Z | DEBG | test_update_status (BackgroundTasks): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = tuf_artifact_replication
resource = Fleet
result = Ok(())
|
| 1418 | 2026-03-09T10:56:09.429Z | TRAC | test_update_status (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = tuf_artifact_replication
resource = Database
|
| 1419 | 2026-03-09T10:56:09.429Z | DEBG | test_update_status (BackgroundTasks): roles
background_task = tuf_artifact_replication
roles = RoleSet { roles: {} }
|
| 1420 | 2026-03-09T10:56:09.432Z | DEBG | test_update_status (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = tuf_artifact_replication
resource = Database
result = Ok(())
|
| 1421 | 2026-03-09T10:56:09.433Z | TRAC | test_update_status (BackgroundTasks): no more instances in need of reincarnation
background_task = instance_reincarnation
reincarnation_reason = start saga failed
total_found = 0
|
| 1422 | 2026-03-09T10:56:09.433Z | INFO | test_update_status (BackgroundTasks): instance reincarnation completed successfully
background_task = instance_reincarnation
instances_changed_state = 0
instances_found = 0
instances_reincarnated = 0
|
| 1423 | 2026-03-09T10:56:09.433Z | DEBG | test_update_status (BackgroundTasks): activation complete
background_task = instance_reincarnation
elapsed = 1.147340826s
iteration = 1
status = {"changed_state":[],"disabled":false,"errors":[],"instances_found":{"Failed":0,"SagaUnwound":0},"instances_reincarnated":[],"restart_errors":[]}
|
| 1424 | 2026-03-09T10:56:09.542Z | INFO | test_update_status (dropshot_internal): request completed
latency_us = 788036
local_addr = 127.0.0.1:38163
method = POST
remote_addr = 127.0.0.1:60472
req_id = 373a617e-e6c3-4cbd-8e06-9ba7d2d8649b
response_code = 204
uri = /sled-agents/b6d65341-167c-41df-9b5c-41cded99c229
|
| 1425 | 2026-03-09T10:56:09.560Z | DEBG | test_update_status (NexusClient): client response
result = Ok(Response { url: "http://127.0.0.1:38163/sled-agents/b6d65341-167c-41df-9b5c-41cded99c229", status: 204, headers: {"x-request-id": "373a617e-e6c3-4cbd-8e06-9ba7d2d8649b", "date": "Mon, 09 Mar 2026 10:56:09 GMT"} })
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
| 1426 | 2026-03-09T10:56:09.560Z | TRAC | test_update_status (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
|
| 1427 | 2026-03-09T10:56:09.560Z | DEBG | test_update_status (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {} }
|
| 1428 | 2026-03-09T10:56:09.560Z | DEBG | test_update_status (init_with_steps): Running step configure_boundary_ntp
|
| 1429 | 2026-03-09T10:56:09.560Z | DEBG | test_update_status (init_with_steps): Running step start_crucible_pantry
|
| 1430 | 2026-03-09T10:56:09.565Z | DEBG | test_update_status (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
result = Ok(())
|
| 1431 | 2026-03-09T10:56:09.567Z | DEBG | test_update_status (dropshot): registered endpoint
kind = pantry
local_addr = [::1]:41812
method = GET
path = /crucible/pantry/0
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
| 1432 | 2026-03-09T10:56:09.567Z | DEBG | test_update_status (dropshot): registered endpoint
kind = pantry
local_addr = [::1]:41812
method = GET
path = /crucible/pantry/0/job/{id}/is-finished
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
| 1433 | 2026-03-09T10:56:09.567Z | DEBG | test_update_status (dropshot): registered endpoint
kind = pantry
local_addr = [::1]:41812
method = GET
path = /crucible/pantry/0/job/{id}/ok
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
| 1434 | 2026-03-09T10:56:09.567Z | DEBG | test_update_status (dropshot): registered endpoint
kind = pantry
local_addr = [::1]:41812
method = DELETE
path = /crucible/pantry/0/volume/{id}
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
| 1435 | 2026-03-09T10:56:09.570Z | DEBG | test_update_status (dropshot): registered endpoint
kind = pantry
local_addr = [::1]:41812
method = GET
path = /crucible/pantry/0/volume/{id}
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
| 1436 | 2026-03-09T10:56:09.570Z | DEBG | test_update_status (dropshot): registered endpoint
kind = pantry
local_addr = [::1]:41812
method = POST
path = /crucible/pantry/0/volume/{id}
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
| 1437 | 2026-03-09T10:56:09.570Z | DEBG | test_update_status (dropshot): registered endpoint
kind = pantry
local_addr = [::1]:41812
method = POST
path = /crucible/pantry/0/volume/{id}/background
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
| 1438 | 2026-03-09T10:56:09.570Z | DEBG | test_update_status (dropshot): registered endpoint
kind = pantry
local_addr = [::1]:41812
method = POST
path = /crucible/pantry/0/volume/{id}/bulk-write
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
| 1439 | 2026-03-09T10:56:09.570Z | DEBG | test_update_status (dropshot): registered endpoint
kind = pantry
local_addr = [::1]:41812
method = POST
path = /crucible/pantry/0/volume/{id}/import-from-url
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
| 1440 | 2026-03-09T10:56:09.570Z | DEBG | test_update_status (dropshot): registered endpoint
kind = pantry
local_addr = [::1]:41812
method = POST
path = /crucible/pantry/0/volume/{id}/scrub
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
| 1441 | 2026-03-09T10:56:09.570Z | DEBG | test_update_status (dropshot): registered endpoint
kind = pantry
local_addr = [::1]:41812
method = POST
path = /crucible/pantry/0/volume/{id}/snapshot
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
| 1442 | 2026-03-09T10:56:09.570Z | INFO | test_update_status (dropshot): listening
kind = pantry
local_addr = [::1]:41812
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
| 1443 | 2026-03-09T10:56:09.571Z | DEBG | test_update_status (dropshot): successfully registered DTrace USDT probes
kind = pantry
local_addr = [::1]:41812
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
| 1444 | 2026-03-09T10:56:09.571Z | INFO | test_update_status (omicron_sled_agent::sim::Server): Started Simulated Crucible Pantry
address = [::1]:41812
kind = pantry
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
| 1445 | 2026-03-09T10:56:09.571Z | DEBG | test_update_status (init_with_steps): Running step populate_internal_dns
|
| 1446 | 2026-03-09T10:56:09.571Z | DEBG | test_update_status: Populating Internal DNS
|
| 1447 | 2026-03-09T10:56:09.580Z | TRAC | test_update_status (BackgroundTasks): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = tuf_artifact_replication
resource = Fleet
|
| 1448 | 2026-03-09T10:56:09.580Z | TRAC | test_update_status (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = tuf_artifact_replication
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 1449 | 2026-03-09T10:56:09.580Z | TRAC | test_update_status (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = tuf_artifact_replication
resource = Database
|
| 1450 | 2026-03-09T10:56:09.580Z | DEBG | test_update_status (BackgroundTasks): roles
background_task = tuf_artifact_replication
roles = RoleSet { roles: {} }
|
| 1451 | 2026-03-09T10:56:09.580Z | DEBG | test_update_status (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = tuf_artifact_replication
resource = Database
result = Ok(())
|
| 1452 | 2026-03-09T10:56:09.581Z | DEBG | test_update_status (BackgroundTasks): activating
background_task = inventory_collection
iteration = 2
reason = Signaled
|
| 1453 | 2026-03-09T10:56:09.582Z | TRAC | test_update_status (BackgroundTasks): authorize begin
action = Modify
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = inventory_collection
resource = Inventory
|
| 1454 | 2026-03-09T10:56:09.582Z | TRAC | test_update_status (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = inventory_collection
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 1455 | 2026-03-09T10:56:09.582Z | TRAC | test_update_status (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = inventory_collection
resource = Database
|
| 1456 | 2026-03-09T10:56:09.582Z | DEBG | test_update_status (BackgroundTasks): roles
background_task = inventory_collection
roles = RoleSet { roles: {} }
|
| 1457 | 2026-03-09T10:56:09.582Z | DEBG | test_update_status (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = inventory_collection
resource = Database
result = Ok(())
|
| 1458 | 2026-03-09T10:56:09.584Z | DEBG | test_update_status (BackgroundTasks): roles
background_task = tuf_artifact_replication
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 1459 | 2026-03-09T10:56:09.588Z | DEBG | test_update_status (BackgroundTasks): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = tuf_artifact_replication
resource = Fleet
result = Ok(())
|
| 1460 | 2026-03-09T10:56:09.588Z | TRAC | test_update_status (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = tuf_artifact_replication
resource = Database
|
| 1461 | 2026-03-09T10:56:09.588Z | DEBG | test_update_status (BackgroundTasks): roles
background_task = tuf_artifact_replication
roles = RoleSet { roles: {} }
|
| 1462 | 2026-03-09T10:56:09.588Z | DEBG | test_update_status (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = tuf_artifact_replication
resource = Database
result = Ok(())
|
| 1463 | 2026-03-09T10:56:09.607Z | DEBG | test_update_status (BackgroundTasks): roles
background_task = inventory_collection
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 1464 | 2026-03-09T10:56:09.610Z | DEBG | test_update_status (BackgroundTasks): authorize result
action = Modify
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = inventory_collection
resource = Inventory
result = Ok(())
|
| 1465 | 2026-03-09T10:56:09.610Z | TRAC | test_update_status (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = inventory_collection
resource = Database
|
| 1466 | 2026-03-09T10:56:09.610Z | DEBG | test_update_status (BackgroundTasks): roles
background_task = inventory_collection
roles = RoleSet { roles: {} }
|
| 1467 | 2026-03-09T10:56:09.610Z | DEBG | test_update_status (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = inventory_collection
resource = Database
result = Ok(())
|
| 1468 | 2026-03-09T10:56:09.611Z | TRAC | test_update_status (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
|
| 1469 | 2026-03-09T10:56:09.611Z | DEBG | test_update_status (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {} }
|
| 1470 | 2026-03-09T10:56:09.611Z | DEBG | test_update_status (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
result = Ok(())
|
| 1471 | 2026-03-09T10:56:09.650Z | TRAC | test_update_status (BackgroundTasks): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = tuf_artifact_replication
resource = Fleet
|
| 1472 | 2026-03-09T10:56:09.650Z | TRAC | test_update_status (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = tuf_artifact_replication
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 1473 | 2026-03-09T10:56:09.650Z | TRAC | test_update_status (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = tuf_artifact_replication
resource = Database
|
| 1474 | 2026-03-09T10:56:09.650Z | DEBG | test_update_status (BackgroundTasks): roles
background_task = tuf_artifact_replication
roles = RoleSet { roles: {} }
|
| 1475 | 2026-03-09T10:56:09.655Z | DEBG | test_update_status (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = tuf_artifact_replication
resource = Database
result = Ok(())
|
| 1476 | 2026-03-09T10:56:09.662Z | TRAC | test_update_status (BackgroundTasks): authorize begin
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000002, lookup_type: ByName("nexus") }
|
| 1477 | 2026-03-09T10:56:09.662Z | TRAC | test_update_status (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = service_firewall_rule_propagation
resource_id = 001de000-4401-4000-8000-000000000000
resource_type = Project
|
| 1478 | 2026-03-09T10:56:09.662Z | TRAC | test_update_status (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
|
| 1479 | 2026-03-09T10:56:09.662Z | DEBG | test_update_status (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {} }
|
| 1480 | 2026-03-09T10:56:09.662Z | DEBG | test_update_status (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
result = Ok(())
|
| 1481 | 2026-03-09T10:56:09.663Z | DEBG | test_update_status (BackgroundTasks): inventory_prune_one: nothing eligible for removal (too few)
background_task = inventory_collection
candidates = []
|
| 1482 | 2026-03-09T10:56:09.664Z | TRAC | test_update_status (DnsResolver): lookup_all_socket_v6 srv
dns_name = _mgs._tcp.control-plane.oxide.internal
|
| 1483 | 2026-03-09T10:56:09.664Z | TRAC | test_update_status (dns): buffer
buffer = Length: 67 (0x43) bytes\n0000: d5 81 01 00 00 01 00 00 00 00 00 01 04 5f 6d 67 ............._mg\n0010: 73 04 5f 74 63 70 0d 63 6f 6e 74 72 6f 6c 2d 70 s._tcp.control-p\n0020: 6c 61 6e 65 05 6f 78 69 64 65 08 69 6e 74 65 72 lane.oxide.inter\n0030: 6e 61 6c 00 00 21 00 01 00 00 29 04 d0 00 00 00 nal..!....).....\n0040: 00 00 00 ...
kind = dns
peer_addr = [::1]:28673
req_id = aba4fd29-c683-4840-a3fa-304267f7cd79
|
| 1484 | 2026-03-09T10:56:09.664Z | DEBG | test_update_status (dns): message_request
kind = dns
mr = MessageRequest {\n header: Header {\n id: 54657,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n queries: Queries {\n queries: [\n LowerQuery {\n name: LowerName(\n Name("_mgs._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_mgs._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n ],\n original: [\n 4,\n 95,\n 109,\n 103,\n 115,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n flags: EdnsFlags {\n dnssec_ok: false,\n z: 0,\n },\n max_payload: 1232,\n options: OPT {\n options: [],\n },\n },\n ),\n}
peer_addr = [::1]:28673
req_id = aba4fd29-c683-4840-a3fa-304267f7cd79
|
| 1485 | 2026-03-09T10:56:09.664Z | ERRO | test_update_status (dns): failed to handle incoming DNS message: MessageRequest {
header: Header {
id: 54657,
message_type: Query,
op_code: Query,
authoritative: false,
truncation: false,
recursion_desired: true,
recursion_available: false,
authentic_data: false,
checking_disabled: false,
response_code: NoError,
query_count: 1,
answer_count: 0,
name_server_count: 0,
additional_count: 1,
},
queries: Queries {
queries: [
LowerQuery {
name: LowerName(
Name("_mgs._tcp.control-plane.oxide.internal."),
),
original: Query {
name: Name("_mgs._tcp.control-plane.oxide.internal."),
query_type: SRV,
query_class: IN,
},
},
],
original: [
4,
95,
109,
103,
115,
4,
95,
116,
99,
112,
13,
99,
111,
110,
116,
114,
111,
108,
45,
112,
108,
97,
110,
101,
5,
111,
120,
105,
100,
101,
8,
105,
110,
116,
101,
114,
110,
97,
108,
0,
0,
33,
0,
1,
],
},
answers: [],
name_servers: [],
additionals: [],
sig0: [],
edns: Some(
Edns {
rcode_high: 0,
version: 0,
flags: EdnsFlags {
dnssec_ok: false,
z: 0,
},
max_payload: 1232,
options: OPT {
options: [],
},
},
),
} SERVFAIL: server is not authoritative for name: "_mgs._tcp.control-plane.oxide.internal."
kind = dns
peer_addr = [::1]:28673
req_id = aba4fd29-c683-4840-a3fa-304267f7cd79
|
| 1486 | 2026-03-09T10:56:09.665Z | WARN | test_update_status (BackgroundTasks): inventory collection failed
background_task = inventory_collection
error = failed to collect inventory: looking up MGS addresses: proto error: no records found for Query { name: Name("_mgs._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN }
|
| 1487 | 2026-03-09T10:56:09.665Z | DEBG | test_update_status (BackgroundTasks): activation complete
background_task = inventory_collection
elapsed = 83.179962ms
iteration = 2
status = {"error":"failed to collect inventory: looking up MGS addresses: proto error: no records found for Query { name: Name(\\"_mgs._tcp.control-plane.oxide.internal.\\"), query_type: SRV, query_class: IN }"}
|
| 1488 | 2026-03-09T10:56:09.665Z | DEBG | test_update_status (BackgroundTasks): roles
background_task = tuf_artifact_replication
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 1489 | 2026-03-09T10:56:09.667Z | DEBG | test_update_status (BackgroundTasks): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = tuf_artifact_replication
resource = Fleet
result = Ok(())
|
| 1490 | 2026-03-09T10:56:09.667Z | TRAC | test_update_status (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = tuf_artifact_replication
resource = Database
|
| 1491 | 2026-03-09T10:56:09.668Z | DEBG | test_update_status (BackgroundTasks): roles
background_task = tuf_artifact_replication
roles = RoleSet { roles: {} }
|
| 1492 | 2026-03-09T10:56:09.668Z | DEBG | test_update_status (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = tuf_artifact_replication
resource = Database
result = Ok(())
|
| 1493 | 2026-03-09T10:56:09.668Z | TRAC | test_update_status (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = service_firewall_rule_propagation
resource_id = 001de000-5110-4000-8000-000000000001
resource_type = Silo
|
| 1494 | 2026-03-09T10:56:09.668Z | TRAC | test_update_status (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
|
| 1495 | 2026-03-09T10:56:09.668Z | DEBG | test_update_status (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {} }
|
| 1496 | 2026-03-09T10:56:09.669Z | DEBG | test_update_status (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
result = Ok(())
|
| 1497 | 2026-03-09T10:56:09.671Z | DEBG | test_update_status (BackgroundTasks): activation complete
background_task = tuf_artifact_replication
elapsed = 1.355533553s
iteration = 1
status = {"generation":1,"last_run_counters":{"copy_err":0,"copy_ok":0,"list_err":0,"list_ok":0,"put_config_err":0,"put_config_ok":0,"put_err":0,"put_ok":0},"lifetime_counters":{"copy_err":0,"copy_ok":0,"list_err":0,"list_ok":0,"put_config_err":0,"put_config_ok":0,"put_err":0,"put_ok":0},"local_repos":0,"request_debug_ringbuf":[]}
|
| 1498 | 2026-03-09T10:56:09.672Z | TRAC | test_update_status (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = service_firewall_rule_propagation
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 1499 | 2026-03-09T10:56:09.672Z | TRAC | test_update_status (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
|
| 1500 | 2026-03-09T10:56:09.672Z | DEBG | test_update_status (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {} }
|
| 1501 | 2026-03-09T10:56:09.672Z | DEBG | test_update_status (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
result = Ok(())
|
| 1502 | 2026-03-09T10:56:09.674Z | DEBG | test_update_status (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 1503 | 2026-03-09T10:56:09.713Z | DEBG | test_update_status (BackgroundTasks): authorize result
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000002, lookup_type: ByName("nexus") }
result = Ok(())
|
| 1504 | 2026-03-09T10:56:09.713Z | TRAC | test_update_status (BackgroundTasks): successful lookup of siloed resource "VpcSubnet" using built-in user
background_task = service_firewall_rule_propagation
|
| 1505 | 2026-03-09T10:56:09.713Z | TRAC | test_update_status (BackgroundTasks): authorize begin
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000002, lookup_type: ByName("nexus") }
|
| 1506 | 2026-03-09T10:56:09.713Z | TRAC | test_update_status (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = service_firewall_rule_propagation
resource_id = 001de000-4401-4000-8000-000000000000
resource_type = Project
|
| 1507 | 2026-03-09T10:56:09.713Z | TRAC | test_update_status (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
|
| 1508 | 2026-03-09T10:56:09.713Z | DEBG | test_update_status (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {} }
|
| 1509 | 2026-03-09T10:56:09.714Z | DEBG | test_update_status (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
result = Ok(())
|
| 1510 | 2026-03-09T10:56:09.741Z | INFO | test_update_status (BackgroundTasks): VPC route manager sled b6d65341-167c-41df-9b5c-41cded99c229
background_task = vpc_route_manager
|
| 1511 | 2026-03-09T10:56:09.741Z | DEBG | test_update_status (BackgroundTasks): client request
SledAgent = b6d65341-167c-41df-9b5c-41cded99c229
background_task = vpc_route_manager
body = None
method = GET
uri = http://[::1]:53204/vpc-routes
|
| 1512 | 2026-03-09T10:56:09.742Z | INFO | test_update_status (dropshot): accepted connection
local_addr = [::1]:53204
remote_addr = [::1]:64615
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
| 1513 | 2026-03-09T10:56:09.743Z | TRAC | test_update_status (dropshot): incoming request
local_addr = [::1]:53204
method = GET
remote_addr = [::1]:64615
req_id = 20a7a1d2-38af-41cb-a06f-90bd06f6ce28
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
uri = /vpc-routes
|
| 1514 | 2026-03-09T10:56:09.743Z | DEBG | test_update_status (dropshot): determined request API version
local_addr = [::1]:53204
method = GET
remote_addr = [::1]:64615
req_id = 20a7a1d2-38af-41cb-a06f-90bd06f6ce28
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
uri = /vpc-routes
version = 26.0.0
|
| 1515 | 2026-03-09T10:56:09.743Z | INFO | test_update_status (dropshot): request completed
latency_us = 723
local_addr = [::1]:53204
method = GET
remote_addr = [::1]:64615
req_id = 20a7a1d2-38af-41cb-a06f-90bd06f6ce28
response_code = 200
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
uri = /vpc-routes
|
| 1516 | 2026-03-09T10:56:09.744Z | DEBG | test_update_status (BackgroundTasks): client response
SledAgent = b6d65341-167c-41df-9b5c-41cded99c229
background_task = vpc_route_manager
result = Ok(Response { url: "http://[::1]:53204/vpc-routes", status: 200, headers: {"content-type": "application/json", "x-request-id": "20a7a1d2-38af-41cb-a06f-90bd06f6ce28", "content-length": "2", "date": "Mon, 09 Mar 2026 10:56:09 GMT"} })
|
| 1517 | 2026-03-09T10:56:09.744Z | TRAC | test_update_status (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = vpc_route_manager
resource = Database
|
| 1518 | 2026-03-09T10:56:09.744Z | DEBG | test_update_status (BackgroundTasks): roles
background_task = vpc_route_manager
roles = RoleSet { roles: {} }
|
| 1519 | 2026-03-09T10:56:09.745Z | DEBG | test_update_status (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = vpc_route_manager
resource = Database
result = Ok(())
|
| 1520 | 2026-03-09T10:56:09.769Z | INFO | test_update_status: DNS population: DnsConfigParams {
generation: Generation(
1,
),
serial: 1,
time_created: 2026-03-09T10:56:09.769207374Z,
zones: [
DnsConfigZone {
zone_name: "control-plane.oxide.internal",
records: {
"_clickhouse-admin-single-server._tcp": [
Srv(
Srv {
prio: 0,
weight: 0,
port: 8888,
target: "d2e4f490-757f-445e-9b29-162a885a35a7.host.control-plane.oxide.internal",
},
),
],
"3b40ef3f-ae24-4403-b807-bddce17eba03.host": [
Aaaa(
::1,
),
],
"913233fe-92a8-4635-9572-183f495429c4.host": [
Aaaa(
::ffff:127.0.0.1,
),
],
"_oximeter-reader._tcp": [
Srv(
Srv {
prio: 0,
weight: 0,
port: 9000,
target: "d2e4f490-757f-445e-9b29-162a885a35a7.host.control-plane.oxide.internal",
},
),
],
"_nameservice._tcp": [
Srv(
Srv {
prio: 0,
weight: 0,
port: 37611,
target: "a0344c16-8d44-4bbe-961e-1c2ebc9c1fdf.host.control-plane.oxide.internal",
},
),
],
"_repo-depot._tcp": [
Srv(
Srv {
prio: 0,
weight: 0,
port: 42508,
target: "b6d65341-167c-41df-9b5c-41cded99c229.sled.control-plane.oxide.internal",
},
),
],
"c102c7f4-c1e4-488a-b8ac-14c83613246a.host": [
Aaaa(
::1,
),
],
"@": [
Ns(
"ns1.control-plane.oxide.internal",
),
],
"_clickhouse-native._tcp": [
Srv(
Srv {
prio: 0,
weight: 0,
port: 9000,
target: "d2e4f490-757f-445e-9b29-162a885a35a7.host.control-plane.oxide.internal",
},
),
],
"_nexus._tcp": [
Srv(
Srv {
prio: 0,
weight: 0,
port: 38163,
target: "913233fe-92a8-4635-9572-183f495429c4.host.control-plane.oxide.internal",
},
),
],
"_mgs._tcp": [
Srv(
Srv {
prio: 0,
weight: 0,
port: 45204,
target: "dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal",
},
),
],
"_dendrite._tcp": [
Srv(
Srv {
prio: 0,
weight: 0,
port: 64035,
target: "dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal",
},
),
],
"dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host": [
Aaaa(
::1,
),
],
"_external-dns._tcp": [
Srv(
Srv {
prio: 0,
weight: 0,
port: 65043,
target: "7f3bb0cc-f231-4804-b546-4f80d92bd1a9.host.control-plane.oxide.internal",
},
),
],
"_crucible-pantry._tcp": [
Srv(
Srv {
prio: 0,
weight: 0,
port: 41812,
target: "6f0c8038-a04f-48d3-9846-34f4f696b6f5.host.control-plane.oxide.internal",
},
),
],
"6f0c8038-a04f-48d3-9846-34f4f696b6f5.host": [
Aaaa(
::1,
),
],
"a0344c16-8d44-4bbe-961e-1c2ebc9c1fdf.host": [
Aaaa(
::1,
),
],
"_boundary-ntp._tcp": [
Srv(
Srv {
prio: 0,
weight: 0,
port: 123,
target: "3b40ef3f-ae24-4403-b807-bddce17eba03.host.control-plane.oxide.internal",
},
),
],
"7f3bb0cc-f231-4804-b546-4f80d92bd1a9.host": [
Aaaa(
::1,
),
],
"_mgd._tcp": [
Srv(
Srv {
prio: 0,
weight: 0,
port: 47898,
target: "dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal",
},
),
],
"ns1": [
Aaaa(
::1,
),
],
"d2e4f490-757f-445e-9b29-162a885a35a7.host": [
Aaaa(
::1,
),
],
"_clickhouse._tcp": [
Srv(
Srv {
prio: 0,
weight: 0,
port: 33413,
target: "d2e4f490-757f-445e-9b29-162a885a35a7.host.control-plane.oxide.internal",
},
),
],
"b6d65341-167c-41df-9b5c-41cded99c229.sled": [
Aaaa(
::1,
),
],
"boundary-ntp": [
Aaaa(
::1,
),
],
"_cockroach._tcp": [
Srv(
Srv {
prio: 0,
weight: 0,
port: 38023,
target: "c102c7f4-c1e4-488a-b8ac-14c83613246a.host.control-plane.oxide.internal",
},
),
],
"_nexus-lockstep._tcp": [
Srv(
Srv {
prio: 0,
weight: 0,
port: 44075,
target: "913233fe-92a8-4635-9572-183f495429c4.host.control-plane.oxide.internal",
},
),
],
},
},
],
}
|
| 1521 | 2026-03-09T10:56:09.770Z | DEBG | test_update_status: client request
body = Some(Body)
method = PUT
uri = http://[::1]:37611/config
|
| 1522 | 2026-03-09T10:56:09.775Z | INFO | test_update_status (http): accepted connection
kind = dns
local_addr = [::1]:37611
remote_addr = [::1]:57633
|
| 1523 | 2026-03-09T10:56:09.790Z | TRAC | test_update_status (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = service_firewall_rule_propagation
resource_id = 001de000-5110-4000-8000-000000000001
resource_type = Silo
|
| 1524 | 2026-03-09T10:56:09.791Z | TRAC | test_update_status (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
|
| 1525 | 2026-03-09T10:56:09.791Z | DEBG | test_update_status (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {} }
|
| 1526 | 2026-03-09T10:56:09.792Z | DEBG | test_update_status (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
result = Ok(())
|
| 1527 | 2026-03-09T10:56:09.794Z | TRAC | test_update_status (http): incoming request
kind = dns
local_addr = [::1]:37611
method = PUT
remote_addr = [::1]:57633
req_id = 00d0217b-e85b-455c-b44d-04c2467d8f65
uri = /config
|
| 1528 | 2026-03-09T10:56:09.794Z | DEBG | test_update_status (http): determined request API version
kind = dns
local_addr = [::1]:37611
method = PUT
remote_addr = [::1]:57633
req_id = 00d0217b-e85b-455c-b44d-04c2467d8f65
uri = /config
version = 2.0.0
|
| 1529 | 2026-03-09T10:56:09.795Z | INFO | test_update_status (store): attempting generation update
new_generation = 1
req_id = 00d0217b-e85b-455c-b44d-04c2467d8f65
|
| 1530 | 2026-03-09T10:56:09.795Z | INFO | test_update_status (store): pruning trees for generations newer than 0
|
| 1531 | 2026-03-09T10:56:09.795Z | DEBG | test_update_status (store): creating tree
tree_name = generation_1_zone_control-plane.oxide.internal
|
| 1532 | 2026-03-09T10:56:09.796Z | DEBG | test_update_status (store): updating current config
|
| 1533 | 2026-03-09T10:56:09.797Z | DEBG | test_update_status (store): flushing default tree
|
| 1534 | 2026-03-09T10:56:09.797Z | INFO | test_update_status (store): pruning trees for generations older than 1
keep = 3
|
| 1535 | 2026-03-09T10:56:09.797Z | INFO | test_update_status (store): updated generation
new_generation = 1
req_id = 00d0217b-e85b-455c-b44d-04c2467d8f65
|
| 1536 | 2026-03-09T10:56:09.797Z | INFO | test_update_status (http): request completed
kind = dns
latency_us = 3275
local_addr = [::1]:37611
method = PUT
remote_addr = [::1]:57633
req_id = 00d0217b-e85b-455c-b44d-04c2467d8f65
response_code = 204
uri = /config
|
| 1537 | 2026-03-09T10:56:09.798Z | DEBG | test_update_status: client response
result = Ok(Response { url: "http://[::1]:37611/config", status: 204, headers: {"x-request-id": "00d0217b-e85b-455c-b44d-04c2467d8f65", "date": "Mon, 09 Mar 2026 10:56:09 GMT"} })
|
| 1538 | 2026-03-09T10:56:09.798Z | DEBG | test_update_status (init_with_steps): Running step configure_sled_agents
|
| 1539 | 2026-03-09T10:56:09.803Z | TRAC | test_update_status (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = service_firewall_rule_propagation
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 1540 | 2026-03-09T10:56:09.803Z | TRAC | test_update_status (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
|
| 1541 | 2026-03-09T10:56:09.803Z | DEBG | test_update_status (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {} }
|
| 1542 | 2026-03-09T10:56:09.804Z | DEBG | test_update_status (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
result = Ok(())
|
| 1543 | 2026-03-09T10:56:09.812Z | DEBG | test_update_status (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 1544 | 2026-03-09T10:56:09.831Z | DEBG | test_update_status (BackgroundTasks): authorize result
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000002, lookup_type: ByName("nexus") }
result = Ok(())
|
| 1545 | 2026-03-09T10:56:09.831Z | TRAC | test_update_status (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
|
| 1546 | 2026-03-09T10:56:09.831Z | DEBG | test_update_status (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {} }
|
| 1547 | 2026-03-09T10:56:09.831Z | DEBG | test_update_status (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
result = Ok(())
|
| 1548 | 2026-03-09T10:56:09.844Z | TRAC | test_update_status (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
|
| 1549 | 2026-03-09T10:56:09.844Z | DEBG | test_update_status (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {} }
|
| 1550 | 2026-03-09T10:56:09.845Z | DEBG | test_update_status (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
result = Ok(())
|
| 1551 | 2026-03-09T10:56:09.848Z | TRAC | test_update_status (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
|
| 1552 | 2026-03-09T10:56:09.848Z | DEBG | test_update_status (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {} }
|
| 1553 | 2026-03-09T10:56:09.861Z | DEBG | test_update_status (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
result = Ok(())
|
| 1554 | 2026-03-09T10:56:09.876Z | DEBG | test_update_status (BackgroundTasks): client request
SledAgent = b6d65341-167c-41df-9b5c-41cded99c229
background_task = v2p_manager
body = None
method = GET
uri = http://[::1]:53204/v2p
|
| 1555 | 2026-03-09T10:56:09.877Z | TRAC | test_update_status (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
|
| 1556 | 2026-03-09T10:56:09.878Z | DEBG | test_update_status (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {} }
|
| 1557 | 2026-03-09T10:56:09.880Z | DEBG | test_update_status (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
result = Ok(())
|
| 1558 | 2026-03-09T10:56:09.883Z | INFO | test_update_status (dropshot): accepted connection
local_addr = [::1]:53204
remote_addr = [::1]:53953
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
| 1559 | 2026-03-09T10:56:09.883Z | TRAC | test_update_status (dropshot): incoming request
local_addr = [::1]:53204
method = GET
remote_addr = [::1]:53953
req_id = c8168840-570a-4f5d-a0e9-07c258d547c8
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
uri = /v2p
|
| 1560 | 2026-03-09T10:56:09.883Z | DEBG | test_update_status (dropshot): determined request API version
local_addr = [::1]:53204
method = GET
remote_addr = [::1]:53953
req_id = c8168840-570a-4f5d-a0e9-07c258d547c8
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
uri = /v2p
version = 26.0.0
|
| 1561 | 2026-03-09T10:56:09.883Z | INFO | test_update_status (dropshot): request completed
latency_us = 341
local_addr = [::1]:53204
method = GET
remote_addr = [::1]:53953
req_id = c8168840-570a-4f5d-a0e9-07c258d547c8
response_code = 200
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
uri = /v2p
|
| 1562 | 2026-03-09T10:56:09.883Z | DEBG | test_update_status (BackgroundTasks): client response
SledAgent = b6d65341-167c-41df-9b5c-41cded99c229
background_task = v2p_manager
result = Ok(Response { url: "http://[::1]:53204/v2p", status: 200, headers: {"content-type": "application/json", "x-request-id": "c8168840-570a-4f5d-a0e9-07c258d547c8", "content-length": "2", "date": "Mon, 09 Mar 2026 10:56:09 GMT"} })
|
| 1563 | 2026-03-09T10:56:09.885Z | INFO | test_update_status (BackgroundTasks): found opte v2p mappings
background_task = v2p_manager
interfaces = {}
sled = SimGimlet00
|
| 1564 | 2026-03-09T10:56:09.885Z | INFO | test_update_status (BackgroundTasks): v2p mappings to delete
background_task = v2p_manager
mappings = []
sled = SimGimlet00
|
| 1565 | 2026-03-09T10:56:09.885Z | INFO | test_update_status (BackgroundTasks): v2p mappings to add
background_task = v2p_manager
mappings = []
sled = SimGimlet00
|
| 1566 | 2026-03-09T10:56:09.885Z | DEBG | test_update_status (BackgroundTasks): activation complete
background_task = v2p_manager
elapsed = 1.610598166s
iteration = 1
status = {}
|
| 1567 | 2026-03-09T10:56:09.896Z | INFO | test_update_status (BackgroundTasks): computed internet gateway mappings for sled
assocs = {}
background_task = vpc_route_manager
sled = SimGimlet00
|
| 1568 | 2026-03-09T10:56:09.899Z | DEBG | test_update_status (BackgroundTasks): client request
SledAgent = b6d65341-167c-41df-9b5c-41cded99c229
background_task = vpc_route_manager
body = Some(Body)
method = PUT
uri = http://[::1]:53204/eip-gateways
|
| 1569 | 2026-03-09T10:56:09.942Z | DEBG | test_update_status: client request
body = Some(Body)
method = PUT
uri = http://[::1]:53204/omicron-config
|
| 1570 | 2026-03-09T10:56:10.021Z | TRAC | test_update_status (dropshot): incoming request
local_addr = [::1]:53204
method = PUT
remote_addr = [::1]:64615
req_id = 79879c7d-d98e-4f97-85fc-a6e4dd79aebd
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
uri = /eip-gateways
|
| 1571 | 2026-03-09T10:56:10.021Z | DEBG | test_update_status (dropshot): determined request API version
local_addr = [::1]:53204
method = PUT
remote_addr = [::1]:64615
req_id = 79879c7d-d98e-4f97-85fc-a6e4dd79aebd
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
uri = /eip-gateways
version = 26.0.0
|
| 1572 | 2026-03-09T10:56:10.023Z | INFO | test_update_status (dropshot): request completed
latency_us = 1881
local_addr = [::1]:53204
method = PUT
remote_addr = [::1]:64615
req_id = 79879c7d-d98e-4f97-85fc-a6e4dd79aebd
response_code = 204
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
uri = /eip-gateways
|
| 1573 | 2026-03-09T10:56:10.023Z | INFO | test_update_status (dropshot): accepted connection
local_addr = [::1]:53204
remote_addr = [::1]:32903
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
| 1574 | 2026-03-09T10:56:10.043Z | TRAC | test_update_status (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
|
| 1575 | 2026-03-09T10:56:10.045Z | DEBG | test_update_status (BackgroundTasks): client response
SledAgent = b6d65341-167c-41df-9b5c-41cded99c229
background_task = vpc_route_manager
result = Ok(Response { url: "http://[::1]:53204/eip-gateways", status: 204, headers: {"x-request-id": "79879c7d-d98e-4f97-85fc-a6e4dd79aebd", "date": "Mon, 09 Mar 2026 10:56:10 GMT"} })
|
| 1576 | 2026-03-09T10:56:10.045Z | DEBG | test_update_status (BackgroundTasks): activation complete
background_task = vpc_route_manager
elapsed = 925.868312ms
iteration = 2
status = {}
|
| 1577 | 2026-03-09T10:56:10.051Z | DEBG | test_update_status (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {} }
|
| 1578 | 2026-03-09T10:56:10.052Z | DEBG | test_update_status (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
result = Ok(())
|
| 1579 | 2026-03-09T10:56:10.057Z | TRAC | test_update_status (dropshot): incoming request
local_addr = [::1]:53204
method = PUT
remote_addr = [::1]:32903
req_id = 06a0421f-b484-41d6-9634-e5701db4cf7e
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
uri = /omicron-config
|
| 1580 | 2026-03-09T10:56:10.057Z | DEBG | test_update_status (dropshot): determined request API version
local_addr = [::1]:53204
method = PUT
remote_addr = [::1]:32903
req_id = 06a0421f-b484-41d6-9634-e5701db4cf7e
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
uri = /omicron-config
version = 26.0.0
|
| 1581 | 2026-03-09T10:56:10.060Z | TRAC | test_update_status (BackgroundTasks): authorize begin
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000001, lookup_type: ByName("external-dns") }
|
| 1582 | 2026-03-09T10:56:10.060Z | TRAC | test_update_status (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = service_firewall_rule_propagation
resource_id = 001de000-4401-4000-8000-000000000000
resource_type = Project
|
| 1583 | 2026-03-09T10:56:10.060Z | TRAC | test_update_status (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
|
| 1584 | 2026-03-09T10:56:10.060Z | DEBG | test_update_status (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {} }
|
| 1585 | 2026-03-09T10:56:10.061Z | DEBG | test_update_status (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
result = Ok(())
|
| 1586 | 2026-03-09T10:56:10.069Z | INFO | test_update_status (dropshot): request completed
latency_us = 11266
local_addr = [::1]:53204
method = PUT
remote_addr = [::1]:32903
req_id = 06a0421f-b484-41d6-9634-e5701db4cf7e
response_code = 204
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
uri = /omicron-config
|
| 1587 | 2026-03-09T10:56:10.069Z | TRAC | test_update_status (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = service_firewall_rule_propagation
resource_id = 001de000-5110-4000-8000-000000000001
resource_type = Silo
|
| 1588 | 2026-03-09T10:56:10.069Z | TRAC | test_update_status (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
|
| 1589 | 2026-03-09T10:56:10.069Z | DEBG | test_update_status (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {} }
|
| 1590 | 2026-03-09T10:56:10.069Z | DEBG | test_update_status (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
result = Ok(())
|
| 1591 | 2026-03-09T10:56:10.073Z | DEBG | test_update_status: client response
result = Ok(Response { url: "http://[::1]:53204/omicron-config", status: 204, headers: {"x-request-id": "06a0421f-b484-41d6-9634-e5701db4cf7e", "date": "Mon, 09 Mar 2026 10:56:10 GMT"} })
|
| 1592 | 2026-03-09T10:56:10.075Z | DEBG | test_update_status: client request
body = Some(Body)
method = PUT
uri = http://[::1]:53204/network-bootstore-config
|
| 1593 | 2026-03-09T10:56:10.078Z | TRAC | test_update_status (dropshot): incoming request
local_addr = [::1]:53204
method = PUT
remote_addr = [::1]:32903
req_id = 16bc9b0f-86eb-4f24-9d77-bab5da427319
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
uri = /network-bootstore-config
|
| 1594 | 2026-03-09T10:56:10.078Z | DEBG | test_update_status (dropshot): determined request API version
local_addr = [::1]:53204
method = PUT
remote_addr = [::1]:32903
req_id = 16bc9b0f-86eb-4f24-9d77-bab5da427319
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
uri = /network-bootstore-config
version = 26.0.0
|
| 1595 | 2026-03-09T10:56:10.079Z | INFO | test_update_status (dropshot): request completed
latency_us = 917
local_addr = [::1]:53204
method = PUT
remote_addr = [::1]:32903
req_id = 16bc9b0f-86eb-4f24-9d77-bab5da427319
response_code = 204
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
uri = /network-bootstore-config
|
| 1596 | 2026-03-09T10:56:10.080Z | DEBG | test_update_status: client response
result = Ok(Response { url: "http://[::1]:53204/network-bootstore-config", status: 204, headers: {"x-request-id": "16bc9b0f-86eb-4f24-9d77-bab5da427319", "date": "Mon, 09 Mar 2026 10:56:10 GMT"} })
|
| 1597 | 2026-03-09T10:56:10.081Z | DEBG | test_update_status (init_with_steps): Running step start_nexus_external
|
| 1598 | 2026-03-09T10:56:10.081Z | DEBG | test_update_status: Starting Nexus (external API)
|
| 1599 | 2026-03-09T10:56:10.089Z | TRAC | test_update_status (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = service_firewall_rule_propagation
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 1600 | 2026-03-09T10:56:10.089Z | TRAC | test_update_status (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
|
| 1601 | 2026-03-09T10:56:10.089Z | DEBG | test_update_status (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {} }
|
| 1602 | 2026-03-09T10:56:10.090Z | DEBG | test_update_status (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
result = Ok(())
|
| 1603 | 2026-03-09T10:56:10.108Z | TRAC | test_update_status (InternalApi): authorize begin
action = Modify
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Fleet
|
| 1604 | 2026-03-09T10:56:10.108Z | TRAC | test_update_status (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 1605 | 2026-03-09T10:56:10.108Z | TRAC | test_update_status (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 1606 | 2026-03-09T10:56:10.108Z | DEBG | test_update_status (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 1607 | 2026-03-09T10:56:10.108Z | DEBG | test_update_status (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 1608 | 2026-03-09T10:56:10.109Z | DEBG | test_update_status (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 1609 | 2026-03-09T10:56:10.118Z | DEBG | test_update_status (BackgroundTasks): authorize result
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000001, lookup_type: ByName("external-dns") }
result = Ok(())
|
| 1610 | 2026-03-09T10:56:10.118Z | TRAC | test_update_status (BackgroundTasks): successful lookup of siloed resource "VpcSubnet" using built-in user
background_task = service_firewall_rule_propagation
|
| 1611 | 2026-03-09T10:56:10.118Z | TRAC | test_update_status (BackgroundTasks): authorize begin
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000001, lookup_type: ByName("external-dns") }
|
| 1612 | 2026-03-09T10:56:10.118Z | TRAC | test_update_status (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = service_firewall_rule_propagation
resource_id = 001de000-4401-4000-8000-000000000000
resource_type = Project
|
| 1613 | 2026-03-09T10:56:10.118Z | TRAC | test_update_status (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
|
| 1614 | 2026-03-09T10:56:10.118Z | DEBG | test_update_status (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {} }
|
| 1615 | 2026-03-09T10:56:10.119Z | DEBG | test_update_status (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
result = Ok(())
|
| 1616 | 2026-03-09T10:56:10.133Z | DEBG | test_update_status (InternalApi): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 1617 | 2026-03-09T10:56:10.134Z | TRAC | test_update_status (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = service_firewall_rule_propagation
resource_id = 001de000-5110-4000-8000-000000000001
resource_type = Silo
|
| 1618 | 2026-03-09T10:56:10.134Z | TRAC | test_update_status (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
|
| 1619 | 2026-03-09T10:56:10.134Z | DEBG | test_update_status (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {} }
|
| 1620 | 2026-03-09T10:56:10.135Z | DEBG | test_update_status (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
result = Ok(())
|
| 1621 | 2026-03-09T10:56:10.136Z | DEBG | test_update_status (InternalApi): authorize result
action = Modify
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Fleet
result = Ok(())
|
| 1622 | 2026-03-09T10:56:10.136Z | TRAC | test_update_status (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 1623 | 2026-03-09T10:56:10.136Z | DEBG | test_update_status (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 1624 | 2026-03-09T10:56:10.137Z | DEBG | test_update_status (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 1625 | 2026-03-09T10:56:10.157Z | TRAC | test_update_status (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = service_firewall_rule_propagation
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 1626 | 2026-03-09T10:56:10.157Z | TRAC | test_update_status (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
|
| 1627 | 2026-03-09T10:56:10.157Z | DEBG | test_update_status (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {} }
|
| 1628 | 2026-03-09T10:56:10.158Z | DEBG | test_update_status (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
result = Ok(())
|
| 1629 | 2026-03-09T10:56:10.169Z | DEBG | test_update_status (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 1630 | 2026-03-09T10:56:10.175Z | TRAC | test_update_status (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 1631 | 2026-03-09T10:56:10.175Z | DEBG | test_update_status (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 1632 | 2026-03-09T10:56:10.176Z | DEBG | test_update_status (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 1633 | 2026-03-09T10:56:10.185Z | DEBG | test_update_status (BackgroundTasks): authorize result
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000001, lookup_type: ByName("external-dns") }
result = Ok(())
|
| 1634 | 2026-03-09T10:56:10.185Z | TRAC | test_update_status (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
|
| 1635 | 2026-03-09T10:56:10.185Z | DEBG | test_update_status (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {} }
|
| 1636 | 2026-03-09T10:56:10.186Z | DEBG | test_update_status (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
result = Ok(())
|
| 1637 | 2026-03-09T10:56:10.203Z | INFO | test_update_status (InternalApi): set cockroachdb setting
setting = cluster.preserve_downgrade_option
value = 22.1
|
| 1638 | 2026-03-09T10:56:10.203Z | TRAC | test_update_status (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 1639 | 2026-03-09T10:56:10.203Z | DEBG | test_update_status (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 1640 | 2026-03-09T10:56:10.204Z | DEBG | test_update_status (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 1641 | 2026-03-09T10:56:10.271Z | DEBG | test_update_status (service-firewall-rule-progator): resolved names for firewall rules
background_task = service_firewall_rule_propagation
instance_interfaces = {}
subnet_interfaces = {}
subnet_networks = {Name("nexus"): [V4(Ipv4Network { addr: 172.30.2.0, prefix: 24 }), V6(Ipv6Network { addr: fd77:e9d2:9cd9:2::, prefix: 64 })], Name("external-dns"): [V4(Ipv4Network { addr: 172.30.1.0, prefix: 24 }), V6(Ipv6Network { addr: fd77:e9d2:9cd9:1::, prefix: 64 })]}
vpc_interfaces = {}
|
| 1642 | 2026-03-09T10:56:10.271Z | TRAC | test_update_status (BackgroundTasks): authorize begin
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Fleet
|
| 1643 | 2026-03-09T10:56:10.271Z | TRAC | test_update_status (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = service_firewall_rule_propagation
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 1644 | 2026-03-09T10:56:10.271Z | TRAC | test_update_status (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
|
| 1645 | 2026-03-09T10:56:10.271Z | DEBG | test_update_status (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {} }
|
| 1646 | 2026-03-09T10:56:10.272Z | DEBG | test_update_status (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
result = Ok(())
|
| 1647 | 2026-03-09T10:56:10.275Z | DEBG | test_update_status (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 1648 | 2026-03-09T10:56:10.279Z | TRAC | test_update_status (InternalApi): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Rack { parent: Fleet, key: c19a698f-c6f9-4a17-ae30-20d711b8f7dc, lookup_type: ById(c19a698f-c6f9-4a17-ae30-20d711b8f7dc) }
|
| 1649 | 2026-03-09T10:56:10.279Z | TRAC | test_update_status (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 1650 | 2026-03-09T10:56:10.279Z | TRAC | test_update_status (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 1651 | 2026-03-09T10:56:10.279Z | DEBG | test_update_status (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 1652 | 2026-03-09T10:56:10.281Z | DEBG | test_update_status (BackgroundTasks): authorize result
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Fleet
result = Ok(())
|
| 1653 | 2026-03-09T10:56:10.281Z | TRAC | test_update_status (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
|
| 1654 | 2026-03-09T10:56:10.281Z | DEBG | test_update_status (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {} }
|
| 1655 | 2026-03-09T10:56:10.281Z | DEBG | test_update_status (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
result = Ok(())
|
| 1656 | 2026-03-09T10:56:10.281Z | DEBG | test_update_status (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 1657 | 2026-03-09T10:56:10.287Z | TRAC | test_update_status (service-firewall-rule-progator): fetched allowlist from DB
allowed = AllowList { id: 001de000-a110-4000-8000-000000000000, time_created: 2026-03-09T10:42:29.158528Z, time_modified: 2026-03-09T10:42:29.158528Z, allowed_ips: None }
background_task = service_firewall_rule_propagation
|
| 1658 | 2026-03-09T10:56:10.288Z | DEBG | test_update_status (service-firewall-rule-progator): Allowlist for user-facing services is set to allow any inbound traffic. Existing VPC firewall rules will not be modified.
background_task = service_firewall_rule_propagation
|
| 1659 | 2026-03-09T10:56:10.290Z | DEBG | test_update_status (service-firewall-rule-progator): resolved firewall rules for sled agents
background_task = service_firewall_rule_propagation
sled_agent_rules = []
|
| 1660 | 2026-03-09T10:56:10.290Z | DEBG | test_update_status (InternalApi): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 1661 | 2026-03-09T10:56:10.290Z | DEBG | test_update_status (service-firewall-rule-progator): resolved 0 rules for sleds
background_task = service_firewall_rule_propagation
|
| 1662 | 2026-03-09T10:56:10.294Z | DEBG | test_update_status (InternalApi): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Rack { parent: Fleet, key: c19a698f-c6f9-4a17-ae30-20d711b8f7dc, lookup_type: ById(c19a698f-c6f9-4a17-ae30-20d711b8f7dc) }
result = Ok(())
|
| 1663 | 2026-03-09T10:56:10.296Z | DEBG | test_update_status (InternalApi): updating rack subnet for rack c19a698f-c6f9-4a17-ae30-20d711b8f7dc to Some(
V6(
Ipv6Network {
addr: fd00:1122:3344:100::,
prefix: 56,
},
),
)
|
| 1664 | 2026-03-09T10:56:10.296Z | TRAC | test_update_status (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 1665 | 2026-03-09T10:56:10.296Z | DEBG | test_update_status (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 1666 | 2026-03-09T10:56:10.297Z | DEBG | test_update_status (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 1667 | 2026-03-09T10:56:10.340Z | INFO | test_update_status (InternalApi): Using static configuration for external switchports
|
| 1668 | 2026-03-09T10:56:10.340Z | TRAC | test_update_status (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 1669 | 2026-03-09T10:56:10.340Z | DEBG | test_update_status (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 1670 | 2026-03-09T10:56:10.342Z | DEBG | test_update_status (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 1671 | 2026-03-09T10:56:10.380Z | DEBG | test_update_status (service-firewall-rule-progator): resolved sleds for vpc oxide-services
background_task = service_firewall_rule_propagation
vpc_to_sled = []
|
| 1672 | 2026-03-09T10:56:10.380Z | DEBG | test_update_status (service-firewall-rule-progator): sending firewall rules to sled agents
background_task = service_firewall_rule_propagation
|
| 1673 | 2026-03-09T10:56:10.380Z | INFO | test_update_status (service-firewall-rule-progator): updated firewall rules on 0 sleds
background_task = service_firewall_rule_propagation
|
| 1674 | 2026-03-09T10:56:10.380Z | DEBG | test_update_status (service-firewall-rule-progator): successfully propagated service firewall rules
background_task = service_firewall_rule_propagation
elapsed = 2.093358084s
|
| 1675 | 2026-03-09T10:56:10.380Z | DEBG | test_update_status (BackgroundTasks): activation complete
background_task = service_firewall_rule_propagation
elapsed = 2.093393689s
iteration = 1
status = {}
|
| 1676 | 2026-03-09T10:56:10.417Z | TRAC | test_update_status (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 1677 | 2026-03-09T10:56:10.417Z | DEBG | test_update_status (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 1678 | 2026-03-09T10:56:10.418Z | DEBG | test_update_status (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 1679 | 2026-03-09T10:56:10.496Z | INFO | test_update_status (InternalApi): Recording Rack Network Configuration
|
| 1680 | 2026-03-09T10:56:10.496Z | TRAC | test_update_status (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 1681 | 2026-03-09T10:56:10.496Z | DEBG | test_update_status (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 1682 | 2026-03-09T10:56:10.497Z | DEBG | test_update_status (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 1683 | 2026-03-09T10:56:10.678Z | TRAC | test_update_status (InternalApi): authorize begin
action = CreateChild
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Fleet
|
| 1684 | 2026-03-09T10:56:10.678Z | TRAC | test_update_status (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 1685 | 2026-03-09T10:56:10.678Z | TRAC | test_update_status (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 1686 | 2026-03-09T10:56:10.678Z | DEBG | test_update_status (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 1687 | 2026-03-09T10:56:10.678Z | DEBG | test_update_status (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 1688 | 2026-03-09T10:56:10.680Z | DEBG | test_update_status (InternalApi): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 1689 | 2026-03-09T10:56:10.683Z | DEBG | test_update_status (InternalApi): authorize result
action = CreateChild
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Fleet
result = Ok(())
|
| 1690 | 2026-03-09T10:56:10.683Z | TRAC | test_update_status (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 1691 | 2026-03-09T10:56:10.683Z | DEBG | test_update_status (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 1692 | 2026-03-09T10:56:10.683Z | DEBG | test_update_status (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 1693 | 2026-03-09T10:56:10.686Z | TRAC | test_update_status (InternalApi): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = IpPool { parent: Fleet, key: d4602367-eb99-40b2-8f71-7b4b5d118484, lookup_type: ByName("oxide-service-pool-v4") }
|
| 1694 | 2026-03-09T10:56:10.686Z | TRAC | test_update_status (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 1695 | 2026-03-09T10:56:10.686Z | TRAC | test_update_status (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 1696 | 2026-03-09T10:56:10.686Z | DEBG | test_update_status (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 1697 | 2026-03-09T10:56:10.687Z | DEBG | test_update_status (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 1698 | 2026-03-09T10:56:10.689Z | DEBG | test_update_status (InternalApi): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 1699 | 2026-03-09T10:56:10.693Z | DEBG | test_update_status (InternalApi): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = IpPool { parent: Fleet, key: d4602367-eb99-40b2-8f71-7b4b5d118484, lookup_type: ByName("oxide-service-pool-v4") }
result = Ok(())
|
| 1700 | 2026-03-09T10:56:10.693Z | TRAC | test_update_status (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 1701 | 2026-03-09T10:56:10.693Z | DEBG | test_update_status (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 1702 | 2026-03-09T10:56:10.693Z | DEBG | test_update_status (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 1703 | 2026-03-09T10:56:10.695Z | TRAC | test_update_status (InternalApi): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = IpPool { parent: Fleet, key: 18cefbb8-c887-40c6-9627-75cc5bfaa870, lookup_type: ByName("oxide-service-pool-v6") }
|
| 1704 | 2026-03-09T10:56:10.695Z | TRAC | test_update_status (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 1705 | 2026-03-09T10:56:10.695Z | TRAC | test_update_status (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 1706 | 2026-03-09T10:56:10.695Z | DEBG | test_update_status (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 1707 | 2026-03-09T10:56:10.695Z | DEBG | test_update_status (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 1708 | 2026-03-09T10:56:10.698Z | DEBG | test_update_status (InternalApi): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 1709 | 2026-03-09T10:56:10.702Z | DEBG | test_update_status (InternalApi): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = IpPool { parent: Fleet, key: 18cefbb8-c887-40c6-9627-75cc5bfaa870, lookup_type: ByName("oxide-service-pool-v6") }
result = Ok(())
|
| 1710 | 2026-03-09T10:56:10.702Z | TRAC | test_update_status (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 1711 | 2026-03-09T10:56:10.702Z | DEBG | test_update_status (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 1712 | 2026-03-09T10:56:10.702Z | DEBG | test_update_status (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 1713 | 2026-03-09T10:56:10.704Z | TRAC | test_update_status (InternalApi): authorize begin
action = CreateChild
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = IpPool { parent: Fleet, key: d4602367-eb99-40b2-8f71-7b4b5d118484, lookup_type: ByName("oxide-service-pool-v4") }
|
| 1714 | 2026-03-09T10:56:10.704Z | TRAC | test_update_status (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 1715 | 2026-03-09T10:56:10.704Z | TRAC | test_update_status (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 1716 | 2026-03-09T10:56:10.704Z | DEBG | test_update_status (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 1717 | 2026-03-09T10:56:10.704Z | DEBG | test_update_status (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 1718 | 2026-03-09T10:56:10.730Z | DEBG | test_update_status (InternalApi): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 1719 | 2026-03-09T10:56:10.733Z | DEBG | test_update_status (InternalApi): authorize result
action = CreateChild
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = IpPool { parent: Fleet, key: d4602367-eb99-40b2-8f71-7b4b5d118484, lookup_type: ByName("oxide-service-pool-v4") }
result = Ok(())
|
| 1720 | 2026-03-09T10:56:10.749Z | TRAC | test_update_status (InternalApi): authorize begin
action = CreateChild
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = IpPool { parent: Fleet, key: 18cefbb8-c887-40c6-9627-75cc5bfaa870, lookup_type: ByName("oxide-service-pool-v6") }
|
| 1721 | 2026-03-09T10:56:10.749Z | TRAC | test_update_status (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 1722 | 2026-03-09T10:56:10.749Z | TRAC | test_update_status (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 1723 | 2026-03-09T10:56:10.749Z | DEBG | test_update_status (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 1724 | 2026-03-09T10:56:10.750Z | DEBG | test_update_status (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 1725 | 2026-03-09T10:56:10.753Z | DEBG | test_update_status (InternalApi): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 1726 | 2026-03-09T10:56:10.761Z | DEBG | test_update_status (InternalApi): authorize result
action = CreateChild
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = IpPool { parent: Fleet, key: 18cefbb8-c887-40c6-9627-75cc5bfaa870, lookup_type: ByName("oxide-service-pool-v6") }
result = Ok(())
|
| 1727 | 2026-03-09T10:56:10.768Z | TRAC | test_update_status (InternalApi): authorize begin
action = CreateChild
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = IpPool { parent: Fleet, key: d4602367-eb99-40b2-8f71-7b4b5d118484, lookup_type: ByName("oxide-service-pool-v4") }
|
| 1728 | 2026-03-09T10:56:10.769Z | TRAC | test_update_status (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 1729 | 2026-03-09T10:56:10.769Z | TRAC | test_update_status (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 1730 | 2026-03-09T10:56:10.769Z | DEBG | test_update_status (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 1731 | 2026-03-09T10:56:10.769Z | DEBG | test_update_status (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 1732 | 2026-03-09T10:56:10.775Z | DEBG | test_update_status (InternalApi): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 1733 | 2026-03-09T10:56:10.789Z | DEBG | test_update_status (InternalApi): authorize result
action = CreateChild
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = IpPool { parent: Fleet, key: d4602367-eb99-40b2-8f71-7b4b5d118484, lookup_type: ByName("oxide-service-pool-v4") }
result = Ok(())
|
| 1734 | 2026-03-09T10:56:10.810Z | TRAC | test_update_status (InternalApi): authorize begin
action = Modify
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = BlueprintConfig
|
| 1735 | 2026-03-09T10:56:10.811Z | TRAC | test_update_status (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 1736 | 2026-03-09T10:56:10.811Z | TRAC | test_update_status (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 1737 | 2026-03-09T10:56:10.811Z | DEBG | test_update_status (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 1738 | 2026-03-09T10:56:10.811Z | DEBG | test_update_status (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 1739 | 2026-03-09T10:56:10.817Z | DEBG | test_update_status (InternalApi): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 1740 | 2026-03-09T10:56:10.821Z | DEBG | test_update_status (InternalApi): authorize result
action = Modify
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = BlueprintConfig
result = Ok(())
|
| 1741 | 2026-03-09T10:56:10.957Z | INFO | test_update_status (InternalApi): inserted blueprint
blueprint_id = 73345d3e-04a0-4ce6-9ba1-33102ce3f515
|
| 1742 | 2026-03-09T10:56:10.957Z | TRAC | test_update_status (InternalApi): authorize begin
action = Modify
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = BlueprintConfig
|
| 1743 | 2026-03-09T10:56:10.957Z | TRAC | test_update_status (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 1744 | 2026-03-09T10:56:10.957Z | TRAC | test_update_status (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 1745 | 2026-03-09T10:56:10.957Z | DEBG | test_update_status (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 1746 | 2026-03-09T10:56:10.958Z | DEBG | test_update_status (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 1747 | 2026-03-09T10:56:10.961Z | DEBG | test_update_status (InternalApi): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 1748 | 2026-03-09T10:56:10.964Z | DEBG | test_update_status (InternalApi): authorize result
action = Modify
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = BlueprintConfig
result = Ok(())
|
| 1749 | 2026-03-09T10:56:11.006Z | INFO | test_update_status (InternalApi): Inserted networking records for boundary_ntp service
|
| 1750 | 2026-03-09T10:56:11.006Z | INFO | test_update_status (InternalApi): No networking records needed for crucible_pantry service
|
| 1751 | 2026-03-09T10:56:11.025Z | INFO | test_update_status (InternalApi): Inserted networking records for external_dns service
|
| 1752 | 2026-03-09T10:56:11.040Z | INFO | test_update_status (InternalApi): Inserted networking records for nexus service
|
| 1753 | 2026-03-09T10:56:11.040Z | INFO | test_update_status (InternalApi): No networking records needed for internal_dns service
|
| 1754 | 2026-03-09T10:56:11.040Z | INFO | test_update_status (InternalApi): No networking records needed for cockroach_db service
|
| 1755 | 2026-03-09T10:56:11.040Z | INFO | test_update_status (InternalApi): No networking records needed for clickhouse service
|
| 1756 | 2026-03-09T10:56:11.040Z | INFO | test_update_status (InternalApi): Inserted service networking records
|
| 1757 | 2026-03-09T10:56:11.040Z | INFO | test_update_status (InternalApi): Inserted physical disks
|
| 1758 | 2026-03-09T10:56:11.040Z | INFO | test_update_status (InternalApi): Inserted zpools
|
| 1759 | 2026-03-09T10:56:11.040Z | INFO | test_update_status (InternalApi): Inserted datasets
|
| 1760 | 2026-03-09T10:56:11.054Z | INFO | test_update_status (InternalApi): Populated DNS tables for internal DNS
|
| 1761 | 2026-03-09T10:56:11.057Z | INFO | test_update_status (InternalApi): Populated DNS tables for external DNS
|
| 1762 | 2026-03-09T10:56:11.057Z | TRAC | test_update_status (InternalApi): authorize begin
action = CreateChild
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Fleet
|
| 1763 | 2026-03-09T10:56:11.057Z | TRAC | test_update_status (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 1764 | 2026-03-09T10:56:11.057Z | TRAC | test_update_status (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 1765 | 2026-03-09T10:56:11.057Z | DEBG | test_update_status (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 1766 | 2026-03-09T10:56:11.058Z | DEBG | test_update_status (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 1767 | 2026-03-09T10:56:11.061Z | DEBG | test_update_status (InternalApi): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 1768 | 2026-03-09T10:56:11.064Z | DEBG | test_update_status (InternalApi): authorize result
action = CreateChild
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Fleet
result = Ok(())
|
| 1769 | 2026-03-09T10:56:11.064Z | TRAC | test_update_status (InternalApi): authorize begin
action = ModifyPolicy
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Fleet
|
| 1770 | 2026-03-09T10:56:11.064Z | TRAC | test_update_status (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 1771 | 2026-03-09T10:56:11.064Z | TRAC | test_update_status (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 1772 | 2026-03-09T10:56:11.064Z | DEBG | test_update_status (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 1773 | 2026-03-09T10:56:11.064Z | DEBG | test_update_status (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 1774 | 2026-03-09T10:56:11.070Z | DEBG | test_update_status (InternalApi): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 1775 | 2026-03-09T10:56:11.072Z | DEBG | test_update_status (InternalApi): authorize result
action = ModifyPolicy
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Fleet
result = Ok(())
|
| 1776 | 2026-03-09T10:56:11.084Z | TRAC | test_update_status (InternalApi): authorize begin
action = Modify
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = DnsConfig
|
| 1777 | 2026-03-09T10:56:11.084Z | TRAC | test_update_status (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 1778 | 2026-03-09T10:56:11.084Z | TRAC | test_update_status (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 1779 | 2026-03-09T10:56:11.084Z | DEBG | test_update_status (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 1780 | 2026-03-09T10:56:11.085Z | DEBG | test_update_status (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 1781 | 2026-03-09T10:56:11.089Z | DEBG | test_update_status (InternalApi): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 1782 | 2026-03-09T10:56:11.093Z | DEBG | test_update_status (InternalApi): authorize result
action = Modify
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = DnsConfig
result = Ok(())
|
| 1783 | 2026-03-09T10:56:11.093Z | TRAC | test_update_status (InternalApi): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = DnsConfig
|
| 1784 | 2026-03-09T10:56:11.093Z | TRAC | test_update_status (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 1785 | 2026-03-09T10:56:11.093Z | TRAC | test_update_status (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 1786 | 2026-03-09T10:56:11.093Z | DEBG | test_update_status (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 1787 | 2026-03-09T10:56:11.094Z | DEBG | test_update_status (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 1788 | 2026-03-09T10:56:11.096Z | DEBG | test_update_status (InternalApi): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 1789 | 2026-03-09T10:56:11.102Z | DEBG | test_update_status (InternalApi): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = DnsConfig
result = Ok(())
|
| 1790 | 2026-03-09T10:56:11.106Z | TRAC | test_update_status (InternalApi): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = DnsConfig
|
| 1791 | 2026-03-09T10:56:11.106Z | TRAC | test_update_status (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 1792 | 2026-03-09T10:56:11.106Z | TRAC | test_update_status (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 1793 | 2026-03-09T10:56:11.106Z | DEBG | test_update_status (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 1794 | 2026-03-09T10:56:11.106Z | DEBG | test_update_status (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 1795 | 2026-03-09T10:56:11.112Z | DEBG | test_update_status (InternalApi): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 1796 | 2026-03-09T10:56:11.122Z | DEBG | test_update_status (InternalApi): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = DnsConfig
result = Ok(())
|
| 1797 | 2026-03-09T10:56:11.149Z | INFO | test_update_status (InternalApi): Created recovery silo
|
| 1798 | 2026-03-09T10:56:11.150Z | INFO | test_update_status (InternalApi): Created recovery user
|
| 1799 | 2026-03-09T10:56:11.153Z | INFO | test_update_status (InternalApi): Created recovery user's password
|
| 1800 | 2026-03-09T10:56:11.154Z | TRAC | test_update_status (InternalApi): authorize begin
action = ModifyPolicy
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Silo { parent: Fleet, key: 0f94312c-7b7d-422a-a21f-bf3a560e3b3d, lookup_type: ById(0f94312c-7b7d-422a-a21f-bf3a560e3b3d) }
|
| 1801 | 2026-03-09T10:56:11.154Z | TRAC | test_update_status (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
resource_id = 0f94312c-7b7d-422a-a21f-bf3a560e3b3d
resource_type = Silo
|
| 1802 | 2026-03-09T10:56:11.154Z | TRAC | test_update_status (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 1803 | 2026-03-09T10:56:11.154Z | DEBG | test_update_status (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 1804 | 2026-03-09T10:56:11.155Z | DEBG | test_update_status (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 1805 | 2026-03-09T10:56:11.178Z | TRAC | test_update_status (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 1806 | 2026-03-09T10:56:11.178Z | TRAC | test_update_status (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 1807 | 2026-03-09T10:56:11.178Z | DEBG | test_update_status (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 1808 | 2026-03-09T10:56:11.178Z | DEBG | test_update_status (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 1809 | 2026-03-09T10:56:11.203Z | DEBG | test_update_status (InternalApi): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 1810 | 2026-03-09T10:56:11.208Z | DEBG | test_update_status (InternalApi): authorize result
action = ModifyPolicy
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Silo { parent: Fleet, key: 0f94312c-7b7d-422a-a21f-bf3a560e3b3d, lookup_type: ById(0f94312c-7b7d-422a-a21f-bf3a560e3b3d) }
result = Ok(())
|
| 1811 | 2026-03-09T10:56:11.208Z | DEBG | test_update_status (InternalApi): Generated role assignment queries
|
| 1812 | 2026-03-09T10:56:11.219Z | INFO | test_update_status (InternalApi): Granted Silo privileges
|
| 1813 | 2026-03-09T10:56:11.219Z | TRAC | test_update_status (InternalApi): authorize begin
action = Modify
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Fleet
|
| 1814 | 2026-03-09T10:56:11.219Z | TRAC | test_update_status (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 1815 | 2026-03-09T10:56:11.219Z | TRAC | test_update_status (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 1816 | 2026-03-09T10:56:11.219Z | DEBG | test_update_status (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 1817 | 2026-03-09T10:56:11.219Z | DEBG | test_update_status (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 1818 | 2026-03-09T10:56:11.226Z | DEBG | test_update_status (InternalApi): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 1819 | 2026-03-09T10:56:11.230Z | DEBG | test_update_status (InternalApi): authorize result
action = Modify
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Fleet
result = Ok(())
|
| 1820 | 2026-03-09T10:56:11.234Z | TRAC | test_update_status (InternalApi): authorize begin
action = Modify
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Rack { parent: Fleet, key: c19a698f-c6f9-4a17-ae30-20d711b8f7dc, lookup_type: ById(c19a698f-c6f9-4a17-ae30-20d711b8f7dc) }
|
| 1821 | 2026-03-09T10:56:11.234Z | TRAC | test_update_status (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 1822 | 2026-03-09T10:56:11.234Z | TRAC | test_update_status (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 1823 | 2026-03-09T10:56:11.234Z | DEBG | test_update_status (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 1824 | 2026-03-09T10:56:11.235Z | DEBG | test_update_status (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 1825 | 2026-03-09T10:56:11.239Z | DEBG | test_update_status (InternalApi): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 1826 | 2026-03-09T10:56:11.246Z | DEBG | test_update_status (InternalApi): authorize result
action = Modify
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Rack { parent: Fleet, key: c19a698f-c6f9-4a17-ae30-20d711b8f7dc, lookup_type: ById(c19a698f-c6f9-4a17-ae30-20d711b8f7dc) }
result = Ok(())
|
| 1827 | 2026-03-09T10:56:11.246Z | TRAC | test_update_status (InternalApi): authorize begin
action = Modify
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Rack { parent: Fleet, key: c19a698f-c6f9-4a17-ae30-20d711b8f7dc, lookup_type: ById(c19a698f-c6f9-4a17-ae30-20d711b8f7dc) }
|
| 1828 | 2026-03-09T10:56:11.246Z | TRAC | test_update_status (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 1829 | 2026-03-09T10:56:11.247Z | TRAC | test_update_status (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 1830 | 2026-03-09T10:56:11.247Z | DEBG | test_update_status (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 1831 | 2026-03-09T10:56:11.247Z | DEBG | test_update_status (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 1832 | 2026-03-09T10:56:11.253Z | DEBG | test_update_status (InternalApi): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 1833 | 2026-03-09T10:56:11.258Z | DEBG | test_update_status (InternalApi): authorize result
action = Modify
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Rack { parent: Fleet, key: c19a698f-c6f9-4a17-ae30-20d711b8f7dc, lookup_type: ById(c19a698f-c6f9-4a17-ae30-20d711b8f7dc) }
result = Ok(())
|
| 1834 | 2026-03-09T10:56:11.304Z | DEBG | test_update_status (BackgroundTasks): activating
background_task = dns_config_internal
dns_group = internal
iteration = 2
reason = Signaled
|
| 1835 | 2026-03-09T10:56:11.304Z | DEBG | test_update_status (BackgroundTasks): activating
background_task = dns_servers_internal
dns_group = internal
iteration = 2
reason = Signaled
|
| 1836 | 2026-03-09T10:56:11.304Z | TRAC | test_update_status (DnsResolver): lookup_all_socket_v6 srv
dns_name = _nameservice._tcp.control-plane.oxide.internal
|
| 1837 | 2026-03-09T10:56:11.304Z | DEBG | test_update_status (BackgroundTasks): reading DNS version
background_task = dns_config_internal
dns_group = internal
|
| 1838 | 2026-03-09T10:56:11.304Z | TRAC | test_update_status (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = dns_config_internal
dns_group = internal
resource = Database
|
| 1839 | 2026-03-09T10:56:11.304Z | DEBG | test_update_status (BackgroundTasks): roles
background_task = dns_config_internal
dns_group = internal
roles = RoleSet { roles: {} }
|
| 1840 | 2026-03-09T10:56:11.305Z | DEBG | test_update_status (BackgroundTasks): activating
background_task = dns_config_external
dns_group = external
iteration = 2
reason = Signaled
|
| 1841 | 2026-03-09T10:56:11.305Z | DEBG | test_update_status (BackgroundTasks): reading DNS version
background_task = dns_config_external
dns_group = external
|
| 1842 | 2026-03-09T10:56:11.305Z | TRAC | test_update_status (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = dns_config_external
dns_group = external
resource = Database
|
| 1843 | 2026-03-09T10:56:11.305Z | DEBG | test_update_status (BackgroundTasks): roles
background_task = dns_config_external
dns_group = external
roles = RoleSet { roles: {} }
|
| 1844 | 2026-03-09T10:56:11.305Z | DEBG | test_update_status (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = dns_config_internal
dns_group = internal
resource = Database
result = Ok(())
|
| 1845 | 2026-03-09T10:56:11.305Z | DEBG | test_update_status (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = dns_config_external
dns_group = external
resource = Database
result = Ok(())
|
| 1846 | 2026-03-09T10:56:11.306Z | DEBG | test_update_status (BackgroundTasks): activating
background_task = dns_servers_external
dns_group = external
iteration = 2
reason = Signaled
|
| 1847 | 2026-03-09T10:56:11.306Z | TRAC | test_update_status (DnsResolver): lookup_all_socket_v6 srv
dns_name = _external-dns._tcp.control-plane.oxide.internal
|
| 1848 | 2026-03-09T10:56:11.306Z | DEBG | test_update_status (BackgroundTasks): activating
background_task = external_endpoints
iteration = 2
reason = Signaled
|
| 1849 | 2026-03-09T10:56:11.306Z | TRAC | test_update_status (BackgroundTasks): authorize begin
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = external_endpoints
resource = Fleet
|
| 1850 | 2026-03-09T10:56:11.306Z | TRAC | test_update_status (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = external_endpoints
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 1851 | 2026-03-09T10:56:11.306Z | TRAC | test_update_status (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = external_endpoints
resource = Database
|
| 1852 | 2026-03-09T10:56:11.306Z | DEBG | test_update_status (BackgroundTasks): roles
background_task = external_endpoints
roles = RoleSet { roles: {} }
|
| 1853 | 2026-03-09T10:56:11.306Z | DEBG | test_update_status (BackgroundTasks): activating
background_task = inventory_collection
iteration = 3
reason = Signaled
|
| 1854 | 2026-03-09T10:56:11.306Z | TRAC | test_update_status (BackgroundTasks): authorize begin
action = Modify
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = inventory_collection
resource = Inventory
|
| 1855 | 2026-03-09T10:56:11.306Z | TRAC | test_update_status (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = inventory_collection
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 1856 | 2026-03-09T10:56:11.307Z | TRAC | test_update_status (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = inventory_collection
resource = Database
|
| 1857 | 2026-03-09T10:56:11.307Z | DEBG | test_update_status (BackgroundTasks): roles
background_task = inventory_collection
roles = RoleSet { roles: {} }
|
| 1858 | 2026-03-09T10:56:11.307Z | DEBG | test_update_status (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = external_endpoints
resource = Database
result = Ok(())
|
| 1859 | 2026-03-09T10:56:11.307Z | DEBG | test_update_status (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = inventory_collection
resource = Database
result = Ok(())
|
| 1860 | 2026-03-09T10:56:11.307Z | DEBG | test_update_status (BackgroundTasks): activating
background_task = blueprint_loader
iteration = 2
reason = Signaled
|
| 1861 | 2026-03-09T10:56:11.307Z | TRAC | test_update_status (BackgroundTasks): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = blueprint_loader
resource = BlueprintConfig
|
| 1862 | 2026-03-09T10:56:11.307Z | TRAC | test_update_status (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = blueprint_loader
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 1863 | 2026-03-09T10:56:11.307Z | TRAC | test_update_status (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = blueprint_loader
resource = Database
|
| 1864 | 2026-03-09T10:56:11.307Z | DEBG | test_update_status (BackgroundTasks): roles
background_task = blueprint_loader
roles = RoleSet { roles: {} }
|
| 1865 | 2026-03-09T10:56:11.308Z | DEBG | test_update_status (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = blueprint_loader
resource = Database
result = Ok(())
|
| 1866 | 2026-03-09T10:56:11.308Z | TRAC | test_update_status (BackgroundTasks): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = dns_config_internal
dns_group = internal
resource = DnsConfig
|
| 1867 | 2026-03-09T10:56:11.308Z | TRAC | test_update_status (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = dns_config_internal
dns_group = internal
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 1868 | 2026-03-09T10:56:11.308Z | TRAC | test_update_status (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = dns_config_internal
dns_group = internal
resource = Database
|
| 1869 | 2026-03-09T10:56:11.308Z | DEBG | test_update_status (BackgroundTasks): roles
background_task = dns_config_internal
dns_group = internal
roles = RoleSet { roles: {} }
|
| 1870 | 2026-03-09T10:56:11.308Z | DEBG | test_update_status (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = dns_config_internal
dns_group = internal
resource = Database
result = Ok(())
|
| 1871 | 2026-03-09T10:56:11.308Z | TRAC | test_update_status (dns): buffer
buffer = Length: 76 (0x4c) bytes\n0000: ba 55 01 00 00 01 00 00 00 00 00 01 0d 5f 65 78 .U..........._ex\n0010: 74 65 72 6e 61 6c 2d 64 6e 73 04 5f 74 63 70 0d ternal-dns._tcp.\n0020: 63 6f 6e 74 72 6f 6c 2d 70 6c 61 6e 65 05 6f 78 control-plane.ox\n0030: 69 64 65 08 69 6e 74 65 72 6e 61 6c 00 00 21 00 ide.internal..!.\n0040: 01 00 00 29 04 d0 00 00 00 00 00 00 ...)........
kind = dns
peer_addr = [::1]:30908
req_id = 4a627aeb-d8ea-46df-a873-4e3b035c78bc
|
| 1872 | 2026-03-09T10:56:11.309Z | DEBG | test_update_status (dns): message_request
kind = dns
mr = MessageRequest {\n header: Header {\n id: 47701,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n queries: Queries {\n queries: [\n LowerQuery {\n name: LowerName(\n Name("_external-dns._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_external-dns._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n ],\n original: [\n 13,\n 95,\n 101,\n 120,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 45,\n 100,\n 110,\n 115,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n flags: EdnsFlags {\n dnssec_ok: false,\n z: 0,\n },\n max_payload: 1232,\n options: OPT {\n options: [],\n },\n },\n ),\n}
peer_addr = [::1]:30908
req_id = 4a627aeb-d8ea-46df-a873-4e3b035c78bc
|
| 1873 | 2026-03-09T10:56:11.309Z | DEBG | test_update_status (store): query key
key = _external-dns._tcp
|
| 1874 | 2026-03-09T10:56:11.309Z | DEBG | test_update_status (store): query key
key = 7f3bb0cc-f231-4804-b546-4f80d92bd1a9.host
|
| 1875 | 2026-03-09T10:56:11.309Z | DEBG | test_update_status (dns): dns response
additional_records = [Record { name_labels: Name("7f3bb0cc-f231-4804-b546-4f80d92bd1a9.host.control-plane.oxide.internal"), dns_class: IN, ttl: 0, rdata: AAAA(AAAA(::1)) }]
kind = dns
peer_addr = [::1]:30908
query = LowerQuery { name: LowerName(Name("_external-dns._tcp.control-plane.oxide.internal.")), original: Query { name: Name("_external-dns._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN } }
records = [Record { name_labels: Name("_external-dns._tcp.control-plane.oxide.internal."), dns_class: IN, ttl: 0, rdata: SRV(SRV { priority: 0, weight: 0, port: 65043, target: Name("7f3bb0cc-f231-4804-b546-4f80d92bd1a9.host.control-plane.oxide.internal") }) }]
req_id = 4a627aeb-d8ea-46df-a873-4e3b035c78bc
|
| 1876 | 2026-03-09T10:56:11.309Z | TRAC | test_update_status (dns): buffer
buffer = Length: 75 (0x4b) bytes\n0000: e0 71 01 00 00 01 00 00 00 00 00 01 0c 5f 6e 61 .q..........._na\n0010: 6d 65 73 65 72 76 69 63 65 04 5f 74 63 70 0d 63 meservice._tcp.c\n0020: 6f 6e 74 72 6f 6c 2d 70 6c 61 6e 65 05 6f 78 69 ontrol-plane.oxi\n0030: 64 65 08 69 6e 74 65 72 6e 61 6c 00 00 21 00 01 de.internal..!..\n0040: 00 00 29 04 d0 00 00 00 00 00 00 ..)........
kind = dns
peer_addr = [::1]:17555
req_id = 320b6fa3-20a9-4a50-ad97-24ddfc976a0c
|
| 1877 | 2026-03-09T10:56:11.309Z | DEBG | test_update_status (dns): message_request
kind = dns
mr = MessageRequest {\n header: Header {\n id: 57457,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n queries: Queries {\n queries: [\n LowerQuery {\n name: LowerName(\n Name("_nameservice._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_nameservice._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n ],\n original: [\n 12,\n 95,\n 110,\n 97,\n 109,\n 101,\n 115,\n 101,\n 114,\n 118,\n 105,\n 99,\n 101,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n flags: EdnsFlags {\n dnssec_ok: false,\n z: 0,\n },\n max_payload: 1232,\n options: OPT {\n options: [],\n },\n },\n ),\n}
peer_addr = [::1]:17555
req_id = 320b6fa3-20a9-4a50-ad97-24ddfc976a0c
|
| 1878 | 2026-03-09T10:56:11.309Z | DEBG | test_update_status (store): query key
key = _nameservice._tcp
|
| 1879 | 2026-03-09T10:56:11.309Z | DEBG | test_update_status (store): query key
key = a0344c16-8d44-4bbe-961e-1c2ebc9c1fdf.host
|
| 1880 | 2026-03-09T10:56:11.309Z | DEBG | test_update_status (dns): dns response
additional_records = [Record { name_labels: Name("a0344c16-8d44-4bbe-961e-1c2ebc9c1fdf.host.control-plane.oxide.internal"), dns_class: IN, ttl: 0, rdata: AAAA(AAAA(::1)) }]
kind = dns
peer_addr = [::1]:17555
query = LowerQuery { name: LowerName(Name("_nameservice._tcp.control-plane.oxide.internal.")), original: Query { name: Name("_nameservice._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN } }
records = [Record { name_labels: Name("_nameservice._tcp.control-plane.oxide.internal."), dns_class: IN, ttl: 0, rdata: SRV(SRV { priority: 0, weight: 0, port: 37611, target: Name("a0344c16-8d44-4bbe-961e-1c2ebc9c1fdf.host.control-plane.oxide.internal") }) }]
req_id = 320b6fa3-20a9-4a50-ad97-24ddfc976a0c
|
| 1881 | 2026-03-09T10:56:11.309Z | DEBG | test_update_status (DnsResolver): lookup_all_socket_v6 srv
dns_name = _external-dns._tcp.control-plane.oxide.internal
response = SrvLookup(Lookup { query: Query { name: Name("_external-dns._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN }, records: [Record { name_labels: Name("_external-dns._tcp.control-plane.oxide.internal."), dns_class: IN, ttl: 0, rdata: SRV(SRV { priority: 0, weight: 0, port: 65043, target: Name("7f3bb0cc-f231-4804-b546-4f80d92bd1a9.host.control-plane.oxide.internal.") }) }, Record { name_labels: Name("7f3bb0cc-f231-4804-b546-4f80d92bd1a9.host.control-plane.oxide.internal."), dns_class: IN, ttl: 0, rdata: AAAA(AAAA(::1)) }], valid_until: Instant { tv_sec: 2140, tv_nsec: 13691099 } })
|
| 1882 | 2026-03-09T10:56:11.309Z | TRAC | test_update_status (DnsResolver): lookup_service_targets: looking up SRV target
|
| 1883 | 2026-03-09T10:56:11.309Z | DEBG | test_update_status (DnsResolver): lookup_all_socket_v6 srv
dns_name = _nameservice._tcp.control-plane.oxide.internal
response = SrvLookup(Lookup { query: Query { name: Name("_nameservice._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN }, records: [Record { name_labels: Name("_nameservice._tcp.control-plane.oxide.internal."), dns_class: IN, ttl: 0, rdata: SRV(SRV { priority: 0, weight: 0, port: 37611, target: Name("a0344c16-8d44-4bbe-961e-1c2ebc9c1fdf.host.control-plane.oxide.internal.") }) }, Record { name_labels: Name("a0344c16-8d44-4bbe-961e-1c2ebc9c1fdf.host.control-plane.oxide.internal."), dns_class: IN, ttl: 0, rdata: AAAA(AAAA(::1)) }], valid_until: Instant { tv_sec: 2140, tv_nsec: 13849064 } })
|
| 1884 | 2026-03-09T10:56:11.309Z | TRAC | test_update_status (DnsResolver): lookup_service_targets: looking up SRV target
|
| 1885 | 2026-03-09T10:56:11.310Z | TRAC | test_update_status (dns): buffer
buffer = Length: 99 (0x63) bytes\n0000: 35 34 01 00 00 01 00 00 00 00 00 01 24 37 66 33 54..........$7f3\n0010: 62 62 30 63 63 2d 66 32 33 31 2d 34 38 30 34 2d bb0cc-f231-4804-\n0020: 62 35 34 36 2d 34 66 38 30 64 39 32 62 64 31 61 b546-4f80d92bd1a\n0030: 39 04 68 6f 73 74 0d 63 6f 6e 74 72 6f 6c 2d 70 9.host.control-p\n0040: 6c 61 6e 65 05 6f 78 69 64 65 08 69 6e 74 65 72 lane.oxide.inter\n0050: 6e 61 6c 00 00 1c 00 01 00 00 29 04 d0 00 00 00 nal.......).....\n0060: 00 00 00 ...
kind = dns
peer_addr = [::1]:57318
req_id = bff612de-66e8-41f4-a1ab-f1556cca682d
|
| 1886 | 2026-03-09T10:56:11.310Z | TRAC | test_update_status (dns): buffer
buffer = Length: 99 (0x63) bytes\n0000: d5 a9 01 00 00 01 00 00 00 00 00 01 24 61 30 33 ............$a03\n0010: 34 34 63 31 36 2d 38 64 34 34 2d 34 62 62 65 2d 44c16-8d44-4bbe-\n0020: 39 36 31 65 2d 31 63 32 65 62 63 39 63 31 66 64 961e-1c2ebc9c1fd\n0030: 66 04 68 6f 73 74 0d 63 6f 6e 74 72 6f 6c 2d 70 f.host.control-p\n0040: 6c 61 6e 65 05 6f 78 69 64 65 08 69 6e 74 65 72 lane.oxide.inter\n0050: 6e 61 6c 00 00 1c 00 01 00 00 29 04 d0 00 00 00 nal.......).....\n0060: 00 00 00 ...
kind = dns
peer_addr = [::1]:58067
req_id = c43ca815-a223-4776-af2f-299282e9cb3c
|
| 1887 | 2026-03-09T10:56:11.310Z | DEBG | test_update_status (dns): message_request
kind = dns
mr = MessageRequest {\n header: Header {\n id: 13620,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n queries: Queries {\n queries: [\n LowerQuery {\n name: LowerName(\n Name("7f3bb0cc-f231-4804-b546-4f80d92bd1a9.host.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("7f3bb0cc-f231-4804-b546-4f80d92bd1a9.host.control-plane.oxide.internal."),\n query_type: AAAA,\n query_class: IN,\n },\n },\n ],\n original: [\n 36,\n 55,\n 102,\n 51,\n 98,\n 98,\n 48,\n 99,\n 99,\n 45,\n 102,\n 50,\n 51,\n 49,\n 45,\n 52,\n 56,\n 48,\n 52,\n 45,\n 98,\n 53,\n 52,\n 54,\n 45,\n 52,\n 102,\n 56,\n 48,\n 100,\n 57,\n 50,\n 98,\n 100,\n 49,\n 97,\n 57,\n 4,\n 104,\n 111,\n 115,\n 116,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 28,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n flags: EdnsFlags {\n dnssec_ok: false,\n z: 0,\n },\n max_payload: 1232,\n options: OPT {\n options: [],\n },\n },\n ),\n}
peer_addr = [::1]:57318
req_id = bff612de-66e8-41f4-a1ab-f1556cca682d
|
| 1888 | 2026-03-09T10:56:11.310Z | DEBG | test_update_status (dns): message_request
kind = dns
mr = MessageRequest {\n header: Header {\n id: 54697,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n queries: Queries {\n queries: [\n LowerQuery {\n name: LowerName(\n Name("a0344c16-8d44-4bbe-961e-1c2ebc9c1fdf.host.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("a0344c16-8d44-4bbe-961e-1c2ebc9c1fdf.host.control-plane.oxide.internal."),\n query_type: AAAA,\n query_class: IN,\n },\n },\n ],\n original: [\n 36,\n 97,\n 48,\n 51,\n 52,\n 52,\n 99,\n 49,\n 54,\n 45,\n 56,\n 100,\n 52,\n 52,\n 45,\n 52,\n 98,\n 98,\n 101,\n 45,\n 57,\n 54,\n 49,\n 101,\n 45,\n 49,\n 99,\n 50,\n 101,\n 98,\n 99,\n 57,\n 99,\n 49,\n 102,\n 100,\n 102,\n 4,\n 104,\n 111,\n 115,\n 116,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 28,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n flags: EdnsFlags {\n dnssec_ok: false,\n z: 0,\n },\n max_payload: 1232,\n options: OPT {\n options: [],\n },\n },\n ),\n}
peer_addr = [::1]:58067
req_id = c43ca815-a223-4776-af2f-299282e9cb3c
|
| 1889 | 2026-03-09T10:56:11.310Z | DEBG | test_update_status (store): query key
key = a0344c16-8d44-4bbe-961e-1c2ebc9c1fdf.host
|
| 1890 | 2026-03-09T10:56:11.310Z | DEBG | test_update_status (store): query key
key = 7f3bb0cc-f231-4804-b546-4f80d92bd1a9.host
|
| 1891 | 2026-03-09T10:56:11.310Z | DEBG | test_update_status (dns): dns response
additional_records = []
kind = dns
peer_addr = [::1]:58067
query = LowerQuery { name: LowerName(Name("a0344c16-8d44-4bbe-961e-1c2ebc9c1fdf.host.control-plane.oxide.internal.")), original: Query { name: Name("a0344c16-8d44-4bbe-961e-1c2ebc9c1fdf.host.control-plane.oxide.internal."), query_type: AAAA, query_class: IN } }
records = [Record { name_labels: Name("a0344c16-8d44-4bbe-961e-1c2ebc9c1fdf.host.control-plane.oxide.internal."), dns_class: IN, ttl: 0, rdata: AAAA(AAAA(::1)) }]
req_id = c43ca815-a223-4776-af2f-299282e9cb3c
|
| 1892 | 2026-03-09T10:56:11.310Z | DEBG | test_update_status (dns): dns response
additional_records = []
kind = dns
peer_addr = [::1]:57318
query = LowerQuery { name: LowerName(Name("7f3bb0cc-f231-4804-b546-4f80d92bd1a9.host.control-plane.oxide.internal.")), original: Query { name: Name("7f3bb0cc-f231-4804-b546-4f80d92bd1a9.host.control-plane.oxide.internal."), query_type: AAAA, query_class: IN } }
records = [Record { name_labels: Name("7f3bb0cc-f231-4804-b546-4f80d92bd1a9.host.control-plane.oxide.internal."), dns_class: IN, ttl: 0, rdata: AAAA(AAAA(::1)) }]
req_id = bff612de-66e8-41f4-a1ab-f1556cca682d
|
| 1893 | 2026-03-09T10:56:11.310Z | INFO | test_update_status (BackgroundTasks): found DNS servers (initial)
addresses = DnsServersList { addresses: [[::1]:37611] }
background_task = dns_servers_internal
dns_group = internal
|
| 1894 | 2026-03-09T10:56:11.310Z | INFO | test_update_status (BackgroundTasks): found DNS servers (initial)
addresses = DnsServersList { addresses: [[::1]:65043] }
background_task = dns_servers_external
dns_group = external
|
| 1895 | 2026-03-09T10:56:11.310Z | DEBG | test_update_status (BackgroundTasks): activation complete
background_task = dns_servers_internal
dns_group = internal
elapsed = 5.877263ms
iteration = 2
status = {"addresses":["[::1]:37611"]}
|
| 1896 | 2026-03-09T10:56:11.310Z | DEBG | test_update_status (BackgroundTasks): activation complete
background_task = dns_servers_external
dns_group = external
elapsed = 4.377357ms
iteration = 2
status = {"addresses":["[::1]:65043"]}
|
| 1897 | 2026-03-09T10:56:11.310Z | DEBG | test_update_status (BackgroundTasks): activating
background_task = dns_propagation_internal
dns_group = internal
iteration = 2
reason = Dependency
|
| 1898 | 2026-03-09T10:56:11.310Z | WARN | test_update_status (BackgroundTasks): DNS propagation: skipped
background_task = dns_propagation_internal
dns_group = internal
reason = no config
|
| 1899 | 2026-03-09T10:56:11.310Z | DEBG | test_update_status (BackgroundTasks): activating
background_task = dns_propagation_external
dns_group = external
iteration = 2
reason = Dependency
|
| 1900 | 2026-03-09T10:56:11.310Z | DEBG | test_update_status (BackgroundTasks): activation complete
background_task = dns_propagation_internal
dns_group = internal
elapsed = 17.068\u{b5}s
iteration = 2
status = {"error":"no config"}
|
| 1901 | 2026-03-09T10:56:11.310Z | WARN | test_update_status (BackgroundTasks): DNS propagation: skipped
background_task = dns_propagation_external
dns_group = external
reason = no config
|
| 1902 | 2026-03-09T10:56:11.310Z | DEBG | test_update_status (BackgroundTasks): activation complete
background_task = dns_propagation_external
dns_group = external
elapsed = 18.957\u{b5}s
iteration = 2
status = {"error":"no config"}
|
| 1903 | 2026-03-09T10:56:11.310Z | TRAC | test_update_status (BackgroundTasks): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = dns_config_external
dns_group = external
resource = DnsConfig
|
| 1904 | 2026-03-09T10:56:11.310Z | TRAC | test_update_status (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = dns_config_external
dns_group = external
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 1905 | 2026-03-09T10:56:11.310Z | TRAC | test_update_status (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = dns_config_external
dns_group = external
resource = Database
|
| 1906 | 2026-03-09T10:56:11.310Z | DEBG | test_update_status (BackgroundTasks): roles
background_task = dns_config_external
dns_group = external
roles = RoleSet { roles: {} }
|
| 1907 | 2026-03-09T10:56:11.311Z | DEBG | test_update_status (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = dns_config_external
dns_group = external
resource = Database
result = Ok(())
|
| 1908 | 2026-03-09T10:56:11.311Z | DEBG | test_update_status (BackgroundTasks): roles
background_task = blueprint_loader
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 1909 | 2026-03-09T10:56:11.311Z | DEBG | test_update_status (BackgroundTasks): roles
background_task = inventory_collection
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 1910 | 2026-03-09T10:56:11.315Z | DEBG | test_update_status (BackgroundTasks): authorize result
action = Modify
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = inventory_collection
resource = Inventory
result = Ok(())
|
| 1911 | 2026-03-09T10:56:11.315Z | TRAC | test_update_status (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = inventory_collection
resource = Database
|
| 1912 | 2026-03-09T10:56:11.315Z | DEBG | test_update_status (BackgroundTasks): roles
background_task = inventory_collection
roles = RoleSet { roles: {} }
|
| 1913 | 2026-03-09T10:56:11.315Z | DEBG | test_update_status (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = inventory_collection
resource = Database
result = Ok(())
|
| 1914 | 2026-03-09T10:56:11.316Z | DEBG | test_update_status (BackgroundTasks): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = blueprint_loader
resource = BlueprintConfig
result = Ok(())
|
| 1915 | 2026-03-09T10:56:11.316Z | TRAC | test_update_status (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = blueprint_loader
resource = Database
|
| 1916 | 2026-03-09T10:56:11.316Z | DEBG | test_update_status (BackgroundTasks): roles
background_task = blueprint_loader
roles = RoleSet { roles: {} }
|
| 1917 | 2026-03-09T10:56:11.316Z | DEBG | test_update_status (BackgroundTasks): roles
background_task = dns_config_internal
dns_group = internal
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 1918 | 2026-03-09T10:56:11.316Z | DEBG | test_update_status (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = blueprint_loader
resource = Database
result = Ok(())
|
| 1919 | 2026-03-09T10:56:11.317Z | DEBG | test_update_status (BackgroundTasks): roles
background_task = external_endpoints
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 1920 | 2026-03-09T10:56:11.320Z | DEBG | test_update_status (BackgroundTasks): authorize result
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = external_endpoints
resource = Fleet
result = Ok(())
|
| 1921 | 2026-03-09T10:56:11.320Z | TRAC | test_update_status (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = external_endpoints
resource = Database
|
| 1922 | 2026-03-09T10:56:11.320Z | DEBG | test_update_status (BackgroundTasks): roles
background_task = external_endpoints
roles = RoleSet { roles: {} }
|
| 1923 | 2026-03-09T10:56:11.320Z | DEBG | test_update_status (BackgroundTasks): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = dns_config_internal
dns_group = internal
resource = DnsConfig
result = Ok(())
|
| 1924 | 2026-03-09T10:56:11.321Z | DEBG | test_update_status (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = external_endpoints
resource = Database
result = Ok(())
|
| 1925 | 2026-03-09T10:56:11.322Z | DEBG | test_update_status (BackgroundTasks): roles
background_task = dns_config_external
dns_group = external
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 1926 | 2026-03-09T10:56:11.322Z | TRAC | test_update_status (BackgroundTasks): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = blueprint_loader
resource = Blueprint { parent: Fleet, key: 73345d3e-04a0-4ce6-9ba1-33102ce3f515, lookup_type: ById(73345d3e-04a0-4ce6-9ba1-33102ce3f515) }
|
| 1927 | 2026-03-09T10:56:11.322Z | TRAC | test_update_status (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = blueprint_loader
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 1928 | 2026-03-09T10:56:11.322Z | TRAC | test_update_status (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = blueprint_loader
resource = Database
|
| 1929 | 2026-03-09T10:56:11.322Z | DEBG | test_update_status (BackgroundTasks): roles
background_task = blueprint_loader
roles = RoleSet { roles: {} }
|
| 1930 | 2026-03-09T10:56:11.322Z | DEBG | test_update_status (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = blueprint_loader
resource = Database
result = Ok(())
|
| 1931 | 2026-03-09T10:56:11.323Z | DEBG | test_update_status (BackgroundTasks): inventory_prune_one: nothing eligible for removal (too few)
background_task = inventory_collection
candidates = []
|
| 1932 | 2026-03-09T10:56:11.323Z | TRAC | test_update_status (DnsResolver): lookup_all_socket_v6 srv
dns_name = _mgs._tcp.control-plane.oxide.internal
|
| 1933 | 2026-03-09T10:56:11.324Z | TRAC | test_update_status (dns): buffer
buffer = Length: 67 (0x43) bytes\n0000: fa 75 01 00 00 01 00 00 00 00 00 01 04 5f 6d 67 .u..........._mg\n0010: 73 04 5f 74 63 70 0d 63 6f 6e 74 72 6f 6c 2d 70 s._tcp.control-p\n0020: 6c 61 6e 65 05 6f 78 69 64 65 08 69 6e 74 65 72 lane.oxide.inter\n0030: 6e 61 6c 00 00 21 00 01 00 00 29 04 d0 00 00 00 nal..!....).....\n0040: 00 00 00 ...
kind = dns
peer_addr = [::1]:43935
req_id = f0b95c4b-c904-472f-87a2-deb457d4468f
|
| 1934 | 2026-03-09T10:56:11.324Z | DEBG | test_update_status (dns): message_request
kind = dns
mr = MessageRequest {\n header: Header {\n id: 64117,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n queries: Queries {\n queries: [\n LowerQuery {\n name: LowerName(\n Name("_mgs._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_mgs._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n ],\n original: [\n 4,\n 95,\n 109,\n 103,\n 115,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n flags: EdnsFlags {\n dnssec_ok: false,\n z: 0,\n },\n max_payload: 1232,\n options: OPT {\n options: [],\n },\n },\n ),\n}
peer_addr = [::1]:43935
req_id = f0b95c4b-c904-472f-87a2-deb457d4468f
|
| 1935 | 2026-03-09T10:56:11.324Z | DEBG | test_update_status (store): query key
key = _mgs._tcp
|
| 1936 | 2026-03-09T10:56:11.324Z | DEBG | test_update_status (store): query key
key = dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host
|
| 1937 | 2026-03-09T10:56:11.324Z | DEBG | test_update_status (dns): dns response
additional_records = [Record { name_labels: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal"), dns_class: IN, ttl: 0, rdata: AAAA(AAAA(::1)) }]
kind = dns
peer_addr = [::1]:43935
query = LowerQuery { name: LowerName(Name("_mgs._tcp.control-plane.oxide.internal.")), original: Query { name: Name("_mgs._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN } }
records = [Record { name_labels: Name("_mgs._tcp.control-plane.oxide.internal."), dns_class: IN, ttl: 0, rdata: SRV(SRV { priority: 0, weight: 0, port: 45204, target: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal") }) }]
req_id = f0b95c4b-c904-472f-87a2-deb457d4468f
|
| 1938 | 2026-03-09T10:56:11.325Z | DEBG | test_update_status (DnsResolver): lookup_all_socket_v6 srv
dns_name = _mgs._tcp.control-plane.oxide.internal
response = SrvLookup(Lookup { query: Query { name: Name("_mgs._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN }, records: [Record { name_labels: Name("_mgs._tcp.control-plane.oxide.internal."), dns_class: IN, ttl: 0, rdata: SRV(SRV { priority: 0, weight: 0, port: 45204, target: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal.") }) }, Record { name_labels: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."), dns_class: IN, ttl: 0, rdata: AAAA(AAAA(::1)) }], valid_until: Instant { tv_sec: 2140, tv_nsec: 29130160 } })
|
| 1939 | 2026-03-09T10:56:11.325Z | TRAC | test_update_status (DnsResolver): lookup_service_targets: looking up SRV target
|
| 1940 | 2026-03-09T10:56:11.325Z | TRAC | test_update_status (dns): buffer
buffer = Length: 108 (0x6c) bytes\n0000: 28 31 01 00 00 01 00 00 00 00 00 01 2d 64 65 6e (1..........-den\n0010: 64 72 69 74 65 2d 62 36 64 36 35 33 34 31 2d 31 drite-b6d65341-1\n0020: 36 37 63 2d 34 31 64 66 2d 39 62 35 63 2d 34 31 67c-41df-9b5c-41\n0030: 63 64 65 64 39 39 63 32 32 39 04 68 6f 73 74 0d cded99c229.host.\n0040: 63 6f 6e 74 72 6f 6c 2d 70 6c 61 6e 65 05 6f 78 control-plane.ox\n0050: 69 64 65 08 69 6e 74 65 72 6e 61 6c 00 00 1c 00 ide.internal....\n0060: 01 00 00 29 04 d0 00 00 00 00 00 00 ...)........
kind = dns
peer_addr = [::1]:40026
req_id = 1de4d0ff-c29a-4b63-affb-93cab655cfde
|
| 1941 | 2026-03-09T10:56:11.325Z | DEBG | test_update_status (dns): message_request
kind = dns
mr = MessageRequest {\n header: Header {\n id: 10289,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n queries: Queries {\n queries: [\n LowerQuery {\n name: LowerName(\n Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."),\n query_type: AAAA,\n query_class: IN,\n },\n },\n ],\n original: [\n 45,\n 100,\n 101,\n 110,\n 100,\n 114,\n 105,\n 116,\n 101,\n 45,\n 98,\n 54,\n 100,\n 54,\n 53,\n 51,\n 52,\n 49,\n 45,\n 49,\n 54,\n 55,\n 99,\n 45,\n 52,\n 49,\n 100,\n 102,\n 45,\n 57,\n 98,\n 53,\n 99,\n 45,\n 52,\n 49,\n 99,\n 100,\n 101,\n 100,\n 57,\n 57,\n 99,\n 50,\n 50,\n 57,\n 4,\n 104,\n 111,\n 115,\n 116,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 28,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n flags: EdnsFlags {\n dnssec_ok: false,\n z: 0,\n },\n max_payload: 1232,\n options: OPT {\n options: [],\n },\n },\n ),\n}
peer_addr = [::1]:40026
req_id = 1de4d0ff-c29a-4b63-affb-93cab655cfde
|
| 1942 | 2026-03-09T10:56:11.325Z | DEBG | test_update_status (store): query key
key = dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host
|
| 1943 | 2026-03-09T10:56:11.325Z | DEBG | test_update_status (dns): dns response
additional_records = []
kind = dns
peer_addr = [::1]:40026
query = LowerQuery { name: LowerName(Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal.")), original: Query { name: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."), query_type: AAAA, query_class: IN } }
records = [Record { name_labels: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."), dns_class: IN, ttl: 0, rdata: AAAA(AAAA(::1)) }]
req_id = 1de4d0ff-c29a-4b63-affb-93cab655cfde
|
| 1944 | 2026-03-09T10:56:11.325Z | TRAC | test_update_status (BackgroundTasks): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = external_endpoints
resource = DnsConfig
|
| 1945 | 2026-03-09T10:56:11.325Z | TRAC | test_update_status (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = external_endpoints
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 1946 | 2026-03-09T10:56:11.325Z | TRAC | test_update_status (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = external_endpoints
resource = Database
|
| 1947 | 2026-03-09T10:56:11.325Z | DEBG | test_update_status (BackgroundTasks): roles
background_task = external_endpoints
roles = RoleSet { roles: {} }
|
| 1948 | 2026-03-09T10:56:11.326Z | DEBG | test_update_status (BackgroundTasks): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = dns_config_external
dns_group = external
resource = DnsConfig
result = Ok(())
|
| 1949 | 2026-03-09T10:56:11.326Z | DEBG | test_update_status (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = external_endpoints
resource = Database
result = Ok(())
|
| 1950 | 2026-03-09T10:56:11.330Z | DEBG | test_update_status (BackgroundTasks): found DNS version
background_task = dns_config_external
dns_group = external
version = 2
|
| 1951 | 2026-03-09T10:56:11.330Z | DEBG | test_update_status (BackgroundTasks): reading DNS config
background_task = dns_config_external
dns_group = external
|
| 1952 | 2026-03-09T10:56:11.330Z | DEBG | test_update_status (BackgroundTasks): reading DNS zones
background_task = dns_config_external
dns_group = external
|
| 1953 | 2026-03-09T10:56:11.330Z | TRAC | test_update_status (BackgroundTasks): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = dns_config_external
dns_group = external
resource = DnsConfig
|
| 1954 | 2026-03-09T10:56:11.330Z | TRAC | test_update_status (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = dns_config_external
dns_group = external
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 1955 | 2026-03-09T10:56:11.330Z | TRAC | test_update_status (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = dns_config_external
dns_group = external
resource = Database
|
| 1956 | 2026-03-09T10:56:11.330Z | DEBG | test_update_status (BackgroundTasks): roles
background_task = dns_config_external
dns_group = external
roles = RoleSet { roles: {} }
|
| 1957 | 2026-03-09T10:56:11.330Z | DEBG | test_update_status (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = dns_config_external
dns_group = external
resource = Database
result = Ok(())
|
| 1958 | 2026-03-09T10:56:11.331Z | DEBG | test_update_status (BackgroundTasks): roles
background_task = external_endpoints
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 1959 | 2026-03-09T10:56:11.335Z | DEBG | test_update_status (BackgroundTasks): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = external_endpoints
resource = DnsConfig
result = Ok(())
|
| 1960 | 2026-03-09T10:56:11.335Z | TRAC | test_update_status (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = external_endpoints
resource = Database
|
| 1961 | 2026-03-09T10:56:11.335Z | DEBG | test_update_status (BackgroundTasks): roles
background_task = external_endpoints
roles = RoleSet { roles: {} }
|
| 1962 | 2026-03-09T10:56:11.336Z | DEBG | test_update_status (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = external_endpoints
resource = Database
result = Ok(())
|
| 1963 | 2026-03-09T10:56:11.336Z | DEBG | test_update_status (BackgroundTasks): roles
background_task = blueprint_loader
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 1964 | 2026-03-09T10:56:11.340Z | DEBG | test_update_status (BackgroundTasks): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = blueprint_loader
resource = Blueprint { parent: Fleet, key: 73345d3e-04a0-4ce6-9ba1-33102ce3f515, lookup_type: ById(73345d3e-04a0-4ce6-9ba1-33102ce3f515) }
result = Ok(())
|
| 1965 | 2026-03-09T10:56:11.340Z | TRAC | test_update_status (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = blueprint_loader
resource = Database
|
| 1966 | 2026-03-09T10:56:11.340Z | DEBG | test_update_status (BackgroundTasks): roles
background_task = blueprint_loader
roles = RoleSet { roles: {} }
|
| 1967 | 2026-03-09T10:56:11.340Z | DEBG | test_update_status (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = blueprint_loader
resource = Database
result = Ok(())
|
| 1968 | 2026-03-09T10:56:11.342Z | DEBG | test_update_status (BackgroundTasks): roles
background_task = dns_config_external
dns_group = external
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 1969 | 2026-03-09T10:56:11.346Z | DEBG | test_update_status (BackgroundTasks): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = dns_config_external
dns_group = external
resource = DnsConfig
result = Ok(())
|
| 1970 | 2026-03-09T10:56:11.347Z | TRAC | test_update_status (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = dns_config_external
dns_group = external
resource = Database
|
| 1971 | 2026-03-09T10:56:11.347Z | DEBG | test_update_status (BackgroundTasks): roles
background_task = dns_config_external
dns_group = external
roles = RoleSet { roles: {} }
|
| 1972 | 2026-03-09T10:56:11.347Z | DEBG | test_update_status (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = dns_config_external
dns_group = external
resource = Database
result = Ok(())
|
| 1973 | 2026-03-09T10:56:11.354Z | DEBG | test_update_status (BackgroundTasks): found zones
background_task = dns_config_external
count = 1
dns_group = external
|
| 1974 | 2026-03-09T10:56:11.354Z | DEBG | test_update_status (BackgroundTasks): listing DNS names for zone
background_task = dns_config_external
batch_size = 100
dns_group = external
dns_zone_id = 41e4f9a9-552f-464b-a693-878e0b4dc7fa
dns_zone_name = oxide-dev.test
found_so_far = 0
version = 2
|
| 1975 | 2026-03-09T10:56:11.354Z | TRAC | test_update_status (BackgroundTasks): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = dns_config_external
dns_group = external
resource = DnsConfig
|
| 1976 | 2026-03-09T10:56:11.354Z | TRAC | test_update_status (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = dns_config_external
dns_group = external
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 1977 | 2026-03-09T10:56:11.354Z | TRAC | test_update_status (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = dns_config_external
dns_group = external
resource = Database
|
| 1978 | 2026-03-09T10:56:11.354Z | DEBG | test_update_status (BackgroundTasks): roles
background_task = dns_config_external
dns_group = external
roles = RoleSet { roles: {} }
|
| 1979 | 2026-03-09T10:56:11.355Z | DEBG | test_update_status (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = dns_config_external
dns_group = external
resource = Database
result = Ok(())
|
| 1980 | 2026-03-09T10:56:11.365Z | DEBG | test_update_status (BackgroundTasks): roles
background_task = dns_config_external
dns_group = external
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 1981 | 2026-03-09T10:56:11.367Z | TRAC | test_update_status (DnsResolver): lookup_all_socket_v6 srv
dns_name = _clickhouse-admin-keeper._tcp.control-plane.oxide.internal
|
| 1982 | 2026-03-09T10:56:11.368Z | DEBG | test_update_status (BackgroundTasks): found DNS version
background_task = dns_config_internal
dns_group = internal
version = 1
|
| 1983 | 2026-03-09T10:56:11.368Z | DEBG | test_update_status (BackgroundTasks): reading DNS config
background_task = dns_config_internal
dns_group = internal
|
| 1984 | 2026-03-09T10:56:11.368Z | DEBG | test_update_status (BackgroundTasks): reading DNS zones
background_task = dns_config_internal
dns_group = internal
|
| 1985 | 2026-03-09T10:56:11.368Z | TRAC | test_update_status (BackgroundTasks): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = dns_config_internal
dns_group = internal
resource = DnsConfig
|
| 1986 | 2026-03-09T10:56:11.368Z | TRAC | test_update_status (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = dns_config_internal
dns_group = internal
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 1987 | 2026-03-09T10:56:11.368Z | TRAC | test_update_status (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = dns_config_internal
dns_group = internal
resource = Database
|
| 1988 | 2026-03-09T10:56:11.368Z | DEBG | test_update_status (BackgroundTasks): roles
background_task = dns_config_internal
dns_group = internal
roles = RoleSet { roles: {} }
|
| 1989 | 2026-03-09T10:56:11.368Z | DEBG | test_update_status (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = dns_config_internal
dns_group = internal
resource = Database
result = Ok(())
|
| 1990 | 2026-03-09T10:56:11.369Z | TRAC | test_update_status (dns): buffer
buffer = Length: 87 (0x57) bytes\n0000: b0 14 01 00 00 01 00 00 00 00 00 01 18 5f 63 6c ............._cl\n0010: 69 63 6b 68 6f 75 73 65 2d 61 64 6d 69 6e 2d 6b ickhouse-admin-k\n0020: 65 65 70 65 72 04 5f 74 63 70 0d 63 6f 6e 74 72 eeper._tcp.contr\n0030: 6f 6c 2d 70 6c 61 6e 65 05 6f 78 69 64 65 08 69 ol-plane.oxide.i\n0040: 6e 74 65 72 6e 61 6c 00 00 21 00 01 00 00 29 04 nternal..!....).\n0050: d0 00 00 00 00 00 00 .......
kind = dns
peer_addr = [::1]:12897
req_id = 9c364b86-8101-49e7-86c3-4df8b83b7f8e
|
| 1991 | 2026-03-09T10:56:11.369Z | DEBG | test_update_status (dns): message_request
kind = dns
mr = MessageRequest {\n header: Header {\n id: 45076,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n queries: Queries {\n queries: [\n LowerQuery {\n name: LowerName(\n Name("_clickhouse-admin-keeper._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_clickhouse-admin-keeper._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n ],\n original: [\n 24,\n 95,\n 99,\n 108,\n 105,\n 99,\n 107,\n 104,\n 111,\n 117,\n 115,\n 101,\n 45,\n 97,\n 100,\n 109,\n 105,\n 110,\n 45,\n 107,\n 101,\n 101,\n 112,\n 101,\n 114,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n flags: EdnsFlags {\n dnssec_ok: false,\n z: 0,\n },\n max_payload: 1232,\n options: OPT {\n options: [],\n },\n },\n ),\n}
peer_addr = [::1]:12897
req_id = 9c364b86-8101-49e7-86c3-4df8b83b7f8e
|
| 1992 | 2026-03-09T10:56:11.369Z | DEBG | test_update_status (store): query key
key = _clickhouse-admin-keeper._tcp
|
| 1993 | 2026-03-09T10:56:11.370Z | ERRO | test_update_status (dns): failed to handle incoming DNS message: MessageRequest {
header: Header {
id: 45076,
message_type: Query,
op_code: Query,
authoritative: false,
truncation: false,
recursion_desired: true,
recursion_available: false,
authentic_data: false,
checking_disabled: false,
response_code: NoError,
query_count: 1,
answer_count: 0,
name_server_count: 0,
additional_count: 1,
},
queries: Queries {
queries: [
LowerQuery {
name: LowerName(
Name("_clickhouse-admin-keeper._tcp.control-plane.oxide.internal."),
),
original: Query {
name: Name("_clickhouse-admin-keeper._tcp.control-plane.oxide.internal."),
query_type: SRV,
query_class: IN,
},
},
],
original: [
24,
95,
99,
108,
105,
99,
107,
104,
111,
117,
115,
101,
45,
97,
100,
109,
105,
110,
45,
107,
101,
101,
112,
101,
114,
4,
95,
116,
99,
112,
13,
99,
111,
110,
116,
114,
111,
108,
45,
112,
108,
97,
110,
101,
5,
111,
120,
105,
100,
101,
8,
105,
110,
116,
101,
114,
110,
97,
108,
0,
0,
33,
0,
1,
],
},
answers: [],
name_servers: [],
additionals: [],
sig0: [],
edns: Some(
Edns {
rcode_high: 0,
version: 0,
flags: EdnsFlags {
dnssec_ok: false,
z: 0,
},
max_payload: 1232,
options: OPT {
options: [],
},
},
),
} NXDOMAIN: _clickhouse-admin-keeper._tcp.control-plane.oxide.internal
kind = dns
peer_addr = [::1]:12897
req_id = 9c364b86-8101-49e7-86c3-4df8b83b7f8e
|
| 1994 | 2026-03-09T10:56:11.370Z | DEBG | test_update_status (BackgroundTasks): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = dns_config_external
dns_group = external
resource = DnsConfig
result = Ok(())
|
| 1995 | 2026-03-09T10:56:11.370Z | TRAC | test_update_status (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = dns_config_external
dns_group = external
resource = Database
|
| 1996 | 2026-03-09T10:56:11.370Z | DEBG | test_update_status (BackgroundTasks): roles
background_task = dns_config_external
dns_group = external
roles = RoleSet { roles: {} }
|
| 1997 | 2026-03-09T10:56:11.370Z | TRAC | test_update_status (DnsResolver): lookup_all_socket_v6 srv
dns_name = _cockroach._tcp.control-plane.oxide.internal
|
| 1998 | 2026-03-09T10:56:11.370Z | TRAC | test_update_status (dns): buffer
buffer = Length: 73 (0x49) bytes\n0000: 31 f8 01 00 00 01 00 00 00 00 00 01 0a 5f 63 6f 1............_co\n0010: 63 6b 72 6f 61 63 68 04 5f 74 63 70 0d 63 6f 6e ckroach._tcp.con\n0020: 74 72 6f 6c 2d 70 6c 61 6e 65 05 6f 78 69 64 65 trol-plane.oxide\n0030: 08 69 6e 74 65 72 6e 61 6c 00 00 21 00 01 00 00 .internal..!....\n0040: 29 04 d0 00 00 00 00 00 00 )........
kind = dns
peer_addr = [::1]:26692
req_id = 6ee3c987-aceb-4363-bb66-7fb92345c247
|
| 1999 | 2026-03-09T10:56:11.370Z | DEBG | test_update_status (dns): message_request
kind = dns
mr = MessageRequest {\n header: Header {\n id: 12792,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n queries: Queries {\n queries: [\n LowerQuery {\n name: LowerName(\n Name("_cockroach._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_cockroach._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n ],\n original: [\n 10,\n 95,\n 99,\n 111,\n 99,\n 107,\n 114,\n 111,\n 97,\n 99,\n 104,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n flags: EdnsFlags {\n dnssec_ok: false,\n z: 0,\n },\n max_payload: 1232,\n options: OPT {\n options: [],\n },\n },\n ),\n}
peer_addr = [::1]:26692
req_id = 6ee3c987-aceb-4363-bb66-7fb92345c247
|
| 2000 | 2026-03-09T10:56:11.370Z | DEBG | test_update_status (store): query key
key = _cockroach._tcp
|
| 2001 | 2026-03-09T10:56:11.370Z | DEBG | test_update_status (store): query key
key = c102c7f4-c1e4-488a-b8ac-14c83613246a.host
|
| 2002 | 2026-03-09T10:56:11.370Z | DEBG | test_update_status (dns): dns response
additional_records = [Record { name_labels: Name("c102c7f4-c1e4-488a-b8ac-14c83613246a.host.control-plane.oxide.internal"), dns_class: IN, ttl: 0, rdata: AAAA(AAAA(::1)) }]
kind = dns
peer_addr = [::1]:26692
query = LowerQuery { name: LowerName(Name("_cockroach._tcp.control-plane.oxide.internal.")), original: Query { name: Name("_cockroach._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN } }
records = [Record { name_labels: Name("_cockroach._tcp.control-plane.oxide.internal."), dns_class: IN, ttl: 0, rdata: SRV(SRV { priority: 0, weight: 0, port: 38023, target: Name("c102c7f4-c1e4-488a-b8ac-14c83613246a.host.control-plane.oxide.internal") }) }]
req_id = 6ee3c987-aceb-4363-bb66-7fb92345c247
|
| 2003 | 2026-03-09T10:56:11.370Z | DEBG | test_update_status (DnsResolver): lookup_all_socket_v6 srv
dns_name = _cockroach._tcp.control-plane.oxide.internal
response = SrvLookup(Lookup { query: Query { name: Name("_cockroach._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN }, records: [Record { name_labels: Name("_cockroach._tcp.control-plane.oxide.internal."), dns_class: IN, ttl: 0, rdata: SRV(SRV { priority: 0, weight: 0, port: 38023, target: Name("c102c7f4-c1e4-488a-b8ac-14c83613246a.host.control-plane.oxide.internal.") }) }, Record { name_labels: Name("c102c7f4-c1e4-488a-b8ac-14c83613246a.host.control-plane.oxide.internal."), dns_class: IN, ttl: 0, rdata: AAAA(AAAA(::1)) }], valid_until: Instant { tv_sec: 2140, tv_nsec: 74913426 } })
|
| 2004 | 2026-03-09T10:56:11.371Z | TRAC | test_update_status (DnsResolver): lookup_service_targets: looking up SRV target
|
| 2005 | 2026-03-09T10:56:11.371Z | DEBG | test_update_status (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = dns_config_external
dns_group = external
resource = Database
result = Ok(())
|
| 2006 | 2026-03-09T10:56:11.371Z | TRAC | test_update_status (dns): buffer
buffer = Length: 99 (0x63) bytes\n0000: 23 10 01 00 00 01 00 00 00 00 00 01 24 63 31 30 #...........$c10\n0010: 32 63 37 66 34 2d 63 31 65 34 2d 34 38 38 61 2d 2c7f4-c1e4-488a-\n0020: 62 38 61 63 2d 31 34 63 38 33 36 31 33 32 34 36 b8ac-14c83613246\n0030: 61 04 68 6f 73 74 0d 63 6f 6e 74 72 6f 6c 2d 70 a.host.control-p\n0040: 6c 61 6e 65 05 6f 78 69 64 65 08 69 6e 74 65 72 lane.oxide.inter\n0050: 6e 61 6c 00 00 1c 00 01 00 00 29 04 d0 00 00 00 nal.......).....\n0060: 00 00 00 ...
kind = dns
peer_addr = [::1]:34118
req_id = 2c05fb2d-2178-4641-875c-74765c25f658
|
| 2007 | 2026-03-09T10:56:11.371Z | DEBG | test_update_status (dns): message_request
kind = dns
mr = MessageRequest {\n header: Header {\n id: 8976,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n queries: Queries {\n queries: [\n LowerQuery {\n name: LowerName(\n Name("c102c7f4-c1e4-488a-b8ac-14c83613246a.host.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("c102c7f4-c1e4-488a-b8ac-14c83613246a.host.control-plane.oxide.internal."),\n query_type: AAAA,\n query_class: IN,\n },\n },\n ],\n original: [\n 36,\n 99,\n 49,\n 48,\n 50,\n 99,\n 55,\n 102,\n 52,\n 45,\n 99,\n 49,\n 101,\n 52,\n 45,\n 52,\n 56,\n 56,\n 97,\n 45,\n 98,\n 56,\n 97,\n 99,\n 45,\n 49,\n 52,\n 99,\n 56,\n 51,\n 54,\n 49,\n 51,\n 50,\n 52,\n 54,\n 97,\n 4,\n 104,\n 111,\n 115,\n 116,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 28,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n flags: EdnsFlags {\n dnssec_ok: false,\n z: 0,\n },\n max_payload: 1232,\n options: OPT {\n options: [],\n },\n },\n ),\n}
peer_addr = [::1]:34118
req_id = 2c05fb2d-2178-4641-875c-74765c25f658
|
| 2008 | 2026-03-09T10:56:11.372Z | DEBG | test_update_status (store): query key
key = c102c7f4-c1e4-488a-b8ac-14c83613246a.host
|
| 2009 | 2026-03-09T10:56:11.372Z | DEBG | test_update_status (dns): dns response
additional_records = []
kind = dns
peer_addr = [::1]:34118
query = LowerQuery { name: LowerName(Name("c102c7f4-c1e4-488a-b8ac-14c83613246a.host.control-plane.oxide.internal.")), original: Query { name: Name("c102c7f4-c1e4-488a-b8ac-14c83613246a.host.control-plane.oxide.internal."), query_type: AAAA, query_class: IN } }
records = [Record { name_labels: Name("c102c7f4-c1e4-488a-b8ac-14c83613246a.host.control-plane.oxide.internal."), dns_class: IN, ttl: 0, rdata: AAAA(AAAA(::1)) }]
req_id = 2c05fb2d-2178-4641-875c-74765c25f658
|
| 2010 | 2026-03-09T10:56:11.374Z | DEBG | test_update_status (BackgroundTasks): roles
background_task = dns_config_internal
dns_group = internal
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 2011 | 2026-03-09T10:56:11.383Z | DEBG | test_update_status (BackgroundTasks): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = dns_config_internal
dns_group = internal
resource = DnsConfig
result = Ok(())
|
| 2012 | 2026-03-09T10:56:11.383Z | TRAC | test_update_status (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = dns_config_internal
dns_group = internal
resource = Database
|
| 2013 | 2026-03-09T10:56:11.383Z | DEBG | test_update_status (BackgroundTasks): roles
background_task = dns_config_internal
dns_group = internal
roles = RoleSet { roles: {} }
|
| 2014 | 2026-03-09T10:56:11.383Z | DEBG | test_update_status (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = dns_config_internal
dns_group = internal
resource = Database
result = Ok(())
|
| 2015 | 2026-03-09T10:56:11.385Z | DEBG | test_update_status (BackgroundTasks): found all DNS names for zone
background_task = dns_config_external
dns_group = external
dns_zone_id = 41e4f9a9-552f-464b-a693-878e0b4dc7fa
dns_zone_name = oxide-dev.test
found_so_far = 3
version = 2
|
| 2016 | 2026-03-09T10:56:11.385Z | DEBG | test_update_status (BackgroundTasks): read DNS config
background_task = dns_config_external
dns_group = external
nzones = 1
version = 2
|
| 2017 | 2026-03-09T10:56:11.386Z | INFO | test_update_status (BackgroundTasks): found latest generation (first find)
background_task = dns_config_external
dns_group = external
generation = 2
|
| 2018 | 2026-03-09T10:56:11.386Z | DEBG | test_update_status (BackgroundTasks): activation complete
background_task = dns_config_external
dns_group = external
elapsed = 80.768518ms
iteration = 2
status = {"generation":2}
|
| 2019 | 2026-03-09T10:56:11.386Z | DEBG | test_update_status (BackgroundTasks): activating
background_task = dns_propagation_external
dns_group = external
iteration = 3
reason = Dependency
|
| 2020 | 2026-03-09T10:56:11.436Z | DEBG | test_update_status (CockroachClusterAdminClient): Updated CockroachDB cluster backends
added = 1
addresses = [[::1]:32222]
removed = 0
total = 1
|
| 2021 | 2026-03-09T10:56:11.437Z | DEBG | test_update_status (BackgroundTasks): begin collection
background_task = inventory_collection
|
| 2022 | 2026-03-09T10:56:11.437Z | DEBG | test_update_status (BackgroundTasks): begin collection from MGS
background_task = inventory_collection
mgs_url = http://[::1]:45204
|
| 2023 | 2026-03-09T10:56:11.437Z | DEBG | test_update_status (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:45204
method = GET
uri = http://[::1]:45204/ignition
|
| 2024 | 2026-03-09T10:56:11.438Z | TRAC | test_update_status (BackgroundTasks): authorize begin
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = external_endpoints
resource = Fleet
|
| 2025 | 2026-03-09T10:56:11.438Z | TRAC | test_update_status (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = external_endpoints
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 2026 | 2026-03-09T10:56:11.438Z | TRAC | test_update_status (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = external_endpoints
resource = Database
|
| 2027 | 2026-03-09T10:56:11.438Z | DEBG | test_update_status (BackgroundTasks): roles
background_task = external_endpoints
roles = RoleSet { roles: {} }
|
| 2028 | 2026-03-09T10:56:11.439Z | DEBG | test_update_status (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = external_endpoints
resource = Database
result = Ok(())
|
| 2029 | 2026-03-09T10:56:11.444Z | DEBG | test_update_status (BackgroundTasks): roles
background_task = external_endpoints
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 2030 | 2026-03-09T10:56:11.449Z | DEBG | test_update_status (BackgroundTasks): authorize result
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = external_endpoints
resource = Fleet
result = Ok(())
|
| 2031 | 2026-03-09T10:56:11.450Z | TRAC | test_update_status (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = external_endpoints
resource = Database
|
| 2032 | 2026-03-09T10:56:11.450Z | DEBG | test_update_status (BackgroundTasks): roles
background_task = external_endpoints
roles = RoleSet { roles: {} }
|
| 2033 | 2026-03-09T10:56:11.450Z | DEBG | test_update_status (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = external_endpoints
resource = Database
result = Ok(())
|
| 2034 | 2026-03-09T10:56:11.452Z | DEBG | test_update_status (BackgroundTasks): found zones
background_task = dns_config_internal
count = 1
dns_group = internal
|
| 2035 | 2026-03-09T10:56:11.452Z | DEBG | test_update_status (BackgroundTasks): listing DNS names for zone
background_task = dns_config_internal
batch_size = 100
dns_group = internal
dns_zone_id = c994845b-e925-4ce5-9183-f83adf5cb478
dns_zone_name = control-plane.oxide.internal
found_so_far = 0
version = 1
|
| 2036 | 2026-03-09T10:56:11.452Z | TRAC | test_update_status (BackgroundTasks): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = dns_config_internal
dns_group = internal
resource = DnsConfig
|
| 2037 | 2026-03-09T10:56:11.452Z | TRAC | test_update_status (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = dns_config_internal
dns_group = internal
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 2038 | 2026-03-09T10:56:11.452Z | TRAC | test_update_status (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = dns_config_internal
dns_group = internal
resource = Database
|
| 2039 | 2026-03-09T10:56:11.452Z | DEBG | test_update_status (BackgroundTasks): roles
background_task = dns_config_internal
dns_group = internal
roles = RoleSet { roles: {} }
|
| 2040 | 2026-03-09T10:56:11.453Z | DEBG | test_update_status (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = dns_config_internal
dns_group = internal
resource = Database
result = Ok(())
|
| 2041 | 2026-03-09T10:56:11.457Z | DEBG | test_update_status (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:45204
result = Ok(Response { url: "http://[::1]:45204/ignition", status: 200, headers: {"content-type": "application/json", "x-request-id": "24af7953-228d-4a64-8ed9-72d69467374f", "content-length": "835", "date": "Mon, 09 Mar 2026 10:56:11 GMT"} })
|
| 2042 | 2026-03-09T10:56:11.459Z | DEBG | test_update_status (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:45204
method = GET
uri = http://[::1]:45204/sp/switch/0
|
| 2043 | 2026-03-09T10:56:11.459Z | DEBG | test_update_status (BackgroundTasks): roles
background_task = dns_config_internal
dns_group = internal
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 2044 | 2026-03-09T10:56:11.464Z | DEBG | test_update_status (BackgroundTasks): client request
background_task = dns_propagation_external
body = Some(Body)
dns_group = external
dns_server_url = http://[::1]:65043
generation = 2
method = PUT
servers = DnsServersList { addresses: [[::1]:65043] }
uri = http://[::1]:65043/config
|
| 2045 | 2026-03-09T10:56:11.464Z | DEBG | test_update_status (BackgroundTasks): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = dns_config_internal
dns_group = internal
resource = DnsConfig
result = Ok(())
|
| 2046 | 2026-03-09T10:56:11.464Z | TRAC | test_update_status (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = dns_config_internal
dns_group = internal
resource = Database
|
| 2047 | 2026-03-09T10:56:11.464Z | DEBG | test_update_status (BackgroundTasks): roles
background_task = dns_config_internal
dns_group = internal
roles = RoleSet { roles: {} }
|
| 2048 | 2026-03-09T10:56:11.465Z | DEBG | test_update_status (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = dns_config_internal
dns_group = internal
resource = Database
result = Ok(())
|
| 2049 | 2026-03-09T10:56:11.465Z | INFO | test_update_status (http): accepted connection
kind = dns
local_addr = [::1]:65043
remote_addr = [::1]:61598
|
| 2050 | 2026-03-09T10:56:11.467Z | TRAC | test_update_status (http): incoming request
kind = dns
local_addr = [::1]:65043
method = PUT
remote_addr = [::1]:61598
req_id = 4e85033e-20e5-4c2c-af45-f10d2af280b7
uri = /config
|
| 2051 | 2026-03-09T10:56:11.467Z | DEBG | test_update_status (http): determined request API version
kind = dns
local_addr = [::1]:65043
method = PUT
remote_addr = [::1]:61598
req_id = 4e85033e-20e5-4c2c-af45-f10d2af280b7
uri = /config
version = 2.0.0
|
| 2052 | 2026-03-09T10:56:11.467Z | INFO | test_update_status (store): attempting generation update
new_generation = 2
req_id = 4e85033e-20e5-4c2c-af45-f10d2af280b7
|
| 2053 | 2026-03-09T10:56:11.467Z | INFO | test_update_status (store): pruning trees for generations newer than 0
|
| 2054 | 2026-03-09T10:56:11.467Z | DEBG | test_update_status (store): creating tree
tree_name = generation_2_zone_oxide-dev.test
|
| 2055 | 2026-03-09T10:56:11.467Z | DEBG | test_update_status (store): updating current config
|
| 2056 | 2026-03-09T10:56:11.468Z | DEBG | test_update_status (store): flushing default tree
|
| 2057 | 2026-03-09T10:56:11.468Z | INFO | test_update_status (store): pruning trees for generations older than 2
keep = 3
|
| 2058 | 2026-03-09T10:56:11.468Z | INFO | test_update_status (store): updated generation
new_generation = 2
req_id = 4e85033e-20e5-4c2c-af45-f10d2af280b7
|
| 2059 | 2026-03-09T10:56:11.468Z | INFO | test_update_status (http): request completed
kind = dns
latency_us = 911
local_addr = [::1]:65043
method = PUT
remote_addr = [::1]:61598
req_id = 4e85033e-20e5-4c2c-af45-f10d2af280b7
response_code = 204
uri = /config
|
| 2060 | 2026-03-09T10:56:11.470Z | DEBG | test_update_status (BackgroundTasks): client response
background_task = dns_propagation_external
dns_group = external
dns_server_url = http://[::1]:65043
generation = 2
result = Ok(Response { url: "http://[::1]:65043/config", status: 204, headers: {"x-request-id": "4e85033e-20e5-4c2c-af45-f10d2af280b7", "date": "Mon, 09 Mar 2026 10:56:11 GMT"} })
servers = DnsServersList { addresses: [[::1]:65043] }
|
| 2061 | 2026-03-09T10:56:11.470Z | INFO | test_update_status (BackgroundTasks): DNS server now at generation 2
background_task = dns_propagation_external
dns_group = external
dns_server_url = http://[::1]:65043
generation = 2
servers = DnsServersList { addresses: [[::1]:65043] }
|
| 2062 | 2026-03-09T10:56:11.470Z | INFO | test_update_status (BackgroundTasks): DNS propagation: done
background_task = dns_propagation_external
dns_group = external
generation = 2
servers = DnsServersList { addresses: [[::1]:65043] }
|
| 2063 | 2026-03-09T10:56:11.470Z | DEBG | test_update_status (BackgroundTasks): activation complete
background_task = dns_propagation_external
dns_group = external
elapsed = 84.28259ms
iteration = 3
status = {"generation":2,"server_results":{"[::1]:65043":{"Ok":null}}}
|
| 2064 | 2026-03-09T10:56:11.474Z | DEBG | test_update_status (BackgroundTasks): found all DNS names for zone
background_task = dns_config_internal
dns_group = internal
dns_zone_id = c994845b-e925-4ce5-9183-f83adf5cb478
dns_zone_name = control-plane.oxide.internal
found_so_far = 27
version = 1
|
| 2065 | 2026-03-09T10:56:11.474Z | DEBG | test_update_status (BackgroundTasks): read DNS config
background_task = dns_config_internal
dns_group = internal
nzones = 1
version = 1
|
| 2066 | 2026-03-09T10:56:11.474Z | INFO | test_update_status (BackgroundTasks): found latest generation (first find)
background_task = dns_config_internal
dns_group = internal
generation = 1
|
| 2067 | 2026-03-09T10:56:11.474Z | DEBG | test_update_status (BackgroundTasks): activation complete
background_task = dns_config_internal
dns_group = internal
elapsed = 169.764612ms
iteration = 2
status = {"generation":1}
|
| 2068 | 2026-03-09T10:56:11.474Z | DEBG | test_update_status (BackgroundTasks): activating
background_task = dns_propagation_internal
dns_group = internal
iteration = 3
reason = Dependency
|
| 2069 | 2026-03-09T10:56:11.479Z | INFO | test_update_status (BackgroundTasks): found new target blueprint (first find)
background_task = blueprint_loader
target_id = 73345d3e-04a0-4ce6-9ba1-33102ce3f515
time_created = 2026-03-09 10:56:10.081537 UTC
|
| 2070 | 2026-03-09T10:56:11.479Z | DEBG | test_update_status (BackgroundTasks): activation complete
background_task = blueprint_loader
elapsed = 171.675144ms
iteration = 2
status = {"enabled":false,"status":"first target blueprint","target_id":"73345d3e-04a0-4ce6-9ba1-33102ce3f515","time_created":"2026-03-09T10:56:10.081537Z","time_found":"2026-03-09T10:56:11.479438936Z"}
|
| 2071 | 2026-03-09T10:56:11.479Z | DEBG | test_update_status (BackgroundTasks): activating
background_task = blueprint_planner
iteration = 3
reason = Dependency
|
| 2072 | 2026-03-09T10:56:11.479Z | DEBG | test_update_status (BackgroundTasks): blueprint planning disabled, doing nothing
background_task = blueprint_planner
|
| 2073 | 2026-03-09T10:56:11.479Z | DEBG | test_update_status (BackgroundTasks): activation complete
background_task = blueprint_planner
elapsed = 20.336\u{b5}s
iteration = 3
status = "Disabled"
|
| 2074 | 2026-03-09T10:56:11.479Z | DEBG | test_update_status (BackgroundTasks): activating
background_task = blueprint_executor
iteration = 2
reason = Dependency
|
| 2075 | 2026-03-09T10:56:11.479Z | DEBG | test_update_status (BackgroundTasks): blueprint execution: quiesce check
background_task = blueprint_executor
quiescing = false
|
| 2076 | 2026-03-09T10:56:11.479Z | INFO | test_update_status (NexusQuiesceHandle): initial state
state = Running
|
| 2077 | 2026-03-09T10:56:11.479Z | INFO | test_update_status (SagaQuiesceHandle): initial quiesce state
initial_state = Allowed
|
| 2078 | 2026-03-09T10:56:11.479Z | WARN | test_update_status (BackgroundTasks): Blueprint execution: skipped
background_task = blueprint_executor
reason = blueprint disabled
target_id = 73345d3e-04a0-4ce6-9ba1-33102ce3f515
|
| 2079 | 2026-03-09T10:56:11.479Z | DEBG | test_update_status (BackgroundTasks): activation complete
background_task = blueprint_executor
elapsed = 69.84\u{b5}s
iteration = 2
status = {"enabled":false,"target_id":"73345d3e-04a0-4ce6-9ba1-33102ce3f515"}
|
| 2080 | 2026-03-09T10:56:11.479Z | DEBG | test_update_status (BackgroundTasks): activating
background_task = crdb_node_id_collector
iteration = 2
reason = Dependency
|
| 2081 | 2026-03-09T10:56:11.479Z | TRAC | test_update_status (ServiceBalancer): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-00000000bac3 (built_in_user), .. })
resource = Database
|
| 2082 | 2026-03-09T10:56:11.479Z | DEBG | test_update_status (ServiceBalancer): roles
roles = RoleSet { roles: {} }
|
| 2083 | 2026-03-09T10:56:11.479Z | TRAC | test_update_status (BackgroundTasks): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = crdb_node_id_collector
resource = Fleet
|
| 2084 | 2026-03-09T10:56:11.479Z | TRAC | test_update_status (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = crdb_node_id_collector
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 2085 | 2026-03-09T10:56:11.480Z | TRAC | test_update_status (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = crdb_node_id_collector
resource = Database
|
| 2086 | 2026-03-09T10:56:11.480Z | DEBG | test_update_status (BackgroundTasks): roles
background_task = crdb_node_id_collector
roles = RoleSet { roles: {} }
|
| 2087 | 2026-03-09T10:56:11.480Z | DEBG | test_update_status (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = crdb_node_id_collector
resource = Database
result = Ok(())
|
| 2088 | 2026-03-09T10:56:11.480Z | DEBG | test_update_status (ServiceBalancer): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-00000000bac3 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 2089 | 2026-03-09T10:56:11.539Z | INFO | test_update_status (BackgroundTasks): found Silo/DNS/TLS config (initial)
background_task = external_endpoints
config = ExternalEndpoints { by_dns_name: {"default-silo.sys.oxide-dev.test": ExternalEndpoint { silo_id: 001de000-5110-4000-8000-000000000000, db_silo: Silo { identity: SiloIdentity { id: 001de000-5110-4000-8000-000000000000, name: Name(Name("default-silo")), description: "default silo", time_created: 2026-03-09T10:56:07.012513Z, time_modified: 2026-03-09T10:56:07.012513Z, time_deleted: None }, discoverable: false, authentication_mode: Local, user_provision_type: ApiOnly, mapped_fleet_roles: Object {}, rcgen: Generation(Generation(1)), admin_group_name: None }, tls_certs: [] }, "test-suite-silo.sys.oxide-dev.test": ExternalEndpoint { silo_id: 0f94312c-7b7d-422a-a21f-bf3a560e3b3d, db_silo: Silo { identity: SiloIdentity { id: 0f94312c-7b7d-422a-a21f-bf3a560e3b3d, name: Name(Name("test-suite-silo")), description: "built-in recovery Silo", time_created: 2026-03-09T10:56:11.057741Z, time_modified: 2026-03-09T10:56:11.057741Z, time_deleted: None }, discoverable: false, authentication_mode: Local, user_provision_type: ApiOnly, mapped_fleet_roles: Object {"admin": Array [String("admin")]}, rcgen: Generation(Generation(1)), admin_group_name: None }, tls_certs: [] }}, warnings: [NoSiloCerts { silo_id: 001de000-5110-4000-8000-000000000000, dns_name: "default-silo.sys.oxide-dev.test" }, NoSiloCerts { silo_id: 0f94312c-7b7d-422a-a21f-bf3a560e3b3d, dns_name: "test-suite-silo.sys.oxide-dev.test" }], default_endpoint: Some(ExternalEndpoint { silo_id: 0f94312c-7b7d-422a-a21f-bf3a560e3b3d, db_silo: Silo { identity: SiloIdentity { id: 0f94312c-7b7d-422a-a21f-bf3a560e3b3d, name: Name(Name("test-suite-silo")), description: "built-in recovery Silo", time_created: 2026-03-09T10:56:11.057741Z, time_modified: 2026-03-09T10:56:11.057741Z, time_deleted: None }, discoverable: false, authentication_mode: Local, user_provision_type: ApiOnly, mapped_fleet_roles: Object {"admin": Array [String("admin")]}, rcgen: Generation(Generation(1)), admin_group_name: None }, tls_certs: [] }) }
|
| 2090 | 2026-03-09T10:56:11.539Z | DEBG | test_update_status (BackgroundTasks): activation complete
background_task = external_endpoints
elapsed = 233.107ms
iteration = 2
status = {"by_dns_name":{"default-silo.sys.oxide-dev.test":{"silo_id":"001de000-5110-4000-8000-000000000000","tls_certs":[]},"test-suite-silo.sys.oxide-dev.test":{"silo_id":"0f94312c-7b7d-422a-a21f-bf3a560e3b3d","tls_certs":[]}},"default_endpoint":{"silo_id":"0f94312c-7b7d-422a-a21f-bf3a560e3b3d","tls_certs":[]},"warnings":["silo 001de000-5110-4000-8000-000000000000 with DNS name \\"default-silo.sys.oxide-dev.test\\" has no usable certificates","silo 0f94312c-7b7d-422a-a21f-bf3a560e3b3d with DNS name \\"test-suite-silo.sys.oxide-dev.test\\" has no usable certificates"]}
|
| 2091 | 2026-03-09T10:56:11.544Z | DEBG | test_update_status (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:45204
result = Ok(Response { url: "http://[::1]:45204/sp/switch/0", status: 200, headers: {"content-type": "application/json", "x-request-id": "73fa35f7-c7ef-484c-8da8-5e9e632ee6ff", "content-length": "734", "date": "Mon, 09 Mar 2026 10:56:11 GMT"} })
|
| 2092 | 2026-03-09T10:56:11.545Z | DEBG | test_update_status (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:45204
method = GET
uri = http://[::1]:45204/sp/switch/0/component/sp/caboose?firmware_slot=0
|
| 2093 | 2026-03-09T10:56:11.546Z | DEBG | test_update_status (BackgroundTasks): roles
background_task = crdb_node_id_collector
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 2094 | 2026-03-09T10:56:11.547Z | TRAC | test_update_status (ServiceBalancer): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-00000000bac3 (built_in_user), .. })
resource = Rack { parent: Fleet, key: c19a698f-c6f9-4a17-ae30-20d711b8f7dc, lookup_type: ById(c19a698f-c6f9-4a17-ae30-20d711b8f7dc) }
|
| 2095 | 2026-03-09T10:56:11.547Z | TRAC | test_update_status (ServiceBalancer): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-00000000bac3 (built_in_user), .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 2096 | 2026-03-09T10:56:11.547Z | TRAC | test_update_status (ServiceBalancer): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-00000000bac3 (built_in_user), .. })
resource = Database
|
| 2097 | 2026-03-09T10:56:11.547Z | DEBG | test_update_status (ServiceBalancer): roles
roles = RoleSet { roles: {} }
|
| 2098 | 2026-03-09T10:56:11.547Z | DEBG | test_update_status (ServiceBalancer): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-00000000bac3 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 2099 | 2026-03-09T10:56:11.550Z | DEBG | test_update_status (BackgroundTasks): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = crdb_node_id_collector
resource = Fleet
result = Ok(())
|
| 2100 | 2026-03-09T10:56:11.550Z | TRAC | test_update_status (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = crdb_node_id_collector
resource = Database
|
| 2101 | 2026-03-09T10:56:11.550Z | DEBG | test_update_status (BackgroundTasks): roles
background_task = crdb_node_id_collector
roles = RoleSet { roles: {} }
|
| 2102 | 2026-03-09T10:56:11.551Z | DEBG | test_update_status (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = crdb_node_id_collector
resource = Database
result = Ok(())
|
| 2103 | 2026-03-09T10:56:11.557Z | DEBG | test_update_status (BackgroundTasks): client request
background_task = dns_propagation_internal
body = Some(Body)
dns_group = internal
dns_server_url = http://[::1]:37611
generation = 1
method = PUT
servers = DnsServersList { addresses: [[::1]:37611] }
uri = http://[::1]:37611/config
|
| 2104 | 2026-03-09T10:56:11.558Z | INFO | test_update_status (http): accepted connection
kind = dns
local_addr = [::1]:37611
remote_addr = [::1]:54099
|
| 2105 | 2026-03-09T10:56:11.560Z | TRAC | test_update_status (http): incoming request
kind = dns
local_addr = [::1]:37611
method = PUT
remote_addr = [::1]:54099
req_id = 2bb86d9b-f9b7-4349-8466-bb3d7b2207b7
uri = /config
|
| 2106 | 2026-03-09T10:56:11.561Z | DEBG | test_update_status (http): determined request API version
kind = dns
local_addr = [::1]:37611
method = PUT
remote_addr = [::1]:54099
req_id = 2bb86d9b-f9b7-4349-8466-bb3d7b2207b7
uri = /config
version = 2.0.0
|
| 2107 | 2026-03-09T10:56:11.561Z | INFO | test_update_status (store): attempting generation update
new_generation = 1
req_id = 2bb86d9b-f9b7-4349-8466-bb3d7b2207b7
|
| 2108 | 2026-03-09T10:56:11.561Z | INFO | test_update_status (store): updated generation
new_generation = 1
req_id = 2bb86d9b-f9b7-4349-8466-bb3d7b2207b7
|
| 2109 | 2026-03-09T10:56:11.561Z | INFO | test_update_status (http): request completed
kind = dns
latency_us = 718
local_addr = [::1]:37611
method = PUT
remote_addr = [::1]:54099
req_id = 2bb86d9b-f9b7-4349-8466-bb3d7b2207b7
response_code = 204
uri = /config
|
| 2110 | 2026-03-09T10:56:11.565Z | DEBG | test_update_status (BackgroundTasks): client response
background_task = dns_propagation_internal
dns_group = internal
dns_server_url = http://[::1]:37611
generation = 1
result = Ok(Response { url: "http://[::1]:37611/config", status: 204, headers: {"x-request-id": "2bb86d9b-f9b7-4349-8466-bb3d7b2207b7", "date": "Mon, 09 Mar 2026 10:56:11 GMT"} })
servers = DnsServersList { addresses: [[::1]:37611] }
|
| 2111 | 2026-03-09T10:56:11.565Z | INFO | test_update_status (BackgroundTasks): DNS server now at generation 1
background_task = dns_propagation_internal
dns_group = internal
dns_server_url = http://[::1]:37611
generation = 1
servers = DnsServersList { addresses: [[::1]:37611] }
|
| 2112 | 2026-03-09T10:56:11.565Z | INFO | test_update_status (BackgroundTasks): DNS propagation: done
background_task = dns_propagation_internal
dns_group = internal
generation = 1
servers = DnsServersList { addresses: [[::1]:37611] }
|
| 2113 | 2026-03-09T10:56:11.565Z | DEBG | test_update_status (BackgroundTasks): activation complete
background_task = dns_propagation_internal
dns_group = internal
elapsed = 90.678022ms
iteration = 3
status = {"generation":1,"server_results":{"[::1]:37611":{"Ok":null}}}
|
| 2114 | 2026-03-09T10:56:11.566Z | DEBG | test_update_status (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:45204
result = Ok(Response { url: "http://[::1]:45204/sp/switch/0/component/sp/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "91590432-0d8f-42a8-b466-f375b6947e15", "content-length": "111", "date": "Mon, 09 Mar 2026 10:56:11 GMT"} })
|
| 2115 | 2026-03-09T10:56:11.566Z | DEBG | test_update_status (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:45204
method = GET
uri = http://[::1]:45204/sp/switch/0/component/sp/caboose?firmware_slot=1
|
| 2116 | 2026-03-09T10:56:11.568Z | DEBG | test_update_status (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:45204
result = Ok(Response { url: "http://[::1]:45204/sp/switch/0/component/sp/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "7e1b4c3e-f8ac-4ff4-bc3d-efff9f3c52b9", "content-length": "111", "date": "Mon, 09 Mar 2026 10:56:11 GMT"} })
|
| 2117 | 2026-03-09T10:56:11.569Z | DEBG | test_update_status (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:45204
method = GET
uri = http://[::1]:45204/sp/switch/0/component/rot/caboose?firmware_slot=0
|
| 2118 | 2026-03-09T10:56:11.570Z | DEBG | test_update_status (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:45204
result = Ok(Response { url: "http://[::1]:45204/sp/switch/0/component/rot/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "04b45e6c-fc12-4f3c-b612-ced3c664ad25", "content-length": "163", "date": "Mon, 09 Mar 2026 10:56:11 GMT"} })
|
| 2119 | 2026-03-09T10:56:11.571Z | DEBG | test_update_status (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:45204
method = GET
uri = http://[::1]:45204/sp/switch/0/component/rot/caboose?firmware_slot=1
|
| 2120 | 2026-03-09T10:56:11.571Z | DEBG | test_update_status (ServiceBalancer): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 2121 | 2026-03-09T10:56:11.572Z | DEBG | test_update_status (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:45204
result = Ok(Response { url: "http://[::1]:45204/sp/switch/0/component/rot/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "1e3fe970-5461-4ae0-abdf-c86578be7f04", "content-length": "163", "date": "Mon, 09 Mar 2026 10:56:11 GMT"} })
|
| 2122 | 2026-03-09T10:56:11.572Z | DEBG | test_update_status (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:45204
method = GET
uri = http://[::1]:45204/sp/switch/0/component/stage0/caboose?firmware_slot=0
|
| 2123 | 2026-03-09T10:56:11.574Z | DEBG | test_update_status (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:45204
result = Ok(Response { url: "http://[::1]:45204/sp/switch/0/component/stage0/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "28122655-4ad1-4a3f-8775-aaca90a9fbab", "content-length": "166", "date": "Mon, 09 Mar 2026 10:56:11 GMT"} })
|
| 2124 | 2026-03-09T10:56:11.574Z | DEBG | test_update_status (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:45204
method = GET
uri = http://[::1]:45204/sp/switch/0/component/stage0/caboose?firmware_slot=1
|
| 2125 | 2026-03-09T10:56:11.578Z | DEBG | test_update_status (ServiceBalancer): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-00000000bac3 (built_in_user), .. })
resource = Rack { parent: Fleet, key: c19a698f-c6f9-4a17-ae30-20d711b8f7dc, lookup_type: ById(c19a698f-c6f9-4a17-ae30-20d711b8f7dc) }
result = Ok(())
|
| 2126 | 2026-03-09T10:56:11.578Z | DEBG | test_update_status (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:45204
result = Ok(Response { url: "http://[::1]:45204/sp/switch/0/component/stage0/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "43fa28e4-19de-494d-bdb6-3b46671051de", "content-length": "166", "date": "Mon, 09 Mar 2026 10:56:11 GMT"} })
|
| 2127 | 2026-03-09T10:56:11.578Z | INFO | test_update_status (nexus): Rack initialized
|
| 2128 | 2026-03-09T10:56:11.578Z | TRAC | test_update_status (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 2129 | 2026-03-09T10:56:11.578Z | DEBG | test_update_status (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 2130 | 2026-03-09T10:56:11.578Z | DEBG | test_update_status (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:45204
method = GET
uri = http://[::1]:45204/sp/switch/0/component/rot/cmpa
|
| 2131 | 2026-03-09T10:56:11.578Z | DEBG | test_update_status (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 2132 | 2026-03-09T10:56:11.579Z | DEBG | test_update_status (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:45204
result = Ok(Response { url: "http://[::1]:45204/sp/switch/0/component/rot/cmpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "9d1aa512-a4f7-4e55-a100-1d8356b326a4", "content-length": "702", "date": "Mon, 09 Mar 2026 10:56:11 GMT"} })
|
| 2133 | 2026-03-09T10:56:11.579Z | DEBG | test_update_status (BackgroundTasks): client request
background_task = inventory_collection
body = Some(Body)
gateway_url = http://[::1]:45204
method = GET
uri = http://[::1]:45204/sp/switch/0/component/rot/cfpa
|
| 2134 | 2026-03-09T10:56:11.580Z | DEBG | test_update_status (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:45204
result = Ok(Response { url: "http://[::1]:45204/sp/switch/0/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "5af991d6-7a27-452a-b4e1-c02d57a2e69d", "content-length": "727", "date": "Mon, 09 Mar 2026 10:56:11 GMT"} })
|
| 2135 | 2026-03-09T10:56:11.581Z | DEBG | test_update_status (BackgroundTasks): client request
background_task = inventory_collection
body = Some(Body)
gateway_url = http://[::1]:45204
method = GET
uri = http://[::1]:45204/sp/switch/0/component/rot/cfpa
|
| 2136 | 2026-03-09T10:56:11.582Z | DEBG | test_update_status (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:45204
result = Ok(Response { url: "http://[::1]:45204/sp/switch/0/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "815b76d6-7940-40e1-b399-8cad586125f8", "content-length": "729", "date": "Mon, 09 Mar 2026 10:56:11 GMT"} })
|
| 2137 | 2026-03-09T10:56:11.582Z | DEBG | test_update_status (BackgroundTasks): client request
background_task = inventory_collection
body = Some(Body)
gateway_url = http://[::1]:45204
method = GET
uri = http://[::1]:45204/sp/switch/0/component/rot/cfpa
|
| 2138 | 2026-03-09T10:56:11.583Z | DEBG | test_update_status (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:45204
result = Ok(Response { url: "http://[::1]:45204/sp/switch/0/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "83ea88c7-95ef-4a12-ac5d-445a3d053677", "content-length": "728", "date": "Mon, 09 Mar 2026 10:56:11 GMT"} })
|
| 2139 | 2026-03-09T10:56:11.594Z | DEBG | test_update_status (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:45204
method = GET
uri = http://[::1]:45204/sp/switch/1
|
| 2140 | 2026-03-09T10:56:11.595Z | DEBG | test_update_status (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:45204
result = Ok(Response { url: "http://[::1]:45204/sp/switch/1", status: 200, headers: {"content-type": "application/json", "x-request-id": "9ade0fe1-173d-44fc-b8d9-2a1230d938ff", "content-length": "734", "date": "Mon, 09 Mar 2026 10:56:11 GMT"} })
|
| 2141 | 2026-03-09T10:56:11.595Z | DEBG | test_update_status (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:45204
method = GET
uri = http://[::1]:45204/sp/switch/1/component/sp/caboose?firmware_slot=0
|
| 2142 | 2026-03-09T10:56:11.596Z | DEBG | test_update_status (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:45204
result = Ok(Response { url: "http://[::1]:45204/sp/switch/1/component/sp/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "8a35d868-5e4a-4f00-a1fd-e198dfd6dbb3", "content-length": "111", "date": "Mon, 09 Mar 2026 10:56:11 GMT"} })
|
| 2143 | 2026-03-09T10:56:11.596Z | DEBG | test_update_status (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:45204
method = GET
uri = http://[::1]:45204/sp/switch/1/component/sp/caboose?firmware_slot=1
|
| 2144 | 2026-03-09T10:56:11.597Z | DEBG | test_update_status (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:45204
result = Ok(Response { url: "http://[::1]:45204/sp/switch/1/component/sp/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "63e87dbc-1a54-4b4d-a167-dcf6708a4a78", "content-length": "111", "date": "Mon, 09 Mar 2026 10:56:11 GMT"} })
|
| 2145 | 2026-03-09T10:56:11.597Z | DEBG | test_update_status (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:45204
method = GET
uri = http://[::1]:45204/sp/switch/1/component/rot/caboose?firmware_slot=0
|
| 2146 | 2026-03-09T10:56:11.598Z | DEBG | test_update_status (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:45204
result = Ok(Response { url: "http://[::1]:45204/sp/switch/1/component/rot/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "2d4d9faf-ed59-4ce0-bdff-47acdae356f7", "content-length": "163", "date": "Mon, 09 Mar 2026 10:56:11 GMT"} })
|
| 2147 | 2026-03-09T10:56:11.598Z | DEBG | test_update_status (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:45204
method = GET
uri = http://[::1]:45204/sp/switch/1/component/rot/caboose?firmware_slot=1
|
| 2148 | 2026-03-09T10:56:11.600Z | DEBG | test_update_status (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:45204
result = Ok(Response { url: "http://[::1]:45204/sp/switch/1/component/rot/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "7b8a7e5a-dab8-48af-a67b-b3d022656d5d", "content-length": "163", "date": "Mon, 09 Mar 2026 10:56:11 GMT"} })
|
| 2149 | 2026-03-09T10:56:11.600Z | DEBG | test_update_status (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:45204
method = GET
uri = http://[::1]:45204/sp/switch/1/component/stage0/caboose?firmware_slot=0
|
| 2150 | 2026-03-09T10:56:11.603Z | DEBG | test_update_status (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:45204
result = Ok(Response { url: "http://[::1]:45204/sp/switch/1/component/stage0/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "f41fdb69-567a-486c-9895-ad1d414739c7", "content-length": "166", "date": "Mon, 09 Mar 2026 10:56:11 GMT"} })
|
| 2151 | 2026-03-09T10:56:11.603Z | DEBG | test_update_status (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:45204
method = GET
uri = http://[::1]:45204/sp/switch/1/component/stage0/caboose?firmware_slot=1
|
| 2152 | 2026-03-09T10:56:11.604Z | DEBG | test_update_status (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:45204
result = Ok(Response { url: "http://[::1]:45204/sp/switch/1/component/stage0/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "afeb1e24-c17a-4c11-93e0-b859b6fcaa24", "content-length": "166", "date": "Mon, 09 Mar 2026 10:56:11 GMT"} })
|
| 2153 | 2026-03-09T10:56:11.604Z | DEBG | test_update_status (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:45204
method = GET
uri = http://[::1]:45204/sp/switch/1/component/rot/cmpa
|
| 2154 | 2026-03-09T10:56:11.605Z | DEBG | test_update_status (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:45204
result = Ok(Response { url: "http://[::1]:45204/sp/switch/1/component/rot/cmpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "9d1bffb9-5ae5-4c8f-8f72-b6bac52aa022", "content-length": "702", "date": "Mon, 09 Mar 2026 10:56:11 GMT"} })
|
| 2155 | 2026-03-09T10:56:11.605Z | DEBG | test_update_status (BackgroundTasks): client request
background_task = inventory_collection
body = Some(Body)
gateway_url = http://[::1]:45204
method = GET
uri = http://[::1]:45204/sp/switch/1/component/rot/cfpa
|
| 2156 | 2026-03-09T10:56:11.606Z | DEBG | test_update_status (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:45204
result = Ok(Response { url: "http://[::1]:45204/sp/switch/1/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "eb4b403f-5b1a-424a-bcd3-5af040c5f496", "content-length": "727", "date": "Mon, 09 Mar 2026 10:56:11 GMT"} })
|
| 2157 | 2026-03-09T10:56:11.607Z | DEBG | test_update_status (BackgroundTasks): client request
background_task = inventory_collection
body = Some(Body)
gateway_url = http://[::1]:45204
method = GET
uri = http://[::1]:45204/sp/switch/1/component/rot/cfpa
|
| 2158 | 2026-03-09T10:56:11.616Z | DEBG | test_update_status (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:45204
result = Ok(Response { url: "http://[::1]:45204/sp/switch/1/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "1929940a-6b4c-4b24-b930-b79a57498be9", "content-length": "729", "date": "Mon, 09 Mar 2026 10:56:11 GMT"} })
|
| 2159 | 2026-03-09T10:56:11.617Z | DEBG | test_update_status (BackgroundTasks): client request
background_task = inventory_collection
body = Some(Body)
gateway_url = http://[::1]:45204
method = GET
uri = http://[::1]:45204/sp/switch/1/component/rot/cfpa
|
| 2160 | 2026-03-09T10:56:11.618Z | DEBG | test_update_status (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:45204
result = Ok(Response { url: "http://[::1]:45204/sp/switch/1/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "d9842c9f-8159-4922-8913-80ca3d837032", "content-length": "728", "date": "Mon, 09 Mar 2026 10:56:11 GMT"} })
|
| 2161 | 2026-03-09T10:56:11.618Z | DEBG | test_update_status (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:45204
method = GET
uri = http://[::1]:45204/sp/sled/0
|
| 2162 | 2026-03-09T10:56:11.621Z | DEBG | test_update_status (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:45204
result = Ok(Response { url: "http://[::1]:45204/sp/sled/0", status: 200, headers: {"content-type": "application/json", "x-request-id": "7850bd37-e36e-4c17-a3ba-c36312e68625", "content-length": "723", "date": "Mon, 09 Mar 2026 10:56:11 GMT"} })
|
| 2163 | 2026-03-09T10:56:11.622Z | DEBG | test_update_status (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:45204
method = GET
uri = http://[::1]:45204/sp/sled/0/component/host-boot-flash/active-slot
|
| 2164 | 2026-03-09T10:56:11.623Z | DEBG | test_update_status (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:45204
result = Ok(Response { url: "http://[::1]:45204/sp/sled/0/component/host-boot-flash/active-slot", status: 200, headers: {"content-type": "application/json", "x-request-id": "09215984-7d9a-459c-bcf1-ca2da5dd54bd", "content-length": "10", "date": "Mon, 09 Mar 2026 10:56:11 GMT"} })
|
| 2165 | 2026-03-09T10:56:11.623Z | DEBG | test_update_status (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:45204
method = GET
uri = http://[::1]:45204/sp/sled/0/component/host-boot-flash/hash/0
|
| 2166 | 2026-03-09T10:56:11.626Z | DEBG | test_update_status (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:45204
result = Ok(Response { url: "http://[::1]:45204/sp/sled/0/component/host-boot-flash/hash/0", status: 200, headers: {"content-type": "application/json", "x-request-id": "eeef2933-8484-49ae-9b5c-fa1ced4fbb43", "content-length": "144", "date": "Mon, 09 Mar 2026 10:56:11 GMT"} })
|
| 2167 | 2026-03-09T10:56:11.627Z | DEBG | test_update_status (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:45204
method = GET
uri = http://[::1]:45204/sp/sled/0/component/host-boot-flash/hash/1
|
| 2168 | 2026-03-09T10:56:11.627Z | DEBG | test_update_status (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:45204
result = Ok(Response { url: "http://[::1]:45204/sp/sled/0/component/host-boot-flash/hash/1", status: 200, headers: {"content-type": "application/json", "x-request-id": "53de2aa6-b4dd-4496-8bb3-f5ac36639e6c", "content-length": "147", "date": "Mon, 09 Mar 2026 10:56:11 GMT"} })
|
| 2169 | 2026-03-09T10:56:11.627Z | DEBG | test_update_status (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:45204
method = GET
uri = http://[::1]:45204/sp/sled/0/component/sp/caboose?firmware_slot=0
|
| 2170 | 2026-03-09T10:56:11.629Z | DEBG | test_update_status (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:45204
result = Ok(Response { url: "http://[::1]:45204/sp/sled/0/component/sp/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "d346650f-d89a-428f-84ae-f2a788bc4de4", "content-length": "109", "date": "Mon, 09 Mar 2026 10:56:11 GMT"} })
|
| 2171 | 2026-03-09T10:56:11.629Z | DEBG | test_update_status (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:45204
method = GET
uri = http://[::1]:45204/sp/sled/0/component/sp/caboose?firmware_slot=1
|
| 2172 | 2026-03-09T10:56:11.630Z | DEBG | test_update_status (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:45204
result = Ok(Response { url: "http://[::1]:45204/sp/sled/0/component/sp/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "9aec619b-05d7-4a08-a2f8-cb9ab70106a7", "content-length": "109", "date": "Mon, 09 Mar 2026 10:56:11 GMT"} })
|
| 2173 | 2026-03-09T10:56:11.630Z | DEBG | test_update_status (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:45204
method = GET
uri = http://[::1]:45204/sp/sled/0/component/rot/caboose?firmware_slot=0
|
| 2174 | 2026-03-09T10:56:11.632Z | DEBG | test_update_status (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:45204
result = Ok(Response { url: "http://[::1]:45204/sp/sled/0/component/rot/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "2c1eba72-87af-4fa3-9779-bbfc682a3213", "content-length": "163", "date": "Mon, 09 Mar 2026 10:56:11 GMT"} })
|
| 2175 | 2026-03-09T10:56:11.632Z | DEBG | test_update_status (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:45204
method = GET
uri = http://[::1]:45204/sp/sled/0/component/rot/caboose?firmware_slot=1
|
| 2176 | 2026-03-09T10:56:11.634Z | DEBG | test_update_status (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:45204
result = Ok(Response { url: "http://[::1]:45204/sp/sled/0/component/rot/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "59f221e0-1d48-4a77-9923-0fd35c8135c8", "content-length": "163", "date": "Mon, 09 Mar 2026 10:56:11 GMT"} })
|
| 2177 | 2026-03-09T10:56:11.634Z | DEBG | test_update_status (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:45204
method = GET
uri = http://[::1]:45204/sp/sled/0/component/stage0/caboose?firmware_slot=0
|
| 2178 | 2026-03-09T10:56:11.640Z | DEBG | test_update_status (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:45204
result = Ok(Response { url: "http://[::1]:45204/sp/sled/0/component/stage0/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "fc6a1352-3bb1-437d-a761-86bb1fc630a1", "content-length": "166", "date": "Mon, 09 Mar 2026 10:56:11 GMT"} })
|
| 2179 | 2026-03-09T10:56:11.640Z | DEBG | test_update_status (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:45204
method = GET
uri = http://[::1]:45204/sp/sled/0/component/stage0/caboose?firmware_slot=1
|
| 2180 | 2026-03-09T10:56:11.647Z | DEBG | test_update_status (BackgroundTasks): client request
background_task = crdb_node_id_collector
body = None
method = GET
uri = http://[::1]:32222/node/id
|
| 2181 | 2026-03-09T10:56:11.649Z | DEBG | test_update_status (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:45204
result = Ok(Response { url: "http://[::1]:45204/sp/sled/0/component/stage0/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "1f57c861-d032-4d1b-8373-4fda181820b2", "content-length": "166", "date": "Mon, 09 Mar 2026 10:56:11 GMT"} })
|
| 2182 | 2026-03-09T10:56:11.649Z | DEBG | test_update_status (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:45204
method = GET
uri = http://[::1]:45204/sp/sled/0/component/rot/cmpa
|
| 2183 | 2026-03-09T10:56:11.650Z | TRAC | test_update_status (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 2184 | 2026-03-09T10:56:11.650Z | DEBG | test_update_status (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 2185 | 2026-03-09T10:56:11.650Z | DEBG | test_update_status (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 2186 | 2026-03-09T10:56:11.651Z | DEBG | test_update_status (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:45204
result = Ok(Response { url: "http://[::1]:45204/sp/sled/0/component/rot/cmpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "15be877d-6059-4135-b77d-d6825f6bc671", "content-length": "702", "date": "Mon, 09 Mar 2026 10:56:11 GMT"} })
|
| 2187 | 2026-03-09T10:56:11.652Z | DEBG | test_update_status (BackgroundTasks): client request
background_task = inventory_collection
body = Some(Body)
gateway_url = http://[::1]:45204
method = GET
uri = http://[::1]:45204/sp/sled/0/component/rot/cfpa
|
| 2188 | 2026-03-09T10:56:11.653Z | TRAC | test_update_status (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 2189 | 2026-03-09T10:56:11.653Z | DEBG | test_update_status (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 2190 | 2026-03-09T10:56:11.654Z | DEBG | test_update_status (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 2191 | 2026-03-09T10:56:11.655Z | DEBG | test_update_status (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:45204
result = Ok(Response { url: "http://[::1]:45204/sp/sled/0/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "a5b81ab4-46b7-4a3a-a39b-010fecf84df7", "content-length": "727", "date": "Mon, 09 Mar 2026 10:56:11 GMT"} })
|
| 2192 | 2026-03-09T10:56:11.655Z | DEBG | test_update_status (BackgroundTasks): client request
background_task = inventory_collection
body = Some(Body)
gateway_url = http://[::1]:45204
method = GET
uri = http://[::1]:45204/sp/sled/0/component/rot/cfpa
|
| 2193 | 2026-03-09T10:56:11.655Z | TRAC | test_update_status (InternalApi): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
|
| 2194 | 2026-03-09T10:56:11.655Z | TRAC | test_update_status (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
resource_id = 001de000-4401-4000-8000-000000000000
resource_type = Project
|
| 2195 | 2026-03-09T10:56:11.655Z | TRAC | test_update_status (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 2196 | 2026-03-09T10:56:11.655Z | DEBG | test_update_status (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 2197 | 2026-03-09T10:56:11.656Z | DEBG | test_update_status (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 2198 | 2026-03-09T10:56:11.657Z | DEBG | test_update_status (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:45204
result = Ok(Response { url: "http://[::1]:45204/sp/sled/0/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "a7c00f22-91f3-4d4a-a30d-5910f98fe6e9", "content-length": "729", "date": "Mon, 09 Mar 2026 10:56:11 GMT"} })
|
| 2199 | 2026-03-09T10:56:11.657Z | DEBG | test_update_status (BackgroundTasks): client request
background_task = inventory_collection
body = Some(Body)
gateway_url = http://[::1]:45204
method = GET
uri = http://[::1]:45204/sp/sled/0/component/rot/cfpa
|
| 2200 | 2026-03-09T10:56:11.658Z | TRAC | test_update_status (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
resource_id = 001de000-5110-4000-8000-000000000001
resource_type = Silo
|
| 2201 | 2026-03-09T10:56:11.658Z | DEBG | test_update_status (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:45204
result = Ok(Response { url: "http://[::1]:45204/sp/sled/0/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "1d554768-ea61-497e-ba0f-a3914c3ef998", "content-length": "728", "date": "Mon, 09 Mar 2026 10:56:11 GMT"} })
|
| 2202 | 2026-03-09T10:56:11.658Z | TRAC | test_update_status (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 2203 | 2026-03-09T10:56:11.658Z | DEBG | test_update_status (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 2204 | 2026-03-09T10:56:11.658Z | DEBG | test_update_status (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:45204
method = GET
uri = http://[::1]:45204/sp/sled/1
|
| 2205 | 2026-03-09T10:56:11.658Z | DEBG | test_update_status (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 2206 | 2026-03-09T10:56:11.661Z | TRAC | test_update_status (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 2207 | 2026-03-09T10:56:11.661Z | TRAC | test_update_status (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 2208 | 2026-03-09T10:56:11.661Z | DEBG | test_update_status (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 2209 | 2026-03-09T10:56:11.662Z | DEBG | test_update_status (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 2210 | 2026-03-09T10:56:11.663Z | DEBG | test_update_status (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:45204
result = Ok(Response { url: "http://[::1]:45204/sp/sled/1", status: 200, headers: {"content-type": "application/json", "x-request-id": "c03e65ea-70f5-4611-ada1-a9edfc25fcd4", "content-length": "723", "date": "Mon, 09 Mar 2026 10:56:11 GMT"} })
|
| 2211 | 2026-03-09T10:56:11.663Z | DEBG | test_update_status (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:45204
method = GET
uri = http://[::1]:45204/sp/sled/1/component/host-boot-flash/active-slot
|
| 2212 | 2026-03-09T10:56:11.665Z | DEBG | test_update_status (InternalApi): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 2213 | 2026-03-09T10:56:11.666Z | DEBG | test_update_status (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:45204
result = Ok(Response { url: "http://[::1]:45204/sp/sled/1/component/host-boot-flash/active-slot", status: 200, headers: {"content-type": "application/json", "x-request-id": "ac0a0651-16f7-48a1-9954-7d617757c3df", "content-length": "10", "date": "Mon, 09 Mar 2026 10:56:11 GMT"} })
|
| 2214 | 2026-03-09T10:56:11.666Z | DEBG | test_update_status (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:45204
method = GET
uri = http://[::1]:45204/sp/sled/1/component/host-boot-flash/hash/0
|
| 2215 | 2026-03-09T10:56:11.667Z | DEBG | test_update_status (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:45204
result = Ok(Response { url: "http://[::1]:45204/sp/sled/1/component/host-boot-flash/hash/0", status: 200, headers: {"content-type": "application/json", "x-request-id": "6d0e8732-24fe-4f30-803c-a74d20f96a84", "content-length": "144", "date": "Mon, 09 Mar 2026 10:56:11 GMT"} })
|
| 2216 | 2026-03-09T10:56:11.667Z | DEBG | test_update_status (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:45204
method = GET
uri = http://[::1]:45204/sp/sled/1/component/host-boot-flash/hash/1
|
| 2217 | 2026-03-09T10:56:11.668Z | DEBG | test_update_status (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:45204
result = Ok(Response { url: "http://[::1]:45204/sp/sled/1/component/host-boot-flash/hash/1", status: 200, headers: {"content-type": "application/json", "x-request-id": "717e13fa-7657-4603-81a8-935c5e063330", "content-length": "147", "date": "Mon, 09 Mar 2026 10:56:11 GMT"} })
|
| 2218 | 2026-03-09T10:56:11.668Z | DEBG | test_update_status (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:45204
method = GET
uri = http://[::1]:45204/sp/sled/1/component/sp/caboose?firmware_slot=0
|
| 2219 | 2026-03-09T10:56:11.669Z | DEBG | test_update_status (InternalApi): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
result = Ok(())
|
| 2220 | 2026-03-09T10:56:11.669Z | TRAC | test_update_status (InternalApi): successful lookup of siloed resource "Vpc" using built-in user
|
| 2221 | 2026-03-09T10:56:11.669Z | TRAC | test_update_status (InternalApi): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
|
| 2222 | 2026-03-09T10:56:11.669Z | TRAC | test_update_status (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
resource_id = 001de000-4401-4000-8000-000000000000
resource_type = Project
|
| 2223 | 2026-03-09T10:56:11.669Z | TRAC | test_update_status (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 2224 | 2026-03-09T10:56:11.669Z | DEBG | test_update_status (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 2225 | 2026-03-09T10:56:11.669Z | DEBG | test_update_status (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 2226 | 2026-03-09T10:56:11.670Z | DEBG | test_update_status (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:45204
result = Ok(Response { url: "http://[::1]:45204/sp/sled/1/component/sp/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "c8c42b30-1d0e-40a5-9681-7d9b9e52c8b0", "content-length": "109", "date": "Mon, 09 Mar 2026 10:56:11 GMT"} })
|
| 2227 | 2026-03-09T10:56:11.672Z | TRAC | test_update_status (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
resource_id = 001de000-5110-4000-8000-000000000001
resource_type = Silo
|
| 2228 | 2026-03-09T10:56:11.672Z | TRAC | test_update_status (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 2229 | 2026-03-09T10:56:11.672Z | DEBG | test_update_status (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 2230 | 2026-03-09T10:56:11.673Z | DEBG | test_update_status (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 2231 | 2026-03-09T10:56:11.673Z | DEBG | test_update_status (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:45204
method = GET
uri = http://[::1]:45204/sp/sled/1/component/sp/caboose?firmware_slot=1
|
| 2232 | 2026-03-09T10:56:11.676Z | TRAC | test_update_status (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 2233 | 2026-03-09T10:56:11.676Z | TRAC | test_update_status (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 2234 | 2026-03-09T10:56:11.676Z | DEBG | test_update_status (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 2235 | 2026-03-09T10:56:11.676Z | DEBG | test_update_status (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 2236 | 2026-03-09T10:56:11.676Z | DEBG | test_update_status (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:45204
result = Ok(Response { url: "http://[::1]:45204/sp/sled/1/component/sp/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "713007e7-e4b8-4d29-944d-be53e9aab964", "content-length": "109", "date": "Mon, 09 Mar 2026 10:56:11 GMT"} })
|
| 2237 | 2026-03-09T10:56:11.676Z | DEBG | test_update_status (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:45204
method = GET
uri = http://[::1]:45204/sp/sled/1/component/rot/caboose?firmware_slot=0
|
| 2238 | 2026-03-09T10:56:11.678Z | DEBG | test_update_status (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:45204
result = Ok(Response { url: "http://[::1]:45204/sp/sled/1/component/rot/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "b9c93557-56ea-404d-890e-426edcddfc7a", "content-length": "163", "date": "Mon, 09 Mar 2026 10:56:11 GMT"} })
|
| 2239 | 2026-03-09T10:56:11.678Z | DEBG | test_update_status (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:45204
method = GET
uri = http://[::1]:45204/sp/sled/1/component/rot/caboose?firmware_slot=1
|
| 2240 | 2026-03-09T10:56:11.678Z | DEBG | test_update_status (InternalApi): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 2241 | 2026-03-09T10:56:11.684Z | DEBG | test_update_status (InternalApi): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
result = Ok(())
|
| 2242 | 2026-03-09T10:56:11.684Z | TRAC | test_update_status (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 2243 | 2026-03-09T10:56:11.684Z | DEBG | test_update_status (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 2244 | 2026-03-09T10:56:11.685Z | DEBG | test_update_status (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:45204
result = Ok(Response { url: "http://[::1]:45204/sp/sled/1/component/rot/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "1b4f98ba-5bb9-4e9d-b907-14dca8a856df", "content-length": "163", "date": "Mon, 09 Mar 2026 10:56:11 GMT"} })
|
| 2245 | 2026-03-09T10:56:11.685Z | DEBG | test_update_status (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 2246 | 2026-03-09T10:56:11.685Z | DEBG | test_update_status (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:45204
method = GET
uri = http://[::1]:45204/sp/sled/1/component/stage0/caboose?firmware_slot=0
|
| 2247 | 2026-03-09T10:56:11.686Z | DEBG | test_update_status (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:45204
result = Ok(Response { url: "http://[::1]:45204/sp/sled/1/component/stage0/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "256436f1-2598-4b3d-82a7-b2256d1cb249", "content-length": "166", "date": "Mon, 09 Mar 2026 10:56:11 GMT"} })
|
| 2248 | 2026-03-09T10:56:11.686Z | DEBG | test_update_status (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:45204
method = GET
uri = http://[::1]:45204/sp/sled/1/component/stage0/caboose?firmware_slot=1
|
| 2249 | 2026-03-09T10:56:11.687Z | DEBG | test_update_status (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:45204
result = Ok(Response { url: "http://[::1]:45204/sp/sled/1/component/stage0/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "42ab0494-f33e-4f75-998e-92f41829c6da", "content-length": "166", "date": "Mon, 09 Mar 2026 10:56:11 GMT"} })
|
| 2250 | 2026-03-09T10:56:11.687Z | DEBG | test_update_status (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:45204
method = GET
uri = http://[::1]:45204/sp/sled/1/component/rot/cmpa
|
| 2251 | 2026-03-09T10:56:11.690Z | TRAC | test_update_status (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 2252 | 2026-03-09T10:56:11.690Z | DEBG | test_update_status (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 2253 | 2026-03-09T10:56:11.690Z | DEBG | test_update_status (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:45204
result = Ok(Response { url: "http://[::1]:45204/sp/sled/1/component/rot/cmpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "7425edb4-3383-477e-87a0-19408be91a69", "content-length": "702", "date": "Mon, 09 Mar 2026 10:56:11 GMT"} })
|
| 2254 | 2026-03-09T10:56:11.690Z | DEBG | test_update_status (BackgroundTasks): client request
background_task = inventory_collection
body = Some(Body)
gateway_url = http://[::1]:45204
method = GET
uri = http://[::1]:45204/sp/sled/1/component/rot/cfpa
|
| 2255 | 2026-03-09T10:56:11.691Z | DEBG | test_update_status (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 2256 | 2026-03-09T10:56:11.691Z | DEBG | test_update_status (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:45204
result = Ok(Response { url: "http://[::1]:45204/sp/sled/1/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "b673b043-18da-4c4a-8ad2-c3b61ca035d1", "content-length": "727", "date": "Mon, 09 Mar 2026 10:56:11 GMT"} })
|
| 2257 | 2026-03-09T10:56:11.691Z | DEBG | test_update_status (BackgroundTasks): client request
background_task = inventory_collection
body = Some(Body)
gateway_url = http://[::1]:45204
method = GET
uri = http://[::1]:45204/sp/sled/1/component/rot/cfpa
|
| 2258 | 2026-03-09T10:56:11.693Z | DEBG | test_update_status (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:45204
result = Ok(Response { url: "http://[::1]:45204/sp/sled/1/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "62b3b00a-1ee1-41bb-a0e5-2031d298ae0d", "content-length": "729", "date": "Mon, 09 Mar 2026 10:56:11 GMT"} })
|
| 2259 | 2026-03-09T10:56:11.693Z | TRAC | test_update_status (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 2260 | 2026-03-09T10:56:11.693Z | DEBG | test_update_status (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 2261 | 2026-03-09T10:56:11.693Z | DEBG | test_update_status (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 2262 | 2026-03-09T10:56:11.693Z | DEBG | test_update_status (BackgroundTasks): client request
background_task = inventory_collection
body = Some(Body)
gateway_url = http://[::1]:45204
method = GET
uri = http://[::1]:45204/sp/sled/1/component/rot/cfpa
|
| 2263 | 2026-03-09T10:56:11.695Z | TRAC | test_update_status (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 2264 | 2026-03-09T10:56:11.695Z | DEBG | test_update_status (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 2265 | 2026-03-09T10:56:11.696Z | DEBG | test_update_status (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:45204
result = Ok(Response { url: "http://[::1]:45204/sp/sled/1/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "5cbad60b-c4e6-4d6d-a55e-c5eb2a7497f6", "content-length": "728", "date": "Mon, 09 Mar 2026 10:56:11 GMT"} })
|
| 2266 | 2026-03-09T10:56:11.696Z | DEBG | test_update_status (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 2267 | 2026-03-09T10:56:11.697Z | TRAC | test_update_status (BackgroundTasks): authorize begin
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = inventory_collection
resource = Fleet
|
| 2268 | 2026-03-09T10:56:11.697Z | TRAC | test_update_status (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = inventory_collection
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 2269 | 2026-03-09T10:56:11.697Z | TRAC | test_update_status (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = inventory_collection
resource = Database
|
| 2270 | 2026-03-09T10:56:11.697Z | DEBG | test_update_status (BackgroundTasks): roles
background_task = inventory_collection
roles = RoleSet { roles: {} }
|
| 2271 | 2026-03-09T10:56:11.698Z | DEBG | test_update_status (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = inventory_collection
resource = Database
result = Ok(())
|
| 2272 | 2026-03-09T10:56:11.699Z | TRAC | test_update_status (InternalApi): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
|
| 2273 | 2026-03-09T10:56:11.699Z | TRAC | test_update_status (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
resource_id = 001de000-4401-4000-8000-000000000000
resource_type = Project
|
| 2274 | 2026-03-09T10:56:11.699Z | TRAC | test_update_status (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 2275 | 2026-03-09T10:56:11.699Z | DEBG | test_update_status (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 2276 | 2026-03-09T10:56:11.699Z | DEBG | test_update_status (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 2277 | 2026-03-09T10:56:11.700Z | DEBG | test_update_status (BackgroundTasks): roles
background_task = inventory_collection
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 2278 | 2026-03-09T10:56:11.702Z | TRAC | test_update_status (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
resource_id = 001de000-5110-4000-8000-000000000001
resource_type = Silo
|
| 2279 | 2026-03-09T10:56:11.702Z | TRAC | test_update_status (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 2280 | 2026-03-09T10:56:11.702Z | DEBG | test_update_status (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 2281 | 2026-03-09T10:56:11.702Z | DEBG | test_update_status (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 2282 | 2026-03-09T10:56:11.712Z | DEBG | test_update_status (BackgroundTasks): authorize result
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = inventory_collection
resource = Fleet
result = Ok(())
|
| 2283 | 2026-03-09T10:56:11.712Z | TRAC | test_update_status (BackgroundTasks): authorize begin
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = inventory_collection
resource = Fleet
|
| 2284 | 2026-03-09T10:56:11.712Z | TRAC | test_update_status (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = inventory_collection
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 2285 | 2026-03-09T10:56:11.712Z | TRAC | test_update_status (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = inventory_collection
resource = Database
|
| 2286 | 2026-03-09T10:56:11.712Z | DEBG | test_update_status (BackgroundTasks): roles
background_task = inventory_collection
roles = RoleSet { roles: {} }
|
| 2287 | 2026-03-09T10:56:11.712Z | DEBG | test_update_status (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = inventory_collection
resource = Database
result = Ok(())
|
| 2288 | 2026-03-09T10:56:11.715Z | TRAC | test_update_status (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 2289 | 2026-03-09T10:56:11.716Z | TRAC | test_update_status (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 2290 | 2026-03-09T10:56:11.716Z | DEBG | test_update_status (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 2291 | 2026-03-09T10:56:11.716Z | DEBG | test_update_status (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 2292 | 2026-03-09T10:56:11.716Z | DEBG | test_update_status (BackgroundTasks): roles
background_task = inventory_collection
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 2293 | 2026-03-09T10:56:11.728Z | DEBG | test_update_status (BackgroundTasks): authorize result
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = inventory_collection
resource = Fleet
result = Ok(())
|
| 2294 | 2026-03-09T10:56:11.728Z | TRAC | test_update_status (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = inventory_collection
resource = Database
|
| 2295 | 2026-03-09T10:56:11.728Z | DEBG | test_update_status (BackgroundTasks): roles
background_task = inventory_collection
roles = RoleSet { roles: {} }
|
| 2296 | 2026-03-09T10:56:11.729Z | DEBG | test_update_status (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = inventory_collection
resource = Database
result = Ok(())
|
| 2297 | 2026-03-09T10:56:11.732Z | DEBG | test_update_status (InternalApi): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 2298 | 2026-03-09T10:56:11.739Z | DEBG | test_update_status (InternalApi): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
result = Ok(())
|
| 2299 | 2026-03-09T10:56:11.739Z | TRAC | test_update_status (InternalApi): successful lookup of siloed resource "Vpc" using built-in user
|
| 2300 | 2026-03-09T10:56:11.739Z | TRAC | test_update_status (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 2301 | 2026-03-09T10:56:11.739Z | DEBG | test_update_status (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 2302 | 2026-03-09T10:56:11.740Z | DEBG | test_update_status (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 2303 | 2026-03-09T10:56:11.828Z | DEBG | test_update_status (BackgroundTasks): begin collection from Sled Agent
background_task = inventory_collection
sled_agent_url = http://[::1]:53204
|
| 2304 | 2026-03-09T10:56:11.828Z | DEBG | test_update_status (BackgroundTasks): client request
SledAgent = http://[::1]:53204
background_task = inventory_collection
body = None
method = GET
uri = http://[::1]:53204/inventory
|
| 2305 | 2026-03-09T10:56:11.829Z | INFO | test_update_status (dropshot): accepted connection
local_addr = [::1]:53204
remote_addr = [::1]:64955
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
| 2306 | 2026-03-09T10:56:11.829Z | TRAC | test_update_status (dropshot): incoming request
local_addr = [::1]:53204
method = GET
remote_addr = [::1]:64955
req_id = fa243218-f964-40d9-993e-ff034aa84580
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
uri = /inventory
|
| 2307 | 2026-03-09T10:56:11.829Z | DEBG | test_update_status (dropshot): determined request API version
local_addr = [::1]:53204
method = GET
remote_addr = [::1]:64955
req_id = fa243218-f964-40d9-993e-ff034aa84580
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
uri = /inventory
version = 26.0.0
|
| 2308 | 2026-03-09T10:56:11.830Z | TRAC | test_update_status (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 2309 | 2026-03-09T10:56:11.830Z | DEBG | test_update_status (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 2310 | 2026-03-09T10:56:11.831Z | DEBG | test_update_status (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 2311 | 2026-03-09T10:56:11.831Z | INFO | test_update_status (dropshot): request completed
latency_us = 2215
local_addr = [::1]:53204
method = GET
remote_addr = [::1]:64955
req_id = fa243218-f964-40d9-993e-ff034aa84580
response_code = 200
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
uri = /inventory
|
| 2312 | 2026-03-09T10:56:11.832Z | DEBG | test_update_status (BackgroundTasks): client response
SledAgent = http://[::1]:53204
background_task = inventory_collection
result = Ok(Response { url: "http://[::1]:53204/inventory", status: 200, headers: {"content-type": "application/json", "x-request-id": "fa243218-f964-40d9-993e-ff034aa84580", "content-length": "20607", "date": "Mon, 09 Mar 2026 10:56:11 GMT"} })
|
| 2313 | 2026-03-09T10:56:11.834Z | DEBG | test_update_status (BackgroundTasks): begin collecting all keepers
background_task = inventory_collection
nkeeper_admin_clients = 0
|
| 2314 | 2026-03-09T10:56:11.834Z | DEBG | test_update_status (BackgroundTasks): end collecting all keepers
background_task = inventory_collection
nkeeper_admin_clients = 0
|
| 2315 | 2026-03-09T10:56:11.834Z | DEBG | test_update_status (BackgroundTasks): begin collection from CockroachDB nodes
background_task = inventory_collection
|
| 2316 | 2026-03-09T10:56:11.834Z | DEBG | test_update_status (CockroachClusterAdminClient): client request
body = None
method = GET
uri = http://[::1]:32222/node/id
|
| 2317 | 2026-03-09T10:56:11.835Z | TRAC | test_update_status (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 2318 | 2026-03-09T10:56:11.835Z | DEBG | test_update_status (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 2319 | 2026-03-09T10:56:11.835Z | DEBG | test_update_status (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 2320 | 2026-03-09T10:56:11.838Z | TRAC | test_update_status (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 2321 | 2026-03-09T10:56:11.838Z | DEBG | test_update_status (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 2322 | 2026-03-09T10:56:11.838Z | DEBG | test_update_status (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 2323 | 2026-03-09T10:56:11.841Z | TRAC | test_update_status (InternalApi): authorize begin
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000002, lookup_type: ByName("nexus") }
|
| 2324 | 2026-03-09T10:56:11.841Z | TRAC | test_update_status (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
resource_id = 001de000-4401-4000-8000-000000000000
resource_type = Project
|
| 2325 | 2026-03-09T10:56:11.841Z | TRAC | test_update_status (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 2326 | 2026-03-09T10:56:11.841Z | DEBG | test_update_status (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 2327 | 2026-03-09T10:56:11.842Z | DEBG | test_update_status (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 2328 | 2026-03-09T10:56:11.844Z | TRAC | test_update_status (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
resource_id = 001de000-5110-4000-8000-000000000001
resource_type = Silo
|
| 2329 | 2026-03-09T10:56:11.844Z | TRAC | test_update_status (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 2330 | 2026-03-09T10:56:11.844Z | DEBG | test_update_status (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 2331 | 2026-03-09T10:56:11.845Z | DEBG | test_update_status (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 2332 | 2026-03-09T10:56:11.851Z | TRAC | test_update_status (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 2333 | 2026-03-09T10:56:11.851Z | TRAC | test_update_status (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 2334 | 2026-03-09T10:56:11.851Z | DEBG | test_update_status (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 2335 | 2026-03-09T10:56:11.852Z | DEBG | test_update_status (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 2336 | 2026-03-09T10:56:11.858Z | DEBG | test_update_status (InternalApi): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 2337 | 2026-03-09T10:56:11.867Z | DEBG | test_update_status (InternalApi): authorize result
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000002, lookup_type: ByName("nexus") }
result = Ok(())
|
| 2338 | 2026-03-09T10:56:11.867Z | TRAC | test_update_status (InternalApi): successful lookup of siloed resource "VpcSubnet" using built-in user
|
| 2339 | 2026-03-09T10:56:11.867Z | TRAC | test_update_status (InternalApi): authorize begin
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000002, lookup_type: ByName("nexus") }
|
| 2340 | 2026-03-09T10:56:11.867Z | TRAC | test_update_status (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
resource_id = 001de000-4401-4000-8000-000000000000
resource_type = Project
|
| 2341 | 2026-03-09T10:56:11.867Z | TRAC | test_update_status (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 2342 | 2026-03-09T10:56:11.867Z | DEBG | test_update_status (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 2343 | 2026-03-09T10:56:11.868Z | DEBG | test_update_status (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 2344 | 2026-03-09T10:56:11.873Z | TRAC | test_update_status (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
resource_id = 001de000-5110-4000-8000-000000000001
resource_type = Silo
|
| 2345 | 2026-03-09T10:56:11.873Z | TRAC | test_update_status (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 2346 | 2026-03-09T10:56:11.873Z | DEBG | test_update_status (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 2347 | 2026-03-09T10:56:11.874Z | DEBG | test_update_status (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 2348 | 2026-03-09T10:56:11.878Z | TRAC | test_update_status (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 2349 | 2026-03-09T10:56:11.878Z | TRAC | test_update_status (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 2350 | 2026-03-09T10:56:11.878Z | DEBG | test_update_status (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 2351 | 2026-03-09T10:56:11.879Z | DEBG | test_update_status (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 2352 | 2026-03-09T10:56:11.887Z | DEBG | test_update_status (InternalApi): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 2353 | 2026-03-09T10:56:11.896Z | DEBG | test_update_status (InternalApi): authorize result
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000002, lookup_type: ByName("nexus") }
result = Ok(())
|
| 2354 | 2026-03-09T10:56:11.896Z | TRAC | test_update_status (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 2355 | 2026-03-09T10:56:11.897Z | DEBG | test_update_status (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 2356 | 2026-03-09T10:56:11.897Z | DEBG | test_update_status (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 2357 | 2026-03-09T10:56:11.905Z | TRAC | test_update_status (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 2358 | 2026-03-09T10:56:11.905Z | DEBG | test_update_status (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 2359 | 2026-03-09T10:56:11.906Z | DEBG | test_update_status (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 2360 | 2026-03-09T10:56:11.908Z | TRAC | test_update_status (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 2361 | 2026-03-09T10:56:11.908Z | DEBG | test_update_status (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 2362 | 2026-03-09T10:56:11.908Z | DEBG | test_update_status (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 2363 | 2026-03-09T10:56:11.916Z | TRAC | test_update_status (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 2364 | 2026-03-09T10:56:11.916Z | DEBG | test_update_status (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 2365 | 2026-03-09T10:56:11.916Z | DEBG | test_update_status (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 2366 | 2026-03-09T10:56:11.920Z | TRAC | test_update_status (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 2367 | 2026-03-09T10:56:11.920Z | DEBG | test_update_status (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 2368 | 2026-03-09T10:56:11.921Z | DEBG | test_update_status (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 2369 | 2026-03-09T10:56:11.924Z | TRAC | test_update_status (InternalApi): authorize begin
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000001, lookup_type: ByName("external-dns") }
|
| 2370 | 2026-03-09T10:56:11.924Z | TRAC | test_update_status (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
resource_id = 001de000-4401-4000-8000-000000000000
resource_type = Project
|
| 2371 | 2026-03-09T10:56:11.924Z | TRAC | test_update_status (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 2372 | 2026-03-09T10:56:11.924Z | DEBG | test_update_status (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 2373 | 2026-03-09T10:56:11.925Z | DEBG | test_update_status (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 2374 | 2026-03-09T10:56:11.927Z | TRAC | test_update_status (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
resource_id = 001de000-5110-4000-8000-000000000001
resource_type = Silo
|
| 2375 | 2026-03-09T10:56:11.927Z | TRAC | test_update_status (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 2376 | 2026-03-09T10:56:11.927Z | DEBG | test_update_status (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 2377 | 2026-03-09T10:56:11.928Z | DEBG | test_update_status (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 2378 | 2026-03-09T10:56:11.930Z | TRAC | test_update_status (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 2379 | 2026-03-09T10:56:11.930Z | TRAC | test_update_status (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 2380 | 2026-03-09T10:56:11.930Z | DEBG | test_update_status (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 2381 | 2026-03-09T10:56:11.931Z | DEBG | test_update_status (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 2382 | 2026-03-09T10:56:11.933Z | DEBG | test_update_status (InternalApi): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 2383 | 2026-03-09T10:56:11.941Z | DEBG | test_update_status (InternalApi): authorize result
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000001, lookup_type: ByName("external-dns") }
result = Ok(())
|
| 2384 | 2026-03-09T10:56:11.941Z | TRAC | test_update_status (InternalApi): successful lookup of siloed resource "VpcSubnet" using built-in user
|
| 2385 | 2026-03-09T10:56:11.941Z | TRAC | test_update_status (InternalApi): authorize begin
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000001, lookup_type: ByName("external-dns") }
|
| 2386 | 2026-03-09T10:56:11.941Z | TRAC | test_update_status (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
resource_id = 001de000-4401-4000-8000-000000000000
resource_type = Project
|
| 2387 | 2026-03-09T10:56:11.941Z | TRAC | test_update_status (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 2388 | 2026-03-09T10:56:11.941Z | DEBG | test_update_status (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 2389 | 2026-03-09T10:56:11.941Z | DEBG | test_update_status (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 2390 | 2026-03-09T10:56:11.944Z | TRAC | test_update_status (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
resource_id = 001de000-5110-4000-8000-000000000001
resource_type = Silo
|
| 2391 | 2026-03-09T10:56:11.944Z | TRAC | test_update_status (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 2392 | 2026-03-09T10:56:11.944Z | DEBG | test_update_status (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 2393 | 2026-03-09T10:56:11.945Z | DEBG | test_update_status (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 2394 | 2026-03-09T10:56:11.954Z | TRAC | test_update_status (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 2395 | 2026-03-09T10:56:11.954Z | TRAC | test_update_status (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 2396 | 2026-03-09T10:56:11.954Z | DEBG | test_update_status (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 2397 | 2026-03-09T10:56:11.955Z | DEBG | test_update_status (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 2398 | 2026-03-09T10:56:11.964Z | DEBG | test_update_status (InternalApi): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 2399 | 2026-03-09T10:56:11.972Z | DEBG | test_update_status (InternalApi): authorize result
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000001, lookup_type: ByName("external-dns") }
result = Ok(())
|
| 2400 | 2026-03-09T10:56:11.972Z | TRAC | test_update_status (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 2401 | 2026-03-09T10:56:11.972Z | DEBG | test_update_status (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 2402 | 2026-03-09T10:56:11.973Z | DEBG | test_update_status (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 2403 | 2026-03-09T10:56:12.012Z | DEBG | test_update_status (InternalApi): resolved names for firewall rules
instance_interfaces = {}
subnet_interfaces = {Name("nexus"): [NetworkInterface { id: 6351d099-3196-47c8-95f3-9cca9a524383, kind: Service { id: 913233fe-92a8-4635-9572-183f495429c4 }, name: Name("nexus-913233fe-92a8-4635-9572-183f495429c4"), ip_config: V4(PrivateIpv4Config { ip: 172.30.2.6, subnet: Ipv4Net { addr: 172.30.2.0, width: 24 }, transit_ips: [] }), mac: MacAddr(MacAddr6([168, 64, 37, 255, 128, 1])), vni: Vni(100), primary: true, slot: 0 }], Name("external-dns"): [NetworkInterface { id: 58f21f87-d808-4439-88d3-8dd597ce3bbd, kind: Service { id: 7f3bb0cc-f231-4804-b546-4f80d92bd1a9 }, name: Name("external-dns-7f3bb0cc-f231-4804-b546-4f80d92bd1a9"), ip_config: V6(PrivateIpv6Config { ip: fd77:e9d2:9cd9:1::6, subnet: Ipv6Net { addr: fd77:e9d2:9cd9:1::, width: 64 }, transit_ips: [] }), mac: MacAddr(MacAddr6([168, 64, 37, 255, 128, 0])), vni: Vni(100), primary: true, slot: 0 }]}
subnet_networks = {Name("external-dns"): [V4(Ipv4Network { addr: 172.30.1.0, prefix: 24 }), V6(Ipv6Network { addr: fd77:e9d2:9cd9:1::, prefix: 64 })], Name("nexus"): [V4(Ipv4Network { addr: 172.30.2.0, prefix: 24 }), V6(Ipv6Network { addr: fd77:e9d2:9cd9:2::, prefix: 64 })]}
vpc_interfaces = {}
|
| 2404 | 2026-03-09T10:56:12.012Z | TRAC | test_update_status (InternalApi): authorize begin
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Fleet
|
| 2405 | 2026-03-09T10:56:12.012Z | TRAC | test_update_status (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 2406 | 2026-03-09T10:56:12.012Z | TRAC | test_update_status (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 2407 | 2026-03-09T10:56:12.012Z | DEBG | test_update_status (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 2408 | 2026-03-09T10:56:12.013Z | DEBG | test_update_status (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 2409 | 2026-03-09T10:56:12.018Z | DEBG | test_update_status (InternalApi): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 2410 | 2026-03-09T10:56:12.022Z | DEBG | test_update_status (InternalApi): authorize result
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Fleet
result = Ok(())
|
| 2411 | 2026-03-09T10:56:12.022Z | TRAC | test_update_status (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 2412 | 2026-03-09T10:56:12.022Z | DEBG | test_update_status (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 2413 | 2026-03-09T10:56:12.026Z | DEBG | test_update_status (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 2414 | 2026-03-09T10:56:12.038Z | TRAC | test_update_status (InternalApi): fetched allowlist from DB
allowed = AllowList { id: 001de000-a110-4000-8000-000000000000, time_created: 2026-03-09T10:42:29.158528Z, time_modified: 2026-03-09T10:56:11.230002Z, allowed_ips: None }
|
| 2415 | 2026-03-09T10:56:12.039Z | DEBG | test_update_status (InternalApi): Allowlist for user-facing services is set to allow any inbound traffic. Existing VPC firewall rules will not be modified.
|
| 2416 | 2026-03-09T10:56:12.039Z | DEBG | test_update_status (InternalApi): resolved firewall rules for sled agents
sled_agent_rules = [ResolvedVpcFirewallRule { status: Enabled, direction: Inbound, targets: [NetworkInterface { id: 58f21f87-d808-4439-88d3-8dd597ce3bbd, kind: Service { id: 7f3bb0cc-f231-4804-b546-4f80d92bd1a9 }, name: Name("external-dns-7f3bb0cc-f231-4804-b546-4f80d92bd1a9"), ip_config: V6(PrivateIpv6Config { ip: fd77:e9d2:9cd9:1::6, subnet: Ipv6Net { addr: fd77:e9d2:9cd9:1::, width: 64 }, transit_ips: [] }), mac: MacAddr(MacAddr6([168, 64, 37, 255, 128, 0])), vni: Vni(100), primary: true, slot: 0 }], filter_hosts: None, filter_ports: Some([L4PortRange { first: L4Port(53), last: L4Port(53) }]), filter_protocols: Some([Udp]), action: Allow, priority: VpcFirewallRulePriority(65534) }, ResolvedVpcFirewallRule { status: Enabled, direction: Inbound, targets: [NetworkInterface { id: 6351d099-3196-47c8-95f3-9cca9a524383, kind: Service { id: 913233fe-92a8-4635-9572-183f495429c4 }, name: Name("nexus-913233fe-92a8-4635-9572-183f495429c4"), ip_config: V4(PrivateIpv4Config { ip: 172.30.2.6, subnet: Ipv4Net { addr: 172.30.2.0, width: 24 }, transit_ips: [] }), mac: MacAddr(MacAddr6([168, 64, 37, 255, 128, 1])), vni: Vni(100), primary: true, slot: 0 }, NetworkInterface { id: 58f21f87-d808-4439-88d3-8dd597ce3bbd, kind: Service { id: 7f3bb0cc-f231-4804-b546-4f80d92bd1a9 }, name: Name("external-dns-7f3bb0cc-f231-4804-b546-4f80d92bd1a9"), ip_config: V6(PrivateIpv6Config { ip: fd77:e9d2:9cd9:1::6, subnet: Ipv6Net { addr: fd77:e9d2:9cd9:1::, width: 64 }, transit_ips: [] }), mac: MacAddr(MacAddr6([168, 64, 37, 255, 128, 0])), vni: Vni(100), primary: true, slot: 0 }], filter_hosts: None, filter_ports: None, filter_protocols: Some([Icmp(Some(VpcFirewallIcmpFilter { icmp_type: 3, code: Some(IcmpParamRange { first: 3, last: 4 }) })), Icmp(Some(VpcFirewallIcmpFilter { icmp_type: 5, code: None })), Icmp(Some(VpcFirewallIcmpFilter { icmp_type: 11, code: None }))]), action: Allow, priority: VpcFirewallRulePriority(65534) }, ResolvedVpcFirewallRule { status: Enabled, direction: Inbound, targets: [NetworkInterface { id: 6351d099-3196-47c8-95f3-9cca9a524383, kind: Service { id: 913233fe-92a8-4635-9572-183f495429c4 }, name: Name("nexus-913233fe-92a8-4635-9572-183f495429c4"), ip_config: V4(PrivateIpv4Config { ip: 172.30.2.6, subnet: Ipv4Net { addr: 172.30.2.0, width: 24 }, transit_ips: [] }), mac: MacAddr(MacAddr6([168, 64, 37, 255, 128, 1])), vni: Vni(100), primary: true, slot: 0 }], filter_hosts: None, filter_ports: Some([L4PortRange { first: L4Port(80), last: L4Port(80) }, L4PortRange { first: L4Port(443), last: L4Port(443) }]), filter_protocols: Some([Tcp]), action: Allow, priority: VpcFirewallRulePriority(65534) }]
|
| 2417 | 2026-03-09T10:56:12.039Z | DEBG | test_update_status (InternalApi): resolved 3 rules for sleds
|
| 2418 | 2026-03-09T10:56:12.076Z | DEBG | test_update_status (BackgroundTasks): client response
background_task = crdb_node_id_collector
result = Err(reqwest::Error { kind: Request, url: "http://[::1]:32222/node/id", source: hyper_util::client::legacy::Error(Connect, ConnectError("tcp connect error", [::1]:32222, Os { code: 146, kind: ConnectionRefused, message: "Connection refused" })) })
|
| 2419 | 2026-03-09T10:56:12.077Z | DEBG | test_update_status (BackgroundTasks): activation complete
background_task = crdb_node_id_collector
elapsed = 597.675507ms
iteration = 2
status = {"errors":[{"err":"failed to fetch node ID for zone c102c7f4-c1e4-488a-b8ac-14c83613246a at http://[::1]:32222: Communication Error: error sending request for url (http://[::1]:32222/node/id): error sending request for url (http://[::1]:32222/node/id): client error (Connect): tcp connect error: Connection refused (os error 146)","zone_id":"c102c7f4-c1e4-488a-b8ac-14c83613246a"}],"nsuccess":0}
|
| 2420 | 2026-03-09T10:56:12.101Z | DEBG | test_update_status (InternalApi): resolved sleds for vpc oxide-services
vpc_to_sled = [Sled { identity: SledIdentity { id: b6d65341-167c-41df-9b5c-41cded99c229 (sled), time_created: 2026-03-09T10:56:08.760997Z, time_modified: 2026-03-09T10:56:08.760997Z }, time_deleted: None, rcgen: Generation(Generation(1)), rack_id: c19a698f-c6f9-4a17-ae30-20d711b8f7dc, is_scrimlet: true, serial_number: "SimGimlet00", part_number: "i86pc", revision: SqlU32(3), usable_hardware_threads: SqlU32(16), usable_physical_ram: ByteCount(ByteCount(34359738368)), reservoir_size: ByteCount(ByteCount(17179869184)), ip: ::1, port: SqlU16(53204), last_used_address: ::ffff, policy: InService, state: Active, sled_agent_gen: Generation(Generation(1)), repo_depot_port: SqlU16(42508), cpu_family: AmdMilan }]
|
| 2421 | 2026-03-09T10:56:12.103Z | DEBG | test_update_status (InternalApi): sending firewall rules to sled agents
|
| 2422 | 2026-03-09T10:56:12.179Z | TRAC | test_update_status (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 2423 | 2026-03-09T10:56:12.179Z | DEBG | test_update_status (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 2424 | 2026-03-09T10:56:12.179Z | DEBG | test_update_status (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 2425 | 2026-03-09T10:56:12.185Z | TRAC | test_update_status (InternalApi): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Sled { parent: Fleet, key: b6d65341-167c-41df-9b5c-41cded99c229 (sled), lookup_type: ById(b6d65341-167c-41df-9b5c-41cded99c229) }
|
| 2426 | 2026-03-09T10:56:12.185Z | TRAC | test_update_status (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 2427 | 2026-03-09T10:56:12.185Z | TRAC | test_update_status (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 2428 | 2026-03-09T10:56:12.185Z | DEBG | test_update_status (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 2429 | 2026-03-09T10:56:12.186Z | DEBG | test_update_status (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 2430 | 2026-03-09T10:56:12.195Z | DEBG | test_update_status (InternalApi): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 2431 | 2026-03-09T10:56:12.203Z | DEBG | test_update_status (InternalApi): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Sled { parent: Fleet, key: b6d65341-167c-41df-9b5c-41cded99c229 (sled), lookup_type: ById(b6d65341-167c-41df-9b5c-41cded99c229) }
result = Ok(())
|
| 2432 | 2026-03-09T10:56:12.204Z | DEBG | test_update_status (InternalApi): client request
SledAgent = b6d65341-167c-41df-9b5c-41cded99c229
body = Some(Body)
method = PUT
uri = http://[::1]:53204/vpc/001de000-074c-4000-8000-000000000000/firewall/rules
|
| 2433 | 2026-03-09T10:56:12.204Z | INFO | test_update_status (dropshot): accepted connection
local_addr = [::1]:53204
remote_addr = [::1]:55115
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
| 2434 | 2026-03-09T10:56:12.206Z | TRAC | test_update_status (dropshot): incoming request
local_addr = [::1]:53204
method = PUT
remote_addr = [::1]:55115
req_id = 758b9a30-452e-4e13-8e45-72fd54f27431
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
uri = /vpc/001de000-074c-4000-8000-000000000000/firewall/rules
|
| 2435 | 2026-03-09T10:56:12.206Z | DEBG | test_update_status (dropshot): determined request API version
local_addr = [::1]:53204
method = PUT
remote_addr = [::1]:55115
req_id = 758b9a30-452e-4e13-8e45-72fd54f27431
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
uri = /vpc/001de000-074c-4000-8000-000000000000/firewall/rules
version = 26.0.0
|
| 2436 | 2026-03-09T10:56:12.209Z | INFO | test_update_status (dropshot): request completed
latency_us = 1598
local_addr = [::1]:53204
method = PUT
remote_addr = [::1]:55115
req_id = 758b9a30-452e-4e13-8e45-72fd54f27431
response_code = 204
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
uri = /vpc/001de000-074c-4000-8000-000000000000/firewall/rules
|
| 2437 | 2026-03-09T10:56:12.210Z | DEBG | test_update_status (InternalApi): client response
SledAgent = b6d65341-167c-41df-9b5c-41cded99c229
result = Ok(Response { url: "http://[::1]:53204/vpc/001de000-074c-4000-8000-000000000000/firewall/rules", status: 204, headers: {"x-request-id": "758b9a30-452e-4e13-8e45-72fd54f27431", "date": "Mon, 09 Mar 2026 10:56:12 GMT"} })
|
| 2438 | 2026-03-09T10:56:12.210Z | INFO | test_update_status (InternalApi): updated firewall rules on 1 sleds
|
| 2439 | 2026-03-09T10:56:12.210Z | INFO | test_update_status (nexus): plumbed initial IP allowlist
|
| 2440 | 2026-03-09T10:56:12.266Z | DEBG | test_update_status (CockroachClusterAdminClient): client response
result = Err(reqwest::Error { kind: Request, url: "http://[::1]:32222/node/id", source: hyper_util::client::legacy::Error(Connect, ConnectError("tcp connect error", [::1]:32222, Os { code: 146, kind: ConnectionRefused, message: "Connection refused" })) })
|
| 2441 | 2026-03-09T10:56:12.267Z | WARN | test_update_status (CockroachClusterAdminClient): Failed to fetch metrics from CockroachDB node
error = Failed to get node ID from [::1]:32222
|
| 2442 | 2026-03-09T10:56:12.286Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = GET
path = /
versions = all
|
| 2443 | 2026-03-09T10:56:12.286Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = GET
path = /access
versions = all
|
| 2444 | 2026-03-09T10:56:12.286Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = GET
path = /assets/{path}
versions = all
|
| 2445 | 2026-03-09T10:56:12.286Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = POST
path = /device/auth
versions = all
|
| 2446 | 2026-03-09T10:56:12.286Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = POST
path = /device/confirm
versions = all
|
| 2447 | 2026-03-09T10:56:12.287Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = GET
path = /device/success
versions = all
|
| 2448 | 2026-03-09T10:56:12.287Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = POST
path = /device/token
versions = all
|
| 2449 | 2026-03-09T10:56:12.287Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = GET
path = /device/verify
versions = all
|
| 2450 | 2026-03-09T10:56:12.287Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = GET
path = /experimental/v1/probes
versions = all starting from 2026010300.0.0
|
| 2451 | 2026-03-09T10:56:12.287Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = GET
path = /experimental/v1/probes
versions = all ending with 2026010300.0.0
|
| 2452 | 2026-03-09T10:56:12.287Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = POST
path = /experimental/v1/probes
versions = all starting from 2026010500.0.0
|
| 2453 | 2026-03-09T10:56:12.287Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = POST
path = /experimental/v1/probes
versions = all ending with 2026010500.0.0
|
| 2454 | 2026-03-09T10:56:12.287Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = DELETE
path = /experimental/v1/probes/{probe}
versions = all
|
| 2455 | 2026-03-09T10:56:12.287Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = GET
path = /experimental/v1/probes/{probe}
versions = all starting from 2026010300.0.0
|
| 2456 | 2026-03-09T10:56:12.287Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = GET
path = /experimental/v1/probes/{probe}
versions = all ending with 2026010300.0.0
|
| 2457 | 2026-03-09T10:56:12.287Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = GET
path = /experimental/v1/system/support-bundles
versions = all
|
| 2458 | 2026-03-09T10:56:12.287Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = POST
path = /experimental/v1/system/support-bundles
versions = all
|
| 2459 | 2026-03-09T10:56:12.287Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = DELETE
path = /experimental/v1/system/support-bundles/{bundle_id}
versions = all
|
| 2460 | 2026-03-09T10:56:12.287Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = GET
path = /experimental/v1/system/support-bundles/{bundle_id}
versions = all
|
| 2461 | 2026-03-09T10:56:12.287Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = PUT
path = /experimental/v1/system/support-bundles/{bundle_id}
versions = all
|
| 2462 | 2026-03-09T10:56:12.287Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = GET
path = /experimental/v1/system/support-bundles/{bundle_id}/download
versions = all
|
| 2463 | 2026-03-09T10:56:12.287Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = HEAD
path = /experimental/v1/system/support-bundles/{bundle_id}/download
versions = all
|
| 2464 | 2026-03-09T10:56:12.287Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = GET
path = /experimental/v1/system/support-bundles/{bundle_id}/download/{file}
versions = all
|
| 2465 | 2026-03-09T10:56:12.287Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = HEAD
path = /experimental/v1/system/support-bundles/{bundle_id}/download/{file}
versions = all
|
| 2466 | 2026-03-09T10:56:12.287Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = GET
path = /experimental/v1/system/support-bundles/{bundle_id}/index
versions = all
|
| 2467 | 2026-03-09T10:56:12.287Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = GET
path = /images
versions = all
|
| 2468 | 2026-03-09T10:56:12.287Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = GET
path = /login
versions = all
|
| 2469 | 2026-03-09T10:56:12.287Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = GET
path = /login/{silo_name}/local
versions = all
|
| 2470 | 2026-03-09T10:56:12.287Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = GET
path = /login/{silo_name}/saml/{provider_name}
versions = all
|
| 2471 | 2026-03-09T10:56:12.287Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = POST
path = /login/{silo_name}/saml/{provider_name}
versions = all
|
| 2472 | 2026-03-09T10:56:12.287Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = GET
path = /login/{silo_name}/saml/{provider_name}/redirect
versions = all
|
| 2473 | 2026-03-09T10:56:12.287Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = GET
path = /lookup/{path}
versions = all
|
| 2474 | 2026-03-09T10:56:12.287Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = GET
path = /projects/{path}
versions = all
|
| 2475 | 2026-03-09T10:56:12.287Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = GET
path = /projects-new
versions = all
|
| 2476 | 2026-03-09T10:56:12.287Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = GET
path = /scim/v2/Groups
versions = all
|
| 2477 | 2026-03-09T10:56:12.287Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = POST
path = /scim/v2/Groups
versions = all
|
| 2478 | 2026-03-09T10:56:12.287Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = DELETE
path = /scim/v2/Groups/{group_id}
versions = all
|
| 2479 | 2026-03-09T10:56:12.287Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = GET
path = /scim/v2/Groups/{group_id}
versions = all
|
| 2480 | 2026-03-09T10:56:12.287Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = PATCH
path = /scim/v2/Groups/{group_id}
versions = all
|
| 2481 | 2026-03-09T10:56:12.287Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = PUT
path = /scim/v2/Groups/{group_id}
versions = all
|
| 2482 | 2026-03-09T10:56:12.287Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = GET
path = /scim/v2/Users
versions = all
|
| 2483 | 2026-03-09T10:56:12.287Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = POST
path = /scim/v2/Users
versions = all
|
| 2484 | 2026-03-09T10:56:12.287Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = DELETE
path = /scim/v2/Users/{user_id}
versions = all
|
| 2485 | 2026-03-09T10:56:12.287Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = GET
path = /scim/v2/Users/{user_id}
versions = all
|
| 2486 | 2026-03-09T10:56:12.287Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = PATCH
path = /scim/v2/Users/{user_id}
versions = all
|
| 2487 | 2026-03-09T10:56:12.287Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = PUT
path = /scim/v2/Users/{user_id}
versions = all
|
| 2488 | 2026-03-09T10:56:12.287Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = GET
path = /settings/{path}
versions = all
|
| 2489 | 2026-03-09T10:56:12.287Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = GET
path = /system/{path}
versions = all
|
| 2490 | 2026-03-09T10:56:12.287Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = GET
path = /utilization
versions = all
|
| 2491 | 2026-03-09T10:56:12.288Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = GET
path = /v1/affinity-groups
versions = all
|
| 2492 | 2026-03-09T10:56:12.288Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = POST
path = /v1/affinity-groups
versions = all
|
| 2493 | 2026-03-09T10:56:12.288Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = DELETE
path = /v1/affinity-groups/{affinity_group}
versions = all
|
| 2494 | 2026-03-09T10:56:12.288Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = GET
path = /v1/affinity-groups/{affinity_group}
versions = all
|
| 2495 | 2026-03-09T10:56:12.288Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = PUT
path = /v1/affinity-groups/{affinity_group}
versions = all
|
| 2496 | 2026-03-09T10:56:12.288Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = GET
path = /v1/affinity-groups/{affinity_group}/members
versions = all
|
| 2497 | 2026-03-09T10:56:12.288Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = DELETE
path = /v1/affinity-groups/{affinity_group}/members/instance/{instance}
versions = all
|
| 2498 | 2026-03-09T10:56:12.288Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = GET
path = /v1/affinity-groups/{affinity_group}/members/instance/{instance}
versions = all
|
| 2499 | 2026-03-09T10:56:12.288Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = POST
path = /v1/affinity-groups/{affinity_group}/members/instance/{instance}
versions = all
|
| 2500 | 2026-03-09T10:56:12.288Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = GET
path = /v1/alert-classes
versions = all
|
| 2501 | 2026-03-09T10:56:12.288Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = GET
path = /v1/alert-receivers
versions = all
|
| 2502 | 2026-03-09T10:56:12.288Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = DELETE
path = /v1/alert-receivers/{receiver}
versions = all
|
| 2503 | 2026-03-09T10:56:12.288Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = GET
path = /v1/alert-receivers/{receiver}
versions = all
|
| 2504 | 2026-03-09T10:56:12.288Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = GET
path = /v1/alert-receivers/{receiver}/deliveries
versions = all
|
| 2505 | 2026-03-09T10:56:12.288Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = POST
path = /v1/alert-receivers/{receiver}/probe
versions = all
|
| 2506 | 2026-03-09T10:56:12.288Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = POST
path = /v1/alert-receivers/{receiver}/subscriptions
versions = all
|
| 2507 | 2026-03-09T10:56:12.288Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = DELETE
path = /v1/alert-receivers/{receiver}/subscriptions/{subscription}
versions = all
|
| 2508 | 2026-03-09T10:56:12.288Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = POST
path = /v1/alerts/{alert_id}/resend
versions = all
|
| 2509 | 2026-03-09T10:56:12.288Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = GET
path = /v1/anti-affinity-groups
versions = all
|
| 2510 | 2026-03-09T10:56:12.288Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = POST
path = /v1/anti-affinity-groups
versions = all
|
| 2511 | 2026-03-09T10:56:12.288Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = DELETE
path = /v1/anti-affinity-groups/{anti_affinity_group}
versions = all
|
| 2512 | 2026-03-09T10:56:12.288Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = GET
path = /v1/anti-affinity-groups/{anti_affinity_group}
versions = all
|
| 2513 | 2026-03-09T10:56:12.288Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = PUT
path = /v1/anti-affinity-groups/{anti_affinity_group}
versions = all
|
| 2514 | 2026-03-09T10:56:12.288Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = GET
path = /v1/anti-affinity-groups/{anti_affinity_group}/members
versions = all
|
| 2515 | 2026-03-09T10:56:12.288Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = DELETE
path = /v1/anti-affinity-groups/{anti_affinity_group}/members/instance/{instance}
versions = all
|
| 2516 | 2026-03-09T10:56:12.288Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = GET
path = /v1/anti-affinity-groups/{anti_affinity_group}/members/instance/{instance}
versions = all
|
| 2517 | 2026-03-09T10:56:12.288Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = POST
path = /v1/anti-affinity-groups/{anti_affinity_group}/members/instance/{instance}
versions = all
|
| 2518 | 2026-03-09T10:56:12.288Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = GET
path = /v1/auth-settings
versions = all
|
| 2519 | 2026-03-09T10:56:12.288Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = PUT
path = /v1/auth-settings
versions = all
|
| 2520 | 2026-03-09T10:56:12.288Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = GET
path = /v1/certificates
versions = all
|
| 2521 | 2026-03-09T10:56:12.288Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = POST
path = /v1/certificates
versions = all
|
| 2522 | 2026-03-09T10:56:12.288Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = DELETE
path = /v1/certificates/{certificate}
versions = all
|
| 2523 | 2026-03-09T10:56:12.288Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = GET
path = /v1/certificates/{certificate}
versions = all
|
| 2524 | 2026-03-09T10:56:12.288Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = GET
path = /v1/disks
versions = all starting from 2026013001.0.0
|
| 2525 | 2026-03-09T10:56:12.288Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = GET
path = /v1/disks
versions = from 2025120300.0.0 to 2026013001.0.0
|
| 2526 | 2026-03-09T10:56:12.288Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = GET
path = /v1/disks
versions = all ending with 2025120300.0.0
|
| 2527 | 2026-03-09T10:56:12.288Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = POST
path = /v1/disks
versions = all starting from 2026013100.0.0
|
| 2528 | 2026-03-09T10:56:12.288Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = POST
path = /v1/disks
versions = from 2026013001.0.0 to 2026013100.0.0
|
| 2529 | 2026-03-09T10:56:12.288Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = POST
path = /v1/disks
versions = from 2025120300.0.0 to 2026013001.0.0
|
| 2530 | 2026-03-09T10:56:12.288Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = POST
path = /v1/disks
versions = all ending with 2025120300.0.0
|
| 2531 | 2026-03-09T10:56:12.288Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = DELETE
path = /v1/disks/{disk}
versions = all
|
| 2532 | 2026-03-09T10:56:12.288Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = GET
path = /v1/disks/{disk}
versions = all starting from 2026013001.0.0
|
| 2533 | 2026-03-09T10:56:12.289Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = GET
path = /v1/disks/{disk}
versions = from 2025120300.0.0 to 2026013001.0.0
|
| 2534 | 2026-03-09T10:56:12.289Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = GET
path = /v1/disks/{disk}
versions = all ending with 2025120300.0.0
|
| 2535 | 2026-03-09T10:56:12.289Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = POST
path = /v1/disks/{disk}/bulk-write
versions = all
|
| 2536 | 2026-03-09T10:56:12.289Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = POST
path = /v1/disks/{disk}/bulk-write-start
versions = all
|
| 2537 | 2026-03-09T10:56:12.289Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = POST
path = /v1/disks/{disk}/bulk-write-stop
versions = all
|
| 2538 | 2026-03-09T10:56:12.289Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = POST
path = /v1/disks/{disk}/finalize
versions = all
|
| 2539 | 2026-03-09T10:56:12.289Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = GET
path = /v1/external-subnets
versions = all starting from 2026011601.0.0
|
| 2540 | 2026-03-09T10:56:12.289Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = POST
path = /v1/external-subnets
versions = all starting from 2026012201.0.0
|
| 2541 | 2026-03-09T10:56:12.289Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = POST
path = /v1/external-subnets
versions = from 2026011601.0.0 to 2026012201.0.0
|
| 2542 | 2026-03-09T10:56:12.289Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = DELETE
path = /v1/external-subnets/{external_subnet}
versions = all starting from 2026011601.0.0
|
| 2543 | 2026-03-09T10:56:12.289Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = GET
path = /v1/external-subnets/{external_subnet}
versions = all starting from 2026011601.0.0
|
| 2544 | 2026-03-09T10:56:12.289Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = PUT
path = /v1/external-subnets/{external_subnet}
versions = all starting from 2026011601.0.0
|
| 2545 | 2026-03-09T10:56:12.289Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = POST
path = /v1/external-subnets/{external_subnet}/attach
versions = all starting from 2026011601.0.0
|
| 2546 | 2026-03-09T10:56:12.289Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = POST
path = /v1/external-subnets/{external_subnet}/detach
versions = all starting from 2026011601.0.0
|
| 2547 | 2026-03-09T10:56:12.289Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = GET
path = /v1/floating-ips
versions = all
|
| 2548 | 2026-03-09T10:56:12.289Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = POST
path = /v1/floating-ips
versions = all starting from 2026012200.0.0
|
| 2549 | 2026-03-09T10:56:12.289Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = POST
path = /v1/floating-ips
versions = from 2026011600.0.0 to 2026012200.0.0
|
| 2550 | 2026-03-09T10:56:12.289Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = POST
path = /v1/floating-ips
versions = from 2026010500.0.0 to 2026011600.0.0
|
| 2551 | 2026-03-09T10:56:12.289Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = POST
path = /v1/floating-ips
versions = from 2025122300.0.0 to 2026010500.0.0
|
| 2552 | 2026-03-09T10:56:12.289Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = POST
path = /v1/floating-ips
versions = all ending with 2025122300.0.0
|
| 2553 | 2026-03-09T10:56:12.289Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = DELETE
path = /v1/floating-ips/{floating_ip}
versions = all
|
| 2554 | 2026-03-09T10:56:12.289Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = GET
path = /v1/floating-ips/{floating_ip}
versions = all
|
| 2555 | 2026-03-09T10:56:12.289Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = PUT
path = /v1/floating-ips/{floating_ip}
versions = all
|
| 2556 | 2026-03-09T10:56:12.289Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = POST
path = /v1/floating-ips/{floating_ip}/attach
versions = all
|
| 2557 | 2026-03-09T10:56:12.289Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = POST
path = /v1/floating-ips/{floating_ip}/detach
versions = all
|
| 2558 | 2026-03-09T10:56:12.289Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = GET
path = /v1/groups
versions = all starting from 2026030200.0.0
|
| 2559 | 2026-03-09T10:56:12.289Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = GET
path = /v1/groups
versions = all ending with 2026030200.0.0
|
| 2560 | 2026-03-09T10:56:12.289Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = GET
path = /v1/groups/{group_id}
versions = all starting from 2026030200.0.0
|
| 2561 | 2026-03-09T10:56:12.289Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = GET
path = /v1/groups/{group_id}
versions = all ending with 2026030200.0.0
|
| 2562 | 2026-03-09T10:56:12.289Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = GET
path = /v1/images
versions = all
|
| 2563 | 2026-03-09T10:56:12.289Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = POST
path = /v1/images
versions = all
|
| 2564 | 2026-03-09T10:56:12.289Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = DELETE
path = /v1/images/{image}
versions = all
|
| 2565 | 2026-03-09T10:56:12.289Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = GET
path = /v1/images/{image}
versions = all
|
| 2566 | 2026-03-09T10:56:12.289Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = POST
path = /v1/images/{image}/demote
versions = all
|
| 2567 | 2026-03-09T10:56:12.289Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = POST
path = /v1/images/{image}/promote
versions = all
|
| 2568 | 2026-03-09T10:56:12.289Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = GET
path = /v1/instances
versions = all
|
| 2569 | 2026-03-09T10:56:12.289Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = POST
path = /v1/instances
versions = all starting from 2026013100.0.0
|
| 2570 | 2026-03-09T10:56:12.289Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = POST
path = /v1/instances
versions = from 2026013001.0.0 to 2026013100.0.0
|
| 2571 | 2026-03-09T10:56:12.289Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = POST
path = /v1/instances
versions = from 2026010800.0.0 to 2026013001.0.0
|
| 2572 | 2026-03-09T10:56:12.289Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = POST
path = /v1/instances
versions = from 2026010500.0.0 to 2026010800.0.0
|
| 2573 | 2026-03-09T10:56:12.289Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = POST
path = /v1/instances
versions = from 2026010300.0.0 to 2026010500.0.0
|
| 2574 | 2026-03-09T10:56:12.289Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = POST
path = /v1/instances
versions = from 2025122300.0.0 to 2026010300.0.0
|
| 2575 | 2026-03-09T10:56:12.289Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = POST
path = /v1/instances
versions = from 2025120300.0.0 to 2025122300.0.0
|
| 2576 | 2026-03-09T10:56:12.290Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = POST
path = /v1/instances
versions = all ending with 2025120300.0.0
|
| 2577 | 2026-03-09T10:56:12.290Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = DELETE
path = /v1/instances/{instance}
versions = all
|
| 2578 | 2026-03-09T10:56:12.290Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = GET
path = /v1/instances/{instance}
versions = all
|
| 2579 | 2026-03-09T10:56:12.290Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = PUT
path = /v1/instances/{instance}
versions = all starting from 2026010800.0.0
|
| 2580 | 2026-03-09T10:56:12.290Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = PUT
path = /v1/instances/{instance}
versions = all ending with 2026010800.0.0
|
| 2581 | 2026-03-09T10:56:12.290Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = GET
path = /v1/instances/{instance}/affinity-groups
versions = all
|
| 2582 | 2026-03-09T10:56:12.290Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = GET
path = /v1/instances/{instance}/anti-affinity-groups
versions = all
|
| 2583 | 2026-03-09T10:56:12.290Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = GET
path = /v1/instances/{instance}/disks
versions = all starting from 2026013001.0.0
|
| 2584 | 2026-03-09T10:56:12.290Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = GET
path = /v1/instances/{instance}/disks
versions = from 2025120300.0.0 to 2026013001.0.0
|
| 2585 | 2026-03-09T10:56:12.290Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = GET
path = /v1/instances/{instance}/disks
versions = all ending with 2025120300.0.0
|
| 2586 | 2026-03-09T10:56:12.290Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = POST
path = /v1/instances/{instance}/disks/attach
versions = all starting from 2026013001.0.0
|
| 2587 | 2026-03-09T10:56:12.290Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = POST
path = /v1/instances/{instance}/disks/attach
versions = from 2025120300.0.0 to 2026013001.0.0
|
| 2588 | 2026-03-09T10:56:12.290Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = POST
path = /v1/instances/{instance}/disks/attach
versions = all ending with 2025120300.0.0
|
| 2589 | 2026-03-09T10:56:12.290Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = POST
path = /v1/instances/{instance}/disks/detach
versions = all starting from 2026013001.0.0
|
| 2590 | 2026-03-09T10:56:12.290Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = POST
path = /v1/instances/{instance}/disks/detach
versions = from 2025120300.0.0 to 2026013001.0.0
|
| 2591 | 2026-03-09T10:56:12.290Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = POST
path = /v1/instances/{instance}/disks/detach
versions = all ending with 2025120300.0.0
|
| 2592 | 2026-03-09T10:56:12.290Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = GET
path = /v1/instances/{instance}/external-ips
versions = all
|
| 2593 | 2026-03-09T10:56:12.290Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = DELETE
path = /v1/instances/{instance}/external-ips/ephemeral
versions = all starting from 2026012300.0.0
|
| 2594 | 2026-03-09T10:56:12.290Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = DELETE
path = /v1/instances/{instance}/external-ips/ephemeral
versions = all ending with 2026012300.0.0
|
| 2595 | 2026-03-09T10:56:12.290Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = POST
path = /v1/instances/{instance}/external-ips/ephemeral
versions = all starting from 2026010500.0.0
|
| 2596 | 2026-03-09T10:56:12.290Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = POST
path = /v1/instances/{instance}/external-ips/ephemeral
versions = from 2025122300.0.0 to 2026010500.0.0
|
| 2597 | 2026-03-09T10:56:12.290Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = POST
path = /v1/instances/{instance}/external-ips/ephemeral
versions = all ending with 2025122300.0.0
|
| 2598 | 2026-03-09T10:56:12.290Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = GET
path = /v1/instances/{instance}/external-subnets
versions = all starting from 2026013000.0.0
|
| 2599 | 2026-03-09T10:56:12.290Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = GET
path = /v1/instances/{instance}/multicast-groups
versions = all starting from 2026010800.0.0
|
| 2600 | 2026-03-09T10:56:12.290Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = GET
path = /v1/instances/{instance}/multicast-groups
versions = all ending with 2026010800.0.0
|
| 2601 | 2026-03-09T10:56:12.290Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = DELETE
path = /v1/instances/{instance}/multicast-groups/{multicast_group}
versions = all starting from 2026010800.0.0
|
| 2602 | 2026-03-09T10:56:12.290Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = DELETE
path = /v1/instances/{instance}/multicast-groups/{multicast_group}
versions = all ending with 2026010800.0.0
|
| 2603 | 2026-03-09T10:56:12.290Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = PUT
path = /v1/instances/{instance}/multicast-groups/{multicast_group}
versions = all starting from 2026010800.0.0
|
| 2604 | 2026-03-09T10:56:12.290Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = PUT
path = /v1/instances/{instance}/multicast-groups/{multicast_group}
versions = all ending with 2026010800.0.0
|
| 2605 | 2026-03-09T10:56:12.290Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = POST
path = /v1/instances/{instance}/reboot
versions = all
|
| 2606 | 2026-03-09T10:56:12.290Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = GET
path = /v1/instances/{instance}/serial-console
versions = all
|
| 2607 | 2026-03-09T10:56:12.290Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = GET
path = /v1/instances/{instance}/serial-console/stream
versions = all
|
| 2608 | 2026-03-09T10:56:12.290Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = GET
path = /v1/instances/{instance}/ssh-public-keys
versions = all
|
| 2609 | 2026-03-09T10:56:12.290Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = POST
path = /v1/instances/{instance}/start
versions = all
|
| 2610 | 2026-03-09T10:56:12.290Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = POST
path = /v1/instances/{instance}/stop
versions = all
|
| 2611 | 2026-03-09T10:56:12.290Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = GET
path = /v1/internet-gateway-ip-addresses
versions = all
|
| 2612 | 2026-03-09T10:56:12.290Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = POST
path = /v1/internet-gateway-ip-addresses
versions = all
|
| 2613 | 2026-03-09T10:56:12.290Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = DELETE
path = /v1/internet-gateway-ip-addresses/{address}
versions = all
|
| 2614 | 2026-03-09T10:56:12.290Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = GET
path = /v1/internet-gateway-ip-pools
versions = all
|
| 2615 | 2026-03-09T10:56:12.290Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = POST
path = /v1/internet-gateway-ip-pools
versions = all
|
| 2616 | 2026-03-09T10:56:12.290Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = DELETE
path = /v1/internet-gateway-ip-pools/{pool}
versions = all
|
| 2617 | 2026-03-09T10:56:12.291Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = GET
path = /v1/internet-gateways
versions = all
|
| 2618 | 2026-03-09T10:56:12.291Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = POST
path = /v1/internet-gateways
versions = all
|
| 2619 | 2026-03-09T10:56:12.291Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = DELETE
path = /v1/internet-gateways/{gateway}
versions = all
|
| 2620 | 2026-03-09T10:56:12.291Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = GET
path = /v1/internet-gateways/{gateway}
versions = all
|
| 2621 | 2026-03-09T10:56:12.291Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = GET
path = /v1/ip-pools
versions = all starting from 2026020900.0.0
|
| 2622 | 2026-03-09T10:56:12.291Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = GET
path = /v1/ip-pools
versions = from 2026010100.0.0 to 2026020900.0.0
|
| 2623 | 2026-03-09T10:56:12.291Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = GET
path = /v1/ip-pools
versions = all ending with 2026010100.0.0
|
| 2624 | 2026-03-09T10:56:12.291Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = GET
path = /v1/ip-pools/{pool}
versions = all starting from 2026020900.0.0
|
| 2625 | 2026-03-09T10:56:12.291Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = GET
path = /v1/ip-pools/{pool}
versions = from 2026010100.0.0 to 2026020900.0.0
|
| 2626 | 2026-03-09T10:56:12.291Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = GET
path = /v1/ip-pools/{pool}
versions = all ending with 2026010100.0.0
|
| 2627 | 2026-03-09T10:56:12.291Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = POST
path = /v1/login/{silo_name}/local
versions = all
|
| 2628 | 2026-03-09T10:56:12.291Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = POST
path = /v1/logout
versions = all
|
| 2629 | 2026-03-09T10:56:12.291Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = GET
path = /v1/me
versions = all starting from 2026030200.0.0
|
| 2630 | 2026-03-09T10:56:12.291Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = GET
path = /v1/me
versions = all ending with 2026030200.0.0
|
| 2631 | 2026-03-09T10:56:12.291Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = GET
path = /v1/me/access-tokens
versions = all
|
| 2632 | 2026-03-09T10:56:12.291Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = DELETE
path = /v1/me/access-tokens/{token_id}
versions = all
|
| 2633 | 2026-03-09T10:56:12.291Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = GET
path = /v1/me/groups
versions = all starting from 2026030200.0.0
|
| 2634 | 2026-03-09T10:56:12.291Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = GET
path = /v1/me/groups
versions = all ending with 2026030200.0.0
|
| 2635 | 2026-03-09T10:56:12.291Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = GET
path = /v1/me/ssh-keys
versions = all
|
| 2636 | 2026-03-09T10:56:12.291Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = POST
path = /v1/me/ssh-keys
versions = all
|
| 2637 | 2026-03-09T10:56:12.291Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = DELETE
path = /v1/me/ssh-keys/{ssh_key}
versions = all
|
| 2638 | 2026-03-09T10:56:12.291Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = GET
path = /v1/me/ssh-keys/{ssh_key}
versions = all
|
| 2639 | 2026-03-09T10:56:12.291Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = GET
path = /v1/metrics/{metric_name}
versions = all
|
| 2640 | 2026-03-09T10:56:12.291Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = GET
path = /v1/multicast-groups
versions = all starting from 2026010800.0.0
|
| 2641 | 2026-03-09T10:56:12.291Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = GET
path = /v1/multicast-groups
versions = all ending with 2026010800.0.0
|
| 2642 | 2026-03-09T10:56:12.291Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = POST
path = /v1/multicast-groups
versions = all ending with 2026010800.0.0
|
| 2643 | 2026-03-09T10:56:12.291Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = DELETE
path = /v1/multicast-groups/{multicast_group}
versions = all ending with 2026010800.0.0
|
| 2644 | 2026-03-09T10:56:12.291Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = GET
path = /v1/multicast-groups/{multicast_group}
versions = all starting from 2026010800.0.0
|
| 2645 | 2026-03-09T10:56:12.291Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = GET
path = /v1/multicast-groups/{multicast_group}
versions = all ending with 2026010800.0.0
|
| 2646 | 2026-03-09T10:56:12.291Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = PUT
path = /v1/multicast-groups/{multicast_group}
versions = all ending with 2026010800.0.0
|
| 2647 | 2026-03-09T10:56:12.291Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = GET
path = /v1/multicast-groups/{multicast_group}/members
versions = all starting from 2026010800.0.0
|
| 2648 | 2026-03-09T10:56:12.291Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = GET
path = /v1/multicast-groups/{multicast_group}/members
versions = all ending with 2026010800.0.0
|
| 2649 | 2026-03-09T10:56:12.292Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = POST
path = /v1/multicast-groups/{multicast_group}/members
versions = all ending with 2026010800.0.0
|
| 2650 | 2026-03-09T10:56:12.292Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = DELETE
path = /v1/multicast-groups/{multicast_group}/members/{instance}
versions = all ending with 2026010800.0.0
|
| 2651 | 2026-03-09T10:56:12.292Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = GET
path = /v1/network-interfaces
versions = all starting from 2026010300.0.0
|
| 2652 | 2026-03-09T10:56:12.292Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = GET
path = /v1/network-interfaces
versions = all ending with 2026010300.0.0
|
| 2653 | 2026-03-09T10:56:12.292Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = POST
path = /v1/network-interfaces
versions = all starting from 2026010300.0.0
|
| 2654 | 2026-03-09T10:56:12.292Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = POST
path = /v1/network-interfaces
versions = all ending with 2026010300.0.0
|
| 2655 | 2026-03-09T10:56:12.292Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = DELETE
path = /v1/network-interfaces/{interface}
versions = all
|
| 2656 | 2026-03-09T10:56:12.292Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = GET
path = /v1/network-interfaces/{interface}
versions = all starting from 2026010300.0.0
|
| 2657 | 2026-03-09T10:56:12.292Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = GET
path = /v1/network-interfaces/{interface}
versions = all ending with 2026010300.0.0
|
| 2658 | 2026-03-09T10:56:12.292Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = PUT
path = /v1/network-interfaces/{interface}
versions = all starting from 2026010300.0.0
|
| 2659 | 2026-03-09T10:56:12.292Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = PUT
path = /v1/network-interfaces/{interface}
versions = all ending with 2026010300.0.0
|
| 2660 | 2026-03-09T10:56:12.292Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = GET
path = /v1/ping
versions = all
|
| 2661 | 2026-03-09T10:56:12.292Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = GET
path = /v1/policy
versions = all
|
| 2662 | 2026-03-09T10:56:12.292Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = PUT
path = /v1/policy
versions = all
|
| 2663 | 2026-03-09T10:56:12.292Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = GET
path = /v1/projects
versions = all
|
| 2664 | 2026-03-09T10:56:12.292Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = POST
path = /v1/projects
versions = all
|
| 2665 | 2026-03-09T10:56:12.292Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = DELETE
path = /v1/projects/{project}
versions = all
|
| 2666 | 2026-03-09T10:56:12.292Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = GET
path = /v1/projects/{project}
versions = all
|
| 2667 | 2026-03-09T10:56:12.292Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = PUT
path = /v1/projects/{project}
versions = all
|
| 2668 | 2026-03-09T10:56:12.292Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = GET
path = /v1/projects/{project}/policy
versions = all
|
| 2669 | 2026-03-09T10:56:12.292Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = PUT
path = /v1/projects/{project}/policy
versions = all
|
| 2670 | 2026-03-09T10:56:12.292Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = GET
path = /v1/snapshots
versions = all
|
| 2671 | 2026-03-09T10:56:12.292Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = POST
path = /v1/snapshots
versions = all
|
| 2672 | 2026-03-09T10:56:12.292Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = DELETE
path = /v1/snapshots/{snapshot}
versions = all
|
| 2673 | 2026-03-09T10:56:12.292Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = GET
path = /v1/snapshots/{snapshot}
versions = all
|
| 2674 | 2026-03-09T10:56:12.292Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = GET
path = /v1/subnet-pools
versions = all starting from 2026020900.0.0
|
| 2675 | 2026-03-09T10:56:12.292Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = GET
path = /v1/subnet-pools
versions = from 2026020600.0.0 to 2026020900.0.0
|
| 2676 | 2026-03-09T10:56:12.292Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = GET
path = /v1/subnet-pools/{pool}
versions = all starting from 2026020900.0.0
|
| 2677 | 2026-03-09T10:56:12.292Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = GET
path = /v1/system/audit-log
versions = all
|
| 2678 | 2026-03-09T10:56:12.292Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = GET
path = /v1/system/hardware/disks
versions = all
|
| 2679 | 2026-03-09T10:56:12.292Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = GET
path = /v1/system/hardware/disks/{disk_id}
versions = all
|
| 2680 | 2026-03-09T10:56:12.292Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = GET
path = /v1/system/hardware/rack-switch-port/{rack_id}/{switch_location}/{port}/lldp/neighbors
versions = all
|
| 2681 | 2026-03-09T10:56:12.292Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = GET
path = /v1/system/hardware/racks
versions = all
|
| 2682 | 2026-03-09T10:56:12.292Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = GET
path = /v1/system/hardware/racks/{rack_id}
versions = all
|
| 2683 | 2026-03-09T10:56:12.292Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = GET
path = /v1/system/hardware/racks/{rack_id}/membership
versions = all starting from 2026012100.0.0
|
| 2684 | 2026-03-09T10:56:12.292Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = POST
path = /v1/system/hardware/racks/{rack_id}/membership/abort
versions = all starting from 2026020200.0.0
|
| 2685 | 2026-03-09T10:56:12.292Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = POST
path = /v1/system/hardware/racks/{rack_id}/membership/add
versions = all starting from 2026012100.0.0
|
| 2686 | 2026-03-09T10:56:12.292Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = GET
path = /v1/system/hardware/sleds
versions = all
|
| 2687 | 2026-03-09T10:56:12.292Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = POST
path = /v1/system/hardware/sleds
versions = all ending with 2026021900.0.0
|
| 2688 | 2026-03-09T10:56:12.292Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = GET
path = /v1/system/hardware/sleds/{sled_id}
versions = all
|
| 2689 | 2026-03-09T10:56:12.292Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = GET
path = /v1/system/hardware/sleds/{sled_id}/disks
versions = all
|
| 2690 | 2026-03-09T10:56:12.292Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = GET
path = /v1/system/hardware/sleds/{sled_id}/instances
versions = all
|
| 2691 | 2026-03-09T10:56:12.292Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = PUT
path = /v1/system/hardware/sleds/{sled_id}/provision-policy
versions = all
|
| 2692 | 2026-03-09T10:56:12.292Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = GET
path = /v1/system/hardware/sleds-uninitialized
versions = all
|
| 2693 | 2026-03-09T10:56:12.292Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = GET
path = /v1/system/hardware/switch-port
versions = all
|
| 2694 | 2026-03-09T10:56:12.293Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = GET
path = /v1/system/hardware/switch-port/{port}/lldp/config
versions = all
|
| 2695 | 2026-03-09T10:56:12.293Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = POST
path = /v1/system/hardware/switch-port/{port}/lldp/config
versions = all
|
| 2696 | 2026-03-09T10:56:12.293Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = DELETE
path = /v1/system/hardware/switch-port/{port}/settings
versions = all
|
| 2697 | 2026-03-09T10:56:12.293Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = POST
path = /v1/system/hardware/switch-port/{port}/settings
versions = all
|
| 2698 | 2026-03-09T10:56:12.293Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = GET
path = /v1/system/hardware/switch-port/{port}/status
versions = all
|
| 2699 | 2026-03-09T10:56:12.293Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = GET
path = /v1/system/hardware/switches
versions = all
|
| 2700 | 2026-03-09T10:56:12.293Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = GET
path = /v1/system/hardware/switches/{switch_id}
versions = all
|
| 2701 | 2026-03-09T10:56:12.293Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = GET
path = /v1/system/identity-providers
versions = all
|
| 2702 | 2026-03-09T10:56:12.293Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = POST
path = /v1/system/identity-providers/local/users
versions = all starting from 2026030200.0.0
|
| 2703 | 2026-03-09T10:56:12.293Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = POST
path = /v1/system/identity-providers/local/users
versions = all ending with 2026030200.0.0
|
| 2704 | 2026-03-09T10:56:12.293Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = DELETE
path = /v1/system/identity-providers/local/users/{user_id}
versions = all
|
| 2705 | 2026-03-09T10:56:12.293Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = POST
path = /v1/system/identity-providers/local/users/{user_id}/set-password
versions = all
|
| 2706 | 2026-03-09T10:56:12.293Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = POST
path = /v1/system/identity-providers/saml
versions = all
|
| 2707 | 2026-03-09T10:56:12.293Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = GET
path = /v1/system/identity-providers/saml/{provider}
versions = all
|
| 2708 | 2026-03-09T10:56:12.293Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = GET
path = /v1/system/ip-pools
versions = all starting from 2026020900.0.0
|
| 2709 | 2026-03-09T10:56:12.293Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = GET
path = /v1/system/ip-pools
versions = all ending with 2026020900.0.0
|
| 2710 | 2026-03-09T10:56:12.293Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = POST
path = /v1/system/ip-pools
versions = all starting from 2026020900.0.0
|
| 2711 | 2026-03-09T10:56:12.293Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = POST
path = /v1/system/ip-pools
versions = all ending with 2026020900.0.0
|
| 2712 | 2026-03-09T10:56:12.293Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = DELETE
path = /v1/system/ip-pools/{pool}
versions = all starting from 2026020900.0.0
|
| 2713 | 2026-03-09T10:56:12.293Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = DELETE
path = /v1/system/ip-pools/{pool}
versions = all ending with 2026020900.0.0
|
| 2714 | 2026-03-09T10:56:12.293Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = GET
path = /v1/system/ip-pools/{pool}
versions = all starting from 2026020900.0.0
|
| 2715 | 2026-03-09T10:56:12.293Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = GET
path = /v1/system/ip-pools/{pool}
versions = all ending with 2026020900.0.0
|
| 2716 | 2026-03-09T10:56:12.293Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = PUT
path = /v1/system/ip-pools/{pool}
versions = all starting from 2026020900.0.0
|
| 2717 | 2026-03-09T10:56:12.293Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = PUT
path = /v1/system/ip-pools/{pool}
versions = all ending with 2026020900.0.0
|
| 2718 | 2026-03-09T10:56:12.293Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = GET
path = /v1/system/ip-pools/{pool}/ranges
versions = all starting from 2026020900.0.0
|
| 2719 | 2026-03-09T10:56:12.293Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = GET
path = /v1/system/ip-pools/{pool}/ranges
versions = all ending with 2026020900.0.0
|
| 2720 | 2026-03-09T10:56:12.293Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = POST
path = /v1/system/ip-pools/{pool}/ranges/add
versions = all starting from 2026020900.0.0
|
| 2721 | 2026-03-09T10:56:12.293Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = POST
path = /v1/system/ip-pools/{pool}/ranges/add
versions = all ending with 2026020900.0.0
|
| 2722 | 2026-03-09T10:56:12.293Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = POST
path = /v1/system/ip-pools/{pool}/ranges/remove
versions = all starting from 2026020900.0.0
|
| 2723 | 2026-03-09T10:56:12.293Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = POST
path = /v1/system/ip-pools/{pool}/ranges/remove
versions = all ending with 2026020900.0.0
|
| 2724 | 2026-03-09T10:56:12.293Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = GET
path = /v1/system/ip-pools/{pool}/silos
versions = all starting from 2026020900.0.0
|
| 2725 | 2026-03-09T10:56:12.293Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = GET
path = /v1/system/ip-pools/{pool}/silos
versions = all ending with 2026020900.0.0
|
| 2726 | 2026-03-09T10:56:12.293Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = POST
path = /v1/system/ip-pools/{pool}/silos
versions = all starting from 2026020900.0.0
|
| 2727 | 2026-03-09T10:56:12.293Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = POST
path = /v1/system/ip-pools/{pool}/silos
versions = all ending with 2026020900.0.0
|
| 2728 | 2026-03-09T10:56:12.293Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = DELETE
path = /v1/system/ip-pools/{pool}/silos/{silo}
versions = all starting from 2026020900.0.0
|
| 2729 | 2026-03-09T10:56:12.293Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = DELETE
path = /v1/system/ip-pools/{pool}/silos/{silo}
versions = all ending with 2026020900.0.0
|
| 2730 | 2026-03-09T10:56:12.293Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = PUT
path = /v1/system/ip-pools/{pool}/silos/{silo}
versions = all starting from 2026020900.0.0
|
| 2731 | 2026-03-09T10:56:12.293Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = PUT
path = /v1/system/ip-pools/{pool}/silos/{silo}
versions = all ending with 2026020900.0.0
|
| 2732 | 2026-03-09T10:56:12.293Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = GET
path = /v1/system/ip-pools/{pool}/utilization
versions = all starting from 2026020900.0.0
|
| 2733 | 2026-03-09T10:56:12.293Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = GET
path = /v1/system/ip-pools/{pool}/utilization
versions = all ending with 2026020900.0.0
|
| 2734 | 2026-03-09T10:56:12.293Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = GET
path = /v1/system/ip-pools-service
versions = all starting from 2026020900.0.0
|
| 2735 | 2026-03-09T10:56:12.293Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = GET
path = /v1/system/ip-pools-service
versions = all ending with 2026020900.0.0
|
| 2736 | 2026-03-09T10:56:12.293Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = GET
path = /v1/system/ip-pools-service/ranges
versions = all starting from 2026020900.0.0
|
| 2737 | 2026-03-09T10:56:12.293Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = GET
path = /v1/system/ip-pools-service/ranges
versions = all ending with 2026020900.0.0
|
| 2738 | 2026-03-09T10:56:12.293Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = POST
path = /v1/system/ip-pools-service/ranges/add
versions = all starting from 2026020900.0.0
|
| 2739 | 2026-03-09T10:56:12.293Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = POST
path = /v1/system/ip-pools-service/ranges/add
versions = all ending with 2026020900.0.0
|
| 2740 | 2026-03-09T10:56:12.293Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = POST
path = /v1/system/ip-pools-service/ranges/remove
versions = all starting from 2026020900.0.0
|
| 2741 | 2026-03-09T10:56:12.293Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = POST
path = /v1/system/ip-pools-service/ranges/remove
versions = all ending with 2026020900.0.0
|
| 2742 | 2026-03-09T10:56:12.294Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = GET
path = /v1/system/metrics/{metric_name}
versions = all
|
| 2743 | 2026-03-09T10:56:12.294Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = GET
path = /v1/system/multicast-groups/by-ip/{address}
versions = all ending with 2026010800.0.0
|
| 2744 | 2026-03-09T10:56:12.294Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = GET
path = /v1/system/networking/address-lot
versions = all
|
| 2745 | 2026-03-09T10:56:12.294Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = POST
path = /v1/system/networking/address-lot
versions = all
|
| 2746 | 2026-03-09T10:56:12.294Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = DELETE
path = /v1/system/networking/address-lot/{address_lot}
versions = all
|
| 2747 | 2026-03-09T10:56:12.294Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = GET
path = /v1/system/networking/address-lot/{address_lot}
versions = all
|
| 2748 | 2026-03-09T10:56:12.294Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = GET
path = /v1/system/networking/address-lot/{address_lot}/blocks
versions = all
|
| 2749 | 2026-03-09T10:56:12.294Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = GET
path = /v1/system/networking/allow-list
versions = all
|
| 2750 | 2026-03-09T10:56:12.294Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = PUT
path = /v1/system/networking/allow-list
versions = all
|
| 2751 | 2026-03-09T10:56:12.294Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = POST
path = /v1/system/networking/bfd-disable
versions = all
|
| 2752 | 2026-03-09T10:56:12.294Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = POST
path = /v1/system/networking/bfd-enable
versions = all
|
| 2753 | 2026-03-09T10:56:12.294Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = GET
path = /v1/system/networking/bfd-status
versions = all
|
| 2754 | 2026-03-09T10:56:12.294Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = DELETE
path = /v1/system/networking/bgp
versions = all
|
| 2755 | 2026-03-09T10:56:12.294Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = GET
path = /v1/system/networking/bgp
versions = all starting from 2026021301.0.0
|
| 2756 | 2026-03-09T10:56:12.294Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = GET
path = /v1/system/networking/bgp
versions = all ending with 2026021301.0.0
|
| 2757 | 2026-03-09T10:56:12.294Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = POST
path = /v1/system/networking/bgp
versions = all starting from 2026021301.0.0
|
| 2758 | 2026-03-09T10:56:12.294Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = POST
path = /v1/system/networking/bgp
versions = all ending with 2026021301.0.0
|
| 2759 | 2026-03-09T10:56:12.294Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = GET
path = /v1/system/networking/bgp-announce-set
versions = all
|
| 2760 | 2026-03-09T10:56:12.294Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = PUT
path = /v1/system/networking/bgp-announce-set
versions = all
|
| 2761 | 2026-03-09T10:56:12.294Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = DELETE
path = /v1/system/networking/bgp-announce-set/{announce_set}
versions = all
|
| 2762 | 2026-03-09T10:56:12.294Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = GET
path = /v1/system/networking/bgp-announce-set/{announce_set}/announcement
versions = all
|
| 2763 | 2026-03-09T10:56:12.294Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = GET
path = /v1/system/networking/bgp-exported
versions = all starting from 2026021301.0.0
|
| 2764 | 2026-03-09T10:56:12.294Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = GET
path = /v1/system/networking/bgp-exported
versions = all ending with 2026021301.0.0
|
| 2765 | 2026-03-09T10:56:12.294Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = GET
path = /v1/system/networking/bgp-imported
versions = all starting from 2026021301.0.0
|
| 2766 | 2026-03-09T10:56:12.294Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = GET
path = /v1/system/networking/bgp-message-history
versions = all
|
| 2767 | 2026-03-09T10:56:12.294Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = GET
path = /v1/system/networking/bgp-routes-ipv4
versions = all ending with 2026021301.0.0
|
| 2768 | 2026-03-09T10:56:12.294Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = GET
path = /v1/system/networking/bgp-status
versions = all starting from 2026021301.0.0
|
| 2769 | 2026-03-09T10:56:12.294Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = GET
path = /v1/system/networking/bgp-status
versions = from 2025121200.0.0 to 2026021301.0.0
|
| 2770 | 2026-03-09T10:56:12.294Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = GET
path = /v1/system/networking/bgp-status
versions = all ending with 2025121200.0.0
|
| 2771 | 2026-03-09T10:56:12.294Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = GET
path = /v1/system/networking/inbound-icmp
versions = all
|
| 2772 | 2026-03-09T10:56:12.294Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = PUT
path = /v1/system/networking/inbound-icmp
versions = all
|
| 2773 | 2026-03-09T10:56:12.294Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = GET
path = /v1/system/networking/loopback-address
versions = all
|
| 2774 | 2026-03-09T10:56:12.294Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = POST
path = /v1/system/networking/loopback-address
versions = all
|
| 2775 | 2026-03-09T10:56:12.294Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = DELETE
path = /v1/system/networking/loopback-address/{rack_id}/{switch_location}/{address}/{subnet_mask}
versions = all
|
| 2776 | 2026-03-09T10:56:12.294Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = DELETE
path = /v1/system/networking/switch-port-settings
versions = all
|
| 2777 | 2026-03-09T10:56:12.294Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = GET
path = /v1/system/networking/switch-port-settings
versions = all
|
| 2778 | 2026-03-09T10:56:12.294Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = POST
path = /v1/system/networking/switch-port-settings
versions = all starting from 2026021301.0.0
|
| 2779 | 2026-03-09T10:56:12.294Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = POST
path = /v1/system/networking/switch-port-settings
versions = all ending with 2026021301.0.0
|
| 2780 | 2026-03-09T10:56:12.294Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = GET
path = /v1/system/networking/switch-port-settings/{port}
versions = all starting from 2026021301.0.0
|
| 2781 | 2026-03-09T10:56:12.294Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = GET
path = /v1/system/networking/switch-port-settings/{port}
versions = all ending with 2026021301.0.0
|
| 2782 | 2026-03-09T10:56:12.294Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = GET
path = /v1/system/policy
versions = all
|
| 2783 | 2026-03-09T10:56:12.294Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = PUT
path = /v1/system/policy
versions = all
|
| 2784 | 2026-03-09T10:56:12.294Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = GET
path = /v1/system/scim/tokens
versions = all
|
| 2785 | 2026-03-09T10:56:12.294Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = POST
path = /v1/system/scim/tokens
versions = all
|
| 2786 | 2026-03-09T10:56:12.294Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = DELETE
path = /v1/system/scim/tokens/{token_id}
versions = all
|
| 2787 | 2026-03-09T10:56:12.294Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = GET
path = /v1/system/scim/tokens/{token_id}
versions = all
|
| 2788 | 2026-03-09T10:56:12.294Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = GET
path = /v1/system/silo-quotas
versions = all
|
| 2789 | 2026-03-09T10:56:12.294Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = GET
path = /v1/system/silos
versions = all
|
| 2790 | 2026-03-09T10:56:12.295Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = POST
path = /v1/system/silos
versions = all
|
| 2791 | 2026-03-09T10:56:12.295Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = DELETE
path = /v1/system/silos/{silo}
versions = all
|
| 2792 | 2026-03-09T10:56:12.295Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = GET
path = /v1/system/silos/{silo}
versions = all
|
| 2793 | 2026-03-09T10:56:12.295Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = GET
path = /v1/system/silos/{silo}/ip-pools
versions = all starting from 2026010100.0.0
|
| 2794 | 2026-03-09T10:56:12.295Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = GET
path = /v1/system/silos/{silo}/ip-pools
versions = all ending with 2026010100.0.0
|
| 2795 | 2026-03-09T10:56:12.295Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = GET
path = /v1/system/silos/{silo}/policy
versions = all
|
| 2796 | 2026-03-09T10:56:12.295Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = PUT
path = /v1/system/silos/{silo}/policy
versions = all
|
| 2797 | 2026-03-09T10:56:12.295Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = GET
path = /v1/system/silos/{silo}/quotas
versions = all
|
| 2798 | 2026-03-09T10:56:12.295Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = PUT
path = /v1/system/silos/{silo}/quotas
versions = all
|
| 2799 | 2026-03-09T10:56:12.295Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = GET
path = /v1/system/silos/{silo}/subnet-pools
versions = all starting from 2026020600.0.0
|
| 2800 | 2026-03-09T10:56:12.295Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = GET
path = /v1/system/subnet-pools
versions = all starting from 2026020900.0.0
|
| 2801 | 2026-03-09T10:56:12.295Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = GET
path = /v1/system/subnet-pools
versions = from 2026012800.0.0 to 2026020900.0.0
|
| 2802 | 2026-03-09T10:56:12.295Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = GET
path = /v1/system/subnet-pools
versions = from 2026011601.0.0 to 2026012800.0.0
|
| 2803 | 2026-03-09T10:56:12.295Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = POST
path = /v1/system/subnet-pools
versions = all starting from 2026020900.0.0
|
| 2804 | 2026-03-09T10:56:12.295Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = POST
path = /v1/system/subnet-pools
versions = from 2026012800.0.0 to 2026020900.0.0
|
| 2805 | 2026-03-09T10:56:12.295Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = POST
path = /v1/system/subnet-pools
versions = from 2026012201.0.0 to 2026012800.0.0
|
| 2806 | 2026-03-09T10:56:12.295Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = POST
path = /v1/system/subnet-pools
versions = from 2026011601.0.0 to 2026012201.0.0
|
| 2807 | 2026-03-09T10:56:12.295Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = DELETE
path = /v1/system/subnet-pools/{pool}
versions = all starting from 2026020900.0.0
|
| 2808 | 2026-03-09T10:56:12.295Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = DELETE
path = /v1/system/subnet-pools/{pool}
versions = from 2026011601.0.0 to 2026020900.0.0
|
| 2809 | 2026-03-09T10:56:12.295Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = GET
path = /v1/system/subnet-pools/{pool}
versions = all starting from 2026020900.0.0
|
| 2810 | 2026-03-09T10:56:12.295Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = GET
path = /v1/system/subnet-pools/{pool}
versions = from 2026012800.0.0 to 2026020900.0.0
|
| 2811 | 2026-03-09T10:56:12.295Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = GET
path = /v1/system/subnet-pools/{pool}
versions = from 2026011601.0.0 to 2026012800.0.0
|
| 2812 | 2026-03-09T10:56:12.295Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = PUT
path = /v1/system/subnet-pools/{pool}
versions = all starting from 2026020900.0.0
|
| 2813 | 2026-03-09T10:56:12.295Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = PUT
path = /v1/system/subnet-pools/{pool}
versions = from 2026012800.0.0 to 2026020900.0.0
|
| 2814 | 2026-03-09T10:56:12.295Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = PUT
path = /v1/system/subnet-pools/{pool}
versions = from 2026011601.0.0 to 2026012800.0.0
|
| 2815 | 2026-03-09T10:56:12.295Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = GET
path = /v1/system/subnet-pools/{pool}/members
versions = all starting from 2026020900.0.0
|
| 2816 | 2026-03-09T10:56:12.295Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = GET
path = /v1/system/subnet-pools/{pool}/members
versions = from 2026012800.0.0 to 2026020900.0.0
|
| 2817 | 2026-03-09T10:56:12.295Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = GET
path = /v1/system/subnet-pools/{pool}/members
versions = from 2026011601.0.0 to 2026012800.0.0
|
| 2818 | 2026-03-09T10:56:12.295Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = POST
path = /v1/system/subnet-pools/{pool}/members/add
versions = all starting from 2026020900.0.0
|
| 2819 | 2026-03-09T10:56:12.295Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = POST
path = /v1/system/subnet-pools/{pool}/members/add
versions = from 2026012800.0.0 to 2026020900.0.0
|
| 2820 | 2026-03-09T10:56:12.295Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = POST
path = /v1/system/subnet-pools/{pool}/members/add
versions = from 2026012201.0.0 to 2026012800.0.0
|
| 2821 | 2026-03-09T10:56:12.295Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = POST
path = /v1/system/subnet-pools/{pool}/members/add
versions = from 2026011601.0.0 to 2026012201.0.0
|
| 2822 | 2026-03-09T10:56:12.295Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = POST
path = /v1/system/subnet-pools/{pool}/members/remove
versions = all starting from 2026020900.0.0
|
| 2823 | 2026-03-09T10:56:12.295Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = POST
path = /v1/system/subnet-pools/{pool}/members/remove
versions = from 2026011601.0.0 to 2026020900.0.0
|
| 2824 | 2026-03-09T10:56:12.295Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = GET
path = /v1/system/subnet-pools/{pool}/silos
versions = all starting from 2026020900.0.0
|
| 2825 | 2026-03-09T10:56:12.295Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = GET
path = /v1/system/subnet-pools/{pool}/silos
versions = from 2026011601.0.0 to 2026020900.0.0
|
| 2826 | 2026-03-09T10:56:12.296Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = POST
path = /v1/system/subnet-pools/{pool}/silos
versions = all starting from 2026020900.0.0
|
| 2827 | 2026-03-09T10:56:12.296Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = POST
path = /v1/system/subnet-pools/{pool}/silos
versions = from 2026011601.0.0 to 2026020900.0.0
|
| 2828 | 2026-03-09T10:56:12.296Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = DELETE
path = /v1/system/subnet-pools/{pool}/silos/{silo}
versions = all starting from 2026020900.0.0
|
| 2829 | 2026-03-09T10:56:12.296Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = DELETE
path = /v1/system/subnet-pools/{pool}/silos/{silo}
versions = from 2026011601.0.0 to 2026020900.0.0
|
| 2830 | 2026-03-09T10:56:12.296Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = PUT
path = /v1/system/subnet-pools/{pool}/silos/{silo}
versions = all starting from 2026020900.0.0
|
| 2831 | 2026-03-09T10:56:12.296Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = PUT
path = /v1/system/subnet-pools/{pool}/silos/{silo}
versions = from 2026011601.0.0 to 2026020900.0.0
|
| 2832 | 2026-03-09T10:56:12.296Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = GET
path = /v1/system/subnet-pools/{pool}/utilization
versions = all starting from 2026020900.0.0
|
| 2833 | 2026-03-09T10:56:12.296Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = GET
path = /v1/system/subnet-pools/{pool}/utilization
versions = from 2026011601.0.0 to 2026020900.0.0
|
| 2834 | 2026-03-09T10:56:12.296Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = POST
path = /v1/system/timeseries/query
versions = all
|
| 2835 | 2026-03-09T10:56:12.296Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = GET
path = /v1/system/timeseries/schemas
versions = all
|
| 2836 | 2026-03-09T10:56:12.296Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = PUT
path = /v1/system/update/recovery-finish
versions = all starting from 2026022500.0.0
|
| 2837 | 2026-03-09T10:56:12.296Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = GET
path = /v1/system/update/repositories
versions = all
|
| 2838 | 2026-03-09T10:56:12.296Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = PUT
path = /v1/system/update/repositories
versions = all
|
| 2839 | 2026-03-09T10:56:12.296Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = GET
path = /v1/system/update/repositories/{system_version}
versions = all
|
| 2840 | 2026-03-09T10:56:12.296Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = GET
path = /v1/system/update/status
versions = all
|
| 2841 | 2026-03-09T10:56:12.296Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = PUT
path = /v1/system/update/target-release
versions = all
|
| 2842 | 2026-03-09T10:56:12.296Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = GET
path = /v1/system/update/trust-roots
versions = all
|
| 2843 | 2026-03-09T10:56:12.296Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = POST
path = /v1/system/update/trust-roots
versions = all
|
| 2844 | 2026-03-09T10:56:12.296Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = DELETE
path = /v1/system/update/trust-roots/{trust_root_id}
versions = all
|
| 2845 | 2026-03-09T10:56:12.296Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = GET
path = /v1/system/update/trust-roots/{trust_root_id}
versions = all
|
| 2846 | 2026-03-09T10:56:12.296Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = GET
path = /v1/system/users
versions = all starting from 2026030200.0.0
|
| 2847 | 2026-03-09T10:56:12.296Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = GET
path = /v1/system/users
versions = all ending with 2026030200.0.0
|
| 2848 | 2026-03-09T10:56:12.296Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = GET
path = /v1/system/users/{user_id}
versions = all starting from 2026030200.0.0
|
| 2849 | 2026-03-09T10:56:12.296Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = GET
path = /v1/system/users/{user_id}
versions = all ending with 2026030200.0.0
|
| 2850 | 2026-03-09T10:56:12.296Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = GET
path = /v1/system/users-builtin
versions = all
|
| 2851 | 2026-03-09T10:56:12.296Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = GET
path = /v1/system/users-builtin/{user}
versions = all
|
| 2852 | 2026-03-09T10:56:12.296Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = GET
path = /v1/system/utilization/silos
versions = all
|
| 2853 | 2026-03-09T10:56:12.296Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = GET
path = /v1/system/utilization/silos/{silo}
versions = all
|
| 2854 | 2026-03-09T10:56:12.296Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = POST
path = /v1/timeseries/query
versions = all
|
| 2855 | 2026-03-09T10:56:12.296Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = GET
path = /v1/users
versions = all starting from 2026030200.0.0
|
| 2856 | 2026-03-09T10:56:12.296Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = GET
path = /v1/users
versions = all ending with 2026030200.0.0
|
| 2857 | 2026-03-09T10:56:12.296Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = GET
path = /v1/users/{user_id}
versions = all starting from 2026030200.0.0
|
| 2858 | 2026-03-09T10:56:12.296Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = GET
path = /v1/users/{user_id}
versions = all ending with 2026030200.0.0
|
| 2859 | 2026-03-09T10:56:12.296Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = GET
path = /v1/users/{user_id}/access-tokens
versions = all
|
| 2860 | 2026-03-09T10:56:12.296Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = POST
path = /v1/users/{user_id}/logout
versions = all
|
| 2861 | 2026-03-09T10:56:12.296Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = GET
path = /v1/users/{user_id}/sessions
versions = all
|
| 2862 | 2026-03-09T10:56:12.296Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = GET
path = /v1/utilization
versions = all
|
| 2863 | 2026-03-09T10:56:12.296Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = GET
path = /v1/vpc-firewall-rules
versions = all
|
| 2864 | 2026-03-09T10:56:12.296Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = PUT
path = /v1/vpc-firewall-rules
versions = all
|
| 2865 | 2026-03-09T10:56:12.296Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = GET
path = /v1/vpc-router-routes
versions = all
|
| 2866 | 2026-03-09T10:56:12.296Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = POST
path = /v1/vpc-router-routes
versions = all
|
| 2867 | 2026-03-09T10:56:12.297Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = DELETE
path = /v1/vpc-router-routes/{route}
versions = all
|
| 2868 | 2026-03-09T10:56:12.297Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = GET
path = /v1/vpc-router-routes/{route}
versions = all
|
| 2869 | 2026-03-09T10:56:12.297Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = PUT
path = /v1/vpc-router-routes/{route}
versions = all
|
| 2870 | 2026-03-09T10:56:12.297Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = GET
path = /v1/vpc-routers
versions = all
|
| 2871 | 2026-03-09T10:56:12.297Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = POST
path = /v1/vpc-routers
versions = all
|
| 2872 | 2026-03-09T10:56:12.297Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = DELETE
path = /v1/vpc-routers/{router}
versions = all
|
| 2873 | 2026-03-09T10:56:12.297Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = GET
path = /v1/vpc-routers/{router}
versions = all
|
| 2874 | 2026-03-09T10:56:12.297Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = PUT
path = /v1/vpc-routers/{router}
versions = all
|
| 2875 | 2026-03-09T10:56:12.297Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = GET
path = /v1/vpc-subnets
versions = all
|
| 2876 | 2026-03-09T10:56:12.297Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = POST
path = /v1/vpc-subnets
versions = all
|
| 2877 | 2026-03-09T10:56:12.297Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = DELETE
path = /v1/vpc-subnets/{subnet}
versions = all
|
| 2878 | 2026-03-09T10:56:12.297Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = GET
path = /v1/vpc-subnets/{subnet}
versions = all
|
| 2879 | 2026-03-09T10:56:12.297Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = PUT
path = /v1/vpc-subnets/{subnet}
versions = all
|
| 2880 | 2026-03-09T10:56:12.297Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = GET
path = /v1/vpc-subnets/{subnet}/network-interfaces
versions = all starting from 2026010300.0.0
|
| 2881 | 2026-03-09T10:56:12.297Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = GET
path = /v1/vpc-subnets/{subnet}/network-interfaces
versions = all ending with 2026010300.0.0
|
| 2882 | 2026-03-09T10:56:12.297Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = GET
path = /v1/vpcs
versions = all
|
| 2883 | 2026-03-09T10:56:12.297Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = POST
path = /v1/vpcs
versions = all
|
| 2884 | 2026-03-09T10:56:12.297Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = DELETE
path = /v1/vpcs/{vpc}
versions = all
|
| 2885 | 2026-03-09T10:56:12.297Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = GET
path = /v1/vpcs/{vpc}
versions = all
|
| 2886 | 2026-03-09T10:56:12.297Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = PUT
path = /v1/vpcs/{vpc}
versions = all
|
| 2887 | 2026-03-09T10:56:12.297Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = POST
path = /v1/webhook-receivers
versions = all
|
| 2888 | 2026-03-09T10:56:12.297Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = PUT
path = /v1/webhook-receivers/{receiver}
versions = all
|
| 2889 | 2026-03-09T10:56:12.297Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = GET
path = /v1/webhook-secrets
versions = all
|
| 2890 | 2026-03-09T10:56:12.297Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = POST
path = /v1/webhook-secrets
versions = all
|
| 2891 | 2026-03-09T10:56:12.297Z | DEBG | test_update_status (dropshot_external): registered endpoint
local_addr = 127.0.0.1:60487
method = DELETE
path = /v1/webhook-secrets/{secret_id}
versions = all
|
| 2892 | 2026-03-09T10:56:12.297Z | INFO | test_update_status (dropshot_external): listening
local_addr = 127.0.0.1:60487
|
| 2893 | 2026-03-09T10:56:12.297Z | DEBG | test_update_status (dropshot_external): successfully registered DTrace USDT probes
local_addr = 127.0.0.1:60487
|
| 2894 | 2026-03-09T10:56:12.332Z | DEBG | test_update_status (BackgroundTasks): begin collection from NTP admin (timesync)
background_task = inventory_collection
sled_agent_url = http://[::1]:10123
zone_id = 3b40ef3f-ae24-4403-b807-bddce17eba03 (omicron_zone)
|
| 2895 | 2026-03-09T10:56:12.332Z | DEBG | test_update_status (BackgroundTasks): client request
background_task = inventory_collection
body = None
method = GET
ntp_admin_url = http://[::1]:10123
uri = http://[::1]:10123/timesync
|
| 2896 | 2026-03-09T10:56:12.351Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = GET
path = /
versions = all
|
| 2897 | 2026-03-09T10:56:12.351Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = GET
path = /access
versions = all
|
| 2898 | 2026-03-09T10:56:12.351Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = GET
path = /assets/{path}
versions = all
|
| 2899 | 2026-03-09T10:56:12.351Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = POST
path = /device/auth
versions = all
|
| 2900 | 2026-03-09T10:56:12.351Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = POST
path = /device/confirm
versions = all
|
| 2901 | 2026-03-09T10:56:12.351Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = GET
path = /device/success
versions = all
|
| 2902 | 2026-03-09T10:56:12.351Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = POST
path = /device/token
versions = all
|
| 2903 | 2026-03-09T10:56:12.351Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = GET
path = /device/verify
versions = all
|
| 2904 | 2026-03-09T10:56:12.351Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = GET
path = /experimental/v1/probes
versions = all starting from 2026010300.0.0
|
| 2905 | 2026-03-09T10:56:12.351Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = GET
path = /experimental/v1/probes
versions = all ending with 2026010300.0.0
|
| 2906 | 2026-03-09T10:56:12.351Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = POST
path = /experimental/v1/probes
versions = all starting from 2026010500.0.0
|
| 2907 | 2026-03-09T10:56:12.351Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = POST
path = /experimental/v1/probes
versions = all ending with 2026010500.0.0
|
| 2908 | 2026-03-09T10:56:12.351Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = DELETE
path = /experimental/v1/probes/{probe}
versions = all
|
| 2909 | 2026-03-09T10:56:12.351Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = GET
path = /experimental/v1/probes/{probe}
versions = all starting from 2026010300.0.0
|
| 2910 | 2026-03-09T10:56:12.351Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = GET
path = /experimental/v1/probes/{probe}
versions = all ending with 2026010300.0.0
|
| 2911 | 2026-03-09T10:56:12.351Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = GET
path = /experimental/v1/system/support-bundles
versions = all
|
| 2912 | 2026-03-09T10:56:12.351Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = POST
path = /experimental/v1/system/support-bundles
versions = all
|
| 2913 | 2026-03-09T10:56:12.351Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = DELETE
path = /experimental/v1/system/support-bundles/{bundle_id}
versions = all
|
| 2914 | 2026-03-09T10:56:12.351Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = GET
path = /experimental/v1/system/support-bundles/{bundle_id}
versions = all
|
| 2915 | 2026-03-09T10:56:12.351Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = PUT
path = /experimental/v1/system/support-bundles/{bundle_id}
versions = all
|
| 2916 | 2026-03-09T10:56:12.351Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = GET
path = /experimental/v1/system/support-bundles/{bundle_id}/download
versions = all
|
| 2917 | 2026-03-09T10:56:12.351Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = HEAD
path = /experimental/v1/system/support-bundles/{bundle_id}/download
versions = all
|
| 2918 | 2026-03-09T10:56:12.351Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = GET
path = /experimental/v1/system/support-bundles/{bundle_id}/download/{file}
versions = all
|
| 2919 | 2026-03-09T10:56:12.351Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = HEAD
path = /experimental/v1/system/support-bundles/{bundle_id}/download/{file}
versions = all
|
| 2920 | 2026-03-09T10:56:12.351Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = GET
path = /experimental/v1/system/support-bundles/{bundle_id}/index
versions = all
|
| 2921 | 2026-03-09T10:56:12.352Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = GET
path = /images
versions = all
|
| 2922 | 2026-03-09T10:56:12.352Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = GET
path = /login
versions = all
|
| 2923 | 2026-03-09T10:56:12.352Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = GET
path = /login/{silo_name}/local
versions = all
|
| 2924 | 2026-03-09T10:56:12.352Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = GET
path = /login/{silo_name}/saml/{provider_name}
versions = all
|
| 2925 | 2026-03-09T10:56:12.352Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = POST
path = /login/{silo_name}/saml/{provider_name}
versions = all
|
| 2926 | 2026-03-09T10:56:12.352Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = GET
path = /login/{silo_name}/saml/{provider_name}/redirect
versions = all
|
| 2927 | 2026-03-09T10:56:12.352Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = GET
path = /lookup/{path}
versions = all
|
| 2928 | 2026-03-09T10:56:12.352Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = GET
path = /projects/{path}
versions = all
|
| 2929 | 2026-03-09T10:56:12.352Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = GET
path = /projects-new
versions = all
|
| 2930 | 2026-03-09T10:56:12.352Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = GET
path = /scim/v2/Groups
versions = all
|
| 2931 | 2026-03-09T10:56:12.352Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = POST
path = /scim/v2/Groups
versions = all
|
| 2932 | 2026-03-09T10:56:12.352Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = DELETE
path = /scim/v2/Groups/{group_id}
versions = all
|
| 2933 | 2026-03-09T10:56:12.352Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = GET
path = /scim/v2/Groups/{group_id}
versions = all
|
| 2934 | 2026-03-09T10:56:12.352Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = PATCH
path = /scim/v2/Groups/{group_id}
versions = all
|
| 2935 | 2026-03-09T10:56:12.352Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = PUT
path = /scim/v2/Groups/{group_id}
versions = all
|
| 2936 | 2026-03-09T10:56:12.352Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = GET
path = /scim/v2/Users
versions = all
|
| 2937 | 2026-03-09T10:56:12.352Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = POST
path = /scim/v2/Users
versions = all
|
| 2938 | 2026-03-09T10:56:12.354Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = DELETE
path = /scim/v2/Users/{user_id}
versions = all
|
| 2939 | 2026-03-09T10:56:12.355Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = GET
path = /scim/v2/Users/{user_id}
versions = all
|
| 2940 | 2026-03-09T10:56:12.355Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = PATCH
path = /scim/v2/Users/{user_id}
versions = all
|
| 2941 | 2026-03-09T10:56:12.355Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = PUT
path = /scim/v2/Users/{user_id}
versions = all
|
| 2942 | 2026-03-09T10:56:12.355Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = GET
path = /settings/{path}
versions = all
|
| 2943 | 2026-03-09T10:56:12.355Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = GET
path = /system/{path}
versions = all
|
| 2944 | 2026-03-09T10:56:12.355Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = GET
path = /utilization
versions = all
|
| 2945 | 2026-03-09T10:56:12.355Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = GET
path = /v1/affinity-groups
versions = all
|
| 2946 | 2026-03-09T10:56:12.355Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = POST
path = /v1/affinity-groups
versions = all
|
| 2947 | 2026-03-09T10:56:12.355Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = DELETE
path = /v1/affinity-groups/{affinity_group}
versions = all
|
| 2948 | 2026-03-09T10:56:12.355Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = GET
path = /v1/affinity-groups/{affinity_group}
versions = all
|
| 2949 | 2026-03-09T10:56:12.355Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = PUT
path = /v1/affinity-groups/{affinity_group}
versions = all
|
| 2950 | 2026-03-09T10:56:12.355Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = GET
path = /v1/affinity-groups/{affinity_group}/members
versions = all
|
| 2951 | 2026-03-09T10:56:12.355Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = DELETE
path = /v1/affinity-groups/{affinity_group}/members/instance/{instance}
versions = all
|
| 2952 | 2026-03-09T10:56:12.355Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = GET
path = /v1/affinity-groups/{affinity_group}/members/instance/{instance}
versions = all
|
| 2953 | 2026-03-09T10:56:12.355Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = POST
path = /v1/affinity-groups/{affinity_group}/members/instance/{instance}
versions = all
|
| 2954 | 2026-03-09T10:56:12.355Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = GET
path = /v1/alert-classes
versions = all
|
| 2955 | 2026-03-09T10:56:12.355Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = GET
path = /v1/alert-receivers
versions = all
|
| 2956 | 2026-03-09T10:56:12.355Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = DELETE
path = /v1/alert-receivers/{receiver}
versions = all
|
| 2957 | 2026-03-09T10:56:12.355Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = GET
path = /v1/alert-receivers/{receiver}
versions = all
|
| 2958 | 2026-03-09T10:56:12.355Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = GET
path = /v1/alert-receivers/{receiver}/deliveries
versions = all
|
| 2959 | 2026-03-09T10:56:12.355Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = POST
path = /v1/alert-receivers/{receiver}/probe
versions = all
|
| 2960 | 2026-03-09T10:56:12.355Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = POST
path = /v1/alert-receivers/{receiver}/subscriptions
versions = all
|
| 2961 | 2026-03-09T10:56:12.355Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = DELETE
path = /v1/alert-receivers/{receiver}/subscriptions/{subscription}
versions = all
|
| 2962 | 2026-03-09T10:56:12.355Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = POST
path = /v1/alerts/{alert_id}/resend
versions = all
|
| 2963 | 2026-03-09T10:56:12.355Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = GET
path = /v1/anti-affinity-groups
versions = all
|
| 2964 | 2026-03-09T10:56:12.355Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = POST
path = /v1/anti-affinity-groups
versions = all
|
| 2965 | 2026-03-09T10:56:12.355Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = DELETE
path = /v1/anti-affinity-groups/{anti_affinity_group}
versions = all
|
| 2966 | 2026-03-09T10:56:12.355Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = GET
path = /v1/anti-affinity-groups/{anti_affinity_group}
versions = all
|
| 2967 | 2026-03-09T10:56:12.355Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = PUT
path = /v1/anti-affinity-groups/{anti_affinity_group}
versions = all
|
| 2968 | 2026-03-09T10:56:12.355Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = GET
path = /v1/anti-affinity-groups/{anti_affinity_group}/members
versions = all
|
| 2969 | 2026-03-09T10:56:12.355Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = DELETE
path = /v1/anti-affinity-groups/{anti_affinity_group}/members/instance/{instance}
versions = all
|
| 2970 | 2026-03-09T10:56:12.355Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = GET
path = /v1/anti-affinity-groups/{anti_affinity_group}/members/instance/{instance}
versions = all
|
| 2971 | 2026-03-09T10:56:12.355Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = POST
path = /v1/anti-affinity-groups/{anti_affinity_group}/members/instance/{instance}
versions = all
|
| 2972 | 2026-03-09T10:56:12.355Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = GET
path = /v1/auth-settings
versions = all
|
| 2973 | 2026-03-09T10:56:12.355Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = PUT
path = /v1/auth-settings
versions = all
|
| 2974 | 2026-03-09T10:56:12.355Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = GET
path = /v1/certificates
versions = all
|
| 2975 | 2026-03-09T10:56:12.355Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = POST
path = /v1/certificates
versions = all
|
| 2976 | 2026-03-09T10:56:12.355Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = DELETE
path = /v1/certificates/{certificate}
versions = all
|
| 2977 | 2026-03-09T10:56:12.355Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = GET
path = /v1/certificates/{certificate}
versions = all
|
| 2978 | 2026-03-09T10:56:12.355Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = GET
path = /v1/disks
versions = all starting from 2026013001.0.0
|
| 2979 | 2026-03-09T10:56:12.355Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = GET
path = /v1/disks
versions = from 2025120300.0.0 to 2026013001.0.0
|
| 2980 | 2026-03-09T10:56:12.355Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = GET
path = /v1/disks
versions = all ending with 2025120300.0.0
|
| 2981 | 2026-03-09T10:56:12.355Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = POST
path = /v1/disks
versions = all starting from 2026013100.0.0
|
| 2982 | 2026-03-09T10:56:12.356Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = POST
path = /v1/disks
versions = from 2026013001.0.0 to 2026013100.0.0
|
| 2983 | 2026-03-09T10:56:12.356Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = POST
path = /v1/disks
versions = from 2025120300.0.0 to 2026013001.0.0
|
| 2984 | 2026-03-09T10:56:12.356Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = POST
path = /v1/disks
versions = all ending with 2025120300.0.0
|
| 2985 | 2026-03-09T10:56:12.356Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = DELETE
path = /v1/disks/{disk}
versions = all
|
| 2986 | 2026-03-09T10:56:12.356Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = GET
path = /v1/disks/{disk}
versions = all starting from 2026013001.0.0
|
| 2987 | 2026-03-09T10:56:12.356Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = GET
path = /v1/disks/{disk}
versions = from 2025120300.0.0 to 2026013001.0.0
|
| 2988 | 2026-03-09T10:56:12.356Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = GET
path = /v1/disks/{disk}
versions = all ending with 2025120300.0.0
|
| 2989 | 2026-03-09T10:56:12.356Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = POST
path = /v1/disks/{disk}/bulk-write
versions = all
|
| 2990 | 2026-03-09T10:56:12.356Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = POST
path = /v1/disks/{disk}/bulk-write-start
versions = all
|
| 2991 | 2026-03-09T10:56:12.356Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = POST
path = /v1/disks/{disk}/bulk-write-stop
versions = all
|
| 2992 | 2026-03-09T10:56:12.356Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = POST
path = /v1/disks/{disk}/finalize
versions = all
|
| 2993 | 2026-03-09T10:56:12.356Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = GET
path = /v1/external-subnets
versions = all starting from 2026011601.0.0
|
| 2994 | 2026-03-09T10:56:12.356Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = POST
path = /v1/external-subnets
versions = all starting from 2026012201.0.0
|
| 2995 | 2026-03-09T10:56:12.356Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = POST
path = /v1/external-subnets
versions = from 2026011601.0.0 to 2026012201.0.0
|
| 2996 | 2026-03-09T10:56:12.356Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = DELETE
path = /v1/external-subnets/{external_subnet}
versions = all starting from 2026011601.0.0
|
| 2997 | 2026-03-09T10:56:12.356Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = GET
path = /v1/external-subnets/{external_subnet}
versions = all starting from 2026011601.0.0
|
| 2998 | 2026-03-09T10:56:12.356Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = PUT
path = /v1/external-subnets/{external_subnet}
versions = all starting from 2026011601.0.0
|
| 2999 | 2026-03-09T10:56:12.356Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = POST
path = /v1/external-subnets/{external_subnet}/attach
versions = all starting from 2026011601.0.0
|
| 3000 | 2026-03-09T10:56:12.356Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = POST
path = /v1/external-subnets/{external_subnet}/detach
versions = all starting from 2026011601.0.0
|
| 3001 | 2026-03-09T10:56:12.356Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = GET
path = /v1/floating-ips
versions = all
|
| 3002 | 2026-03-09T10:56:12.356Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = POST
path = /v1/floating-ips
versions = all starting from 2026012200.0.0
|
| 3003 | 2026-03-09T10:56:12.356Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = POST
path = /v1/floating-ips
versions = from 2026011600.0.0 to 2026012200.0.0
|
| 3004 | 2026-03-09T10:56:12.356Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = POST
path = /v1/floating-ips
versions = from 2026010500.0.0 to 2026011600.0.0
|
| 3005 | 2026-03-09T10:56:12.356Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = POST
path = /v1/floating-ips
versions = from 2025122300.0.0 to 2026010500.0.0
|
| 3006 | 2026-03-09T10:56:12.356Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = POST
path = /v1/floating-ips
versions = all ending with 2025122300.0.0
|
| 3007 | 2026-03-09T10:56:12.356Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = DELETE
path = /v1/floating-ips/{floating_ip}
versions = all
|
| 3008 | 2026-03-09T10:56:12.356Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = GET
path = /v1/floating-ips/{floating_ip}
versions = all
|
| 3009 | 2026-03-09T10:56:12.356Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = PUT
path = /v1/floating-ips/{floating_ip}
versions = all
|
| 3010 | 2026-03-09T10:56:12.356Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = POST
path = /v1/floating-ips/{floating_ip}/attach
versions = all
|
| 3011 | 2026-03-09T10:56:12.356Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = POST
path = /v1/floating-ips/{floating_ip}/detach
versions = all
|
| 3012 | 2026-03-09T10:56:12.356Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = GET
path = /v1/groups
versions = all starting from 2026030200.0.0
|
| 3013 | 2026-03-09T10:56:12.356Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = GET
path = /v1/groups
versions = all ending with 2026030200.0.0
|
| 3014 | 2026-03-09T10:56:12.356Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = GET
path = /v1/groups/{group_id}
versions = all starting from 2026030200.0.0
|
| 3015 | 2026-03-09T10:56:12.356Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = GET
path = /v1/groups/{group_id}
versions = all ending with 2026030200.0.0
|
| 3016 | 2026-03-09T10:56:12.356Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = GET
path = /v1/images
versions = all
|
| 3017 | 2026-03-09T10:56:12.356Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = POST
path = /v1/images
versions = all
|
| 3018 | 2026-03-09T10:56:12.356Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = DELETE
path = /v1/images/{image}
versions = all
|
| 3019 | 2026-03-09T10:56:12.356Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = GET
path = /v1/images/{image}
versions = all
|
| 3020 | 2026-03-09T10:56:12.356Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = POST
path = /v1/images/{image}/demote
versions = all
|
| 3021 | 2026-03-09T10:56:12.356Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = POST
path = /v1/images/{image}/promote
versions = all
|
| 3022 | 2026-03-09T10:56:12.356Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = GET
path = /v1/instances
versions = all
|
| 3023 | 2026-03-09T10:56:12.356Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = POST
path = /v1/instances
versions = all starting from 2026013100.0.0
|
| 3024 | 2026-03-09T10:56:12.356Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = POST
path = /v1/instances
versions = from 2026013001.0.0 to 2026013100.0.0
|
| 3025 | 2026-03-09T10:56:12.356Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = POST
path = /v1/instances
versions = from 2026010800.0.0 to 2026013001.0.0
|
| 3026 | 2026-03-09T10:56:12.356Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = POST
path = /v1/instances
versions = from 2026010500.0.0 to 2026010800.0.0
|
| 3027 | 2026-03-09T10:56:12.356Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = POST
path = /v1/instances
versions = from 2026010300.0.0 to 2026010500.0.0
|
| 3028 | 2026-03-09T10:56:12.357Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = POST
path = /v1/instances
versions = from 2025122300.0.0 to 2026010300.0.0
|
| 3029 | 2026-03-09T10:56:12.357Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = POST
path = /v1/instances
versions = from 2025120300.0.0 to 2025122300.0.0
|
| 3030 | 2026-03-09T10:56:12.357Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = POST
path = /v1/instances
versions = all ending with 2025120300.0.0
|
| 3031 | 2026-03-09T10:56:12.357Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = DELETE
path = /v1/instances/{instance}
versions = all
|
| 3032 | 2026-03-09T10:56:12.357Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = GET
path = /v1/instances/{instance}
versions = all
|
| 3033 | 2026-03-09T10:56:12.357Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = PUT
path = /v1/instances/{instance}
versions = all starting from 2026010800.0.0
|
| 3034 | 2026-03-09T10:56:12.357Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = PUT
path = /v1/instances/{instance}
versions = all ending with 2026010800.0.0
|
| 3035 | 2026-03-09T10:56:12.357Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = GET
path = /v1/instances/{instance}/affinity-groups
versions = all
|
| 3036 | 2026-03-09T10:56:12.357Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = GET
path = /v1/instances/{instance}/anti-affinity-groups
versions = all
|
| 3037 | 2026-03-09T10:56:12.357Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = GET
path = /v1/instances/{instance}/disks
versions = all starting from 2026013001.0.0
|
| 3038 | 2026-03-09T10:56:12.357Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = GET
path = /v1/instances/{instance}/disks
versions = from 2025120300.0.0 to 2026013001.0.0
|
| 3039 | 2026-03-09T10:56:12.357Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = GET
path = /v1/instances/{instance}/disks
versions = all ending with 2025120300.0.0
|
| 3040 | 2026-03-09T10:56:12.357Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = POST
path = /v1/instances/{instance}/disks/attach
versions = all starting from 2026013001.0.0
|
| 3041 | 2026-03-09T10:56:12.357Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = POST
path = /v1/instances/{instance}/disks/attach
versions = from 2025120300.0.0 to 2026013001.0.0
|
| 3042 | 2026-03-09T10:56:12.357Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = POST
path = /v1/instances/{instance}/disks/attach
versions = all ending with 2025120300.0.0
|
| 3043 | 2026-03-09T10:56:12.357Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = POST
path = /v1/instances/{instance}/disks/detach
versions = all starting from 2026013001.0.0
|
| 3044 | 2026-03-09T10:56:12.357Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = POST
path = /v1/instances/{instance}/disks/detach
versions = from 2025120300.0.0 to 2026013001.0.0
|
| 3045 | 2026-03-09T10:56:12.357Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = POST
path = /v1/instances/{instance}/disks/detach
versions = all ending with 2025120300.0.0
|
| 3046 | 2026-03-09T10:56:12.357Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = GET
path = /v1/instances/{instance}/external-ips
versions = all
|
| 3047 | 2026-03-09T10:56:12.357Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = DELETE
path = /v1/instances/{instance}/external-ips/ephemeral
versions = all starting from 2026012300.0.0
|
| 3048 | 2026-03-09T10:56:12.357Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = DELETE
path = /v1/instances/{instance}/external-ips/ephemeral
versions = all ending with 2026012300.0.0
|
| 3049 | 2026-03-09T10:56:12.357Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = POST
path = /v1/instances/{instance}/external-ips/ephemeral
versions = all starting from 2026010500.0.0
|
| 3050 | 2026-03-09T10:56:12.357Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = POST
path = /v1/instances/{instance}/external-ips/ephemeral
versions = from 2025122300.0.0 to 2026010500.0.0
|
| 3051 | 2026-03-09T10:56:12.357Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = POST
path = /v1/instances/{instance}/external-ips/ephemeral
versions = all ending with 2025122300.0.0
|
| 3052 | 2026-03-09T10:56:12.357Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = GET
path = /v1/instances/{instance}/external-subnets
versions = all starting from 2026013000.0.0
|
| 3053 | 2026-03-09T10:56:12.357Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = GET
path = /v1/instances/{instance}/multicast-groups
versions = all starting from 2026010800.0.0
|
| 3054 | 2026-03-09T10:56:12.357Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = GET
path = /v1/instances/{instance}/multicast-groups
versions = all ending with 2026010800.0.0
|
| 3055 | 2026-03-09T10:56:12.357Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = DELETE
path = /v1/instances/{instance}/multicast-groups/{multicast_group}
versions = all starting from 2026010800.0.0
|
| 3056 | 2026-03-09T10:56:12.357Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = DELETE
path = /v1/instances/{instance}/multicast-groups/{multicast_group}
versions = all ending with 2026010800.0.0
|
| 3057 | 2026-03-09T10:56:12.357Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = PUT
path = /v1/instances/{instance}/multicast-groups/{multicast_group}
versions = all starting from 2026010800.0.0
|
| 3058 | 2026-03-09T10:56:12.357Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = PUT
path = /v1/instances/{instance}/multicast-groups/{multicast_group}
versions = all ending with 2026010800.0.0
|
| 3059 | 2026-03-09T10:56:12.357Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = POST
path = /v1/instances/{instance}/reboot
versions = all
|
| 3060 | 2026-03-09T10:56:12.357Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = GET
path = /v1/instances/{instance}/serial-console
versions = all
|
| 3061 | 2026-03-09T10:56:12.357Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = GET
path = /v1/instances/{instance}/serial-console/stream
versions = all
|
| 3062 | 2026-03-09T10:56:12.357Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = GET
path = /v1/instances/{instance}/ssh-public-keys
versions = all
|
| 3063 | 2026-03-09T10:56:12.357Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = POST
path = /v1/instances/{instance}/start
versions = all
|
| 3064 | 2026-03-09T10:56:12.357Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = POST
path = /v1/instances/{instance}/stop
versions = all
|
| 3065 | 2026-03-09T10:56:12.358Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = GET
path = /v1/internet-gateway-ip-addresses
versions = all
|
| 3066 | 2026-03-09T10:56:12.358Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = POST
path = /v1/internet-gateway-ip-addresses
versions = all
|
| 3067 | 2026-03-09T10:56:12.358Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = DELETE
path = /v1/internet-gateway-ip-addresses/{address}
versions = all
|
| 3068 | 2026-03-09T10:56:12.358Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = GET
path = /v1/internet-gateway-ip-pools
versions = all
|
| 3069 | 2026-03-09T10:56:12.358Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = POST
path = /v1/internet-gateway-ip-pools
versions = all
|
| 3070 | 2026-03-09T10:56:12.358Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = DELETE
path = /v1/internet-gateway-ip-pools/{pool}
versions = all
|
| 3071 | 2026-03-09T10:56:12.358Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = GET
path = /v1/internet-gateways
versions = all
|
| 3072 | 2026-03-09T10:56:12.358Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = POST
path = /v1/internet-gateways
versions = all
|
| 3073 | 2026-03-09T10:56:12.358Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = DELETE
path = /v1/internet-gateways/{gateway}
versions = all
|
| 3074 | 2026-03-09T10:56:12.358Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = GET
path = /v1/internet-gateways/{gateway}
versions = all
|
| 3075 | 2026-03-09T10:56:12.358Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = GET
path = /v1/ip-pools
versions = all starting from 2026020900.0.0
|
| 3076 | 2026-03-09T10:56:12.358Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = GET
path = /v1/ip-pools
versions = from 2026010100.0.0 to 2026020900.0.0
|
| 3077 | 2026-03-09T10:56:12.358Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = GET
path = /v1/ip-pools
versions = all ending with 2026010100.0.0
|
| 3078 | 2026-03-09T10:56:12.358Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = GET
path = /v1/ip-pools/{pool}
versions = all starting from 2026020900.0.0
|
| 3079 | 2026-03-09T10:56:12.358Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = GET
path = /v1/ip-pools/{pool}
versions = from 2026010100.0.0 to 2026020900.0.0
|
| 3080 | 2026-03-09T10:56:12.358Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = GET
path = /v1/ip-pools/{pool}
versions = all ending with 2026010100.0.0
|
| 3081 | 2026-03-09T10:56:12.358Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = POST
path = /v1/login/{silo_name}/local
versions = all
|
| 3082 | 2026-03-09T10:56:12.358Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = POST
path = /v1/logout
versions = all
|
| 3083 | 2026-03-09T10:56:12.358Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = GET
path = /v1/me
versions = all starting from 2026030200.0.0
|
| 3084 | 2026-03-09T10:56:12.358Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = GET
path = /v1/me
versions = all ending with 2026030200.0.0
|
| 3085 | 2026-03-09T10:56:12.358Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = GET
path = /v1/me/access-tokens
versions = all
|
| 3086 | 2026-03-09T10:56:12.358Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = DELETE
path = /v1/me/access-tokens/{token_id}
versions = all
|
| 3087 | 2026-03-09T10:56:12.358Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = GET
path = /v1/me/groups
versions = all starting from 2026030200.0.0
|
| 3088 | 2026-03-09T10:56:12.358Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = GET
path = /v1/me/groups
versions = all ending with 2026030200.0.0
|
| 3089 | 2026-03-09T10:56:12.358Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = GET
path = /v1/me/ssh-keys
versions = all
|
| 3090 | 2026-03-09T10:56:12.358Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = POST
path = /v1/me/ssh-keys
versions = all
|
| 3091 | 2026-03-09T10:56:12.358Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = DELETE
path = /v1/me/ssh-keys/{ssh_key}
versions = all
|
| 3092 | 2026-03-09T10:56:12.358Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = GET
path = /v1/me/ssh-keys/{ssh_key}
versions = all
|
| 3093 | 2026-03-09T10:56:12.358Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = GET
path = /v1/metrics/{metric_name}
versions = all
|
| 3094 | 2026-03-09T10:56:12.358Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = GET
path = /v1/multicast-groups
versions = all starting from 2026010800.0.0
|
| 3095 | 2026-03-09T10:56:12.358Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = GET
path = /v1/multicast-groups
versions = all ending with 2026010800.0.0
|
| 3096 | 2026-03-09T10:56:12.358Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = POST
path = /v1/multicast-groups
versions = all ending with 2026010800.0.0
|
| 3097 | 2026-03-09T10:56:12.358Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = DELETE
path = /v1/multicast-groups/{multicast_group}
versions = all ending with 2026010800.0.0
|
| 3098 | 2026-03-09T10:56:12.358Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = GET
path = /v1/multicast-groups/{multicast_group}
versions = all starting from 2026010800.0.0
|
| 3099 | 2026-03-09T10:56:12.358Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = GET
path = /v1/multicast-groups/{multicast_group}
versions = all ending with 2026010800.0.0
|
| 3100 | 2026-03-09T10:56:12.358Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = PUT
path = /v1/multicast-groups/{multicast_group}
versions = all ending with 2026010800.0.0
|
| 3101 | 2026-03-09T10:56:12.358Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = GET
path = /v1/multicast-groups/{multicast_group}/members
versions = all starting from 2026010800.0.0
|
| 3102 | 2026-03-09T10:56:12.358Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = GET
path = /v1/multicast-groups/{multicast_group}/members
versions = all ending with 2026010800.0.0
|
| 3103 | 2026-03-09T10:56:12.358Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = POST
path = /v1/multicast-groups/{multicast_group}/members
versions = all ending with 2026010800.0.0
|
| 3104 | 2026-03-09T10:56:12.358Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = DELETE
path = /v1/multicast-groups/{multicast_group}/members/{instance}
versions = all ending with 2026010800.0.0
|
| 3105 | 2026-03-09T10:56:12.358Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = GET
path = /v1/network-interfaces
versions = all starting from 2026010300.0.0
|
| 3106 | 2026-03-09T10:56:12.358Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = GET
path = /v1/network-interfaces
versions = all ending with 2026010300.0.0
|
| 3107 | 2026-03-09T10:56:12.358Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = POST
path = /v1/network-interfaces
versions = all starting from 2026010300.0.0
|
| 3108 | 2026-03-09T10:56:12.358Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = POST
path = /v1/network-interfaces
versions = all ending with 2026010300.0.0
|
| 3109 | 2026-03-09T10:56:12.358Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = DELETE
path = /v1/network-interfaces/{interface}
versions = all
|
| 3110 | 2026-03-09T10:56:12.358Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = GET
path = /v1/network-interfaces/{interface}
versions = all starting from 2026010300.0.0
|
| 3111 | 2026-03-09T10:56:12.358Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = GET
path = /v1/network-interfaces/{interface}
versions = all ending with 2026010300.0.0
|
| 3112 | 2026-03-09T10:56:12.358Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = PUT
path = /v1/network-interfaces/{interface}
versions = all starting from 2026010300.0.0
|
| 3113 | 2026-03-09T10:56:12.358Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = PUT
path = /v1/network-interfaces/{interface}
versions = all ending with 2026010300.0.0
|
| 3114 | 2026-03-09T10:56:12.358Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = GET
path = /v1/ping
versions = all
|
| 3115 | 2026-03-09T10:56:12.359Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = GET
path = /v1/policy
versions = all
|
| 3116 | 2026-03-09T10:56:12.359Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = PUT
path = /v1/policy
versions = all
|
| 3117 | 2026-03-09T10:56:12.359Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = GET
path = /v1/projects
versions = all
|
| 3118 | 2026-03-09T10:56:12.359Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = POST
path = /v1/projects
versions = all
|
| 3119 | 2026-03-09T10:56:12.359Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = DELETE
path = /v1/projects/{project}
versions = all
|
| 3120 | 2026-03-09T10:56:12.359Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = GET
path = /v1/projects/{project}
versions = all
|
| 3121 | 2026-03-09T10:56:12.359Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = PUT
path = /v1/projects/{project}
versions = all
|
| 3122 | 2026-03-09T10:56:12.359Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = GET
path = /v1/projects/{project}/policy
versions = all
|
| 3123 | 2026-03-09T10:56:12.359Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = PUT
path = /v1/projects/{project}/policy
versions = all
|
| 3124 | 2026-03-09T10:56:12.359Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = GET
path = /v1/snapshots
versions = all
|
| 3125 | 2026-03-09T10:56:12.359Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = POST
path = /v1/snapshots
versions = all
|
| 3126 | 2026-03-09T10:56:12.359Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = DELETE
path = /v1/snapshots/{snapshot}
versions = all
|
| 3127 | 2026-03-09T10:56:12.359Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = GET
path = /v1/snapshots/{snapshot}
versions = all
|
| 3128 | 2026-03-09T10:56:12.359Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = GET
path = /v1/subnet-pools
versions = all starting from 2026020900.0.0
|
| 3129 | 2026-03-09T10:56:12.359Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = GET
path = /v1/subnet-pools
versions = from 2026020600.0.0 to 2026020900.0.0
|
| 3130 | 2026-03-09T10:56:12.359Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = GET
path = /v1/subnet-pools/{pool}
versions = all starting from 2026020900.0.0
|
| 3131 | 2026-03-09T10:56:12.359Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = GET
path = /v1/system/audit-log
versions = all
|
| 3132 | 2026-03-09T10:56:12.359Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = GET
path = /v1/system/hardware/disks
versions = all
|
| 3133 | 2026-03-09T10:56:12.359Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = GET
path = /v1/system/hardware/disks/{disk_id}
versions = all
|
| 3134 | 2026-03-09T10:56:12.359Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = GET
path = /v1/system/hardware/rack-switch-port/{rack_id}/{switch_location}/{port}/lldp/neighbors
versions = all
|
| 3135 | 2026-03-09T10:56:12.359Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = GET
path = /v1/system/hardware/racks
versions = all
|
| 3136 | 2026-03-09T10:56:12.359Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = GET
path = /v1/system/hardware/racks/{rack_id}
versions = all
|
| 3137 | 2026-03-09T10:56:12.359Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = GET
path = /v1/system/hardware/racks/{rack_id}/membership
versions = all starting from 2026012100.0.0
|
| 3138 | 2026-03-09T10:56:12.359Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = POST
path = /v1/system/hardware/racks/{rack_id}/membership/abort
versions = all starting from 2026020200.0.0
|
| 3139 | 2026-03-09T10:56:12.359Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = POST
path = /v1/system/hardware/racks/{rack_id}/membership/add
versions = all starting from 2026012100.0.0
|
| 3140 | 2026-03-09T10:56:12.359Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = GET
path = /v1/system/hardware/sleds
versions = all
|
| 3141 | 2026-03-09T10:56:12.359Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = POST
path = /v1/system/hardware/sleds
versions = all ending with 2026021900.0.0
|
| 3142 | 2026-03-09T10:56:12.359Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = GET
path = /v1/system/hardware/sleds/{sled_id}
versions = all
|
| 3143 | 2026-03-09T10:56:12.359Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = GET
path = /v1/system/hardware/sleds/{sled_id}/disks
versions = all
|
| 3144 | 2026-03-09T10:56:12.359Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = GET
path = /v1/system/hardware/sleds/{sled_id}/instances
versions = all
|
| 3145 | 2026-03-09T10:56:12.359Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = PUT
path = /v1/system/hardware/sleds/{sled_id}/provision-policy
versions = all
|
| 3146 | 2026-03-09T10:56:12.359Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = GET
path = /v1/system/hardware/sleds-uninitialized
versions = all
|
| 3147 | 2026-03-09T10:56:12.359Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = GET
path = /v1/system/hardware/switch-port
versions = all
|
| 3148 | 2026-03-09T10:56:12.359Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = GET
path = /v1/system/hardware/switch-port/{port}/lldp/config
versions = all
|
| 3149 | 2026-03-09T10:56:12.359Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = POST
path = /v1/system/hardware/switch-port/{port}/lldp/config
versions = all
|
| 3150 | 2026-03-09T10:56:12.359Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = DELETE
path = /v1/system/hardware/switch-port/{port}/settings
versions = all
|
| 3151 | 2026-03-09T10:56:12.359Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = POST
path = /v1/system/hardware/switch-port/{port}/settings
versions = all
|
| 3152 | 2026-03-09T10:56:12.359Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = GET
path = /v1/system/hardware/switch-port/{port}/status
versions = all
|
| 3153 | 2026-03-09T10:56:12.359Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = GET
path = /v1/system/hardware/switches
versions = all
|
| 3154 | 2026-03-09T10:56:12.359Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = GET
path = /v1/system/hardware/switches/{switch_id}
versions = all
|
| 3155 | 2026-03-09T10:56:12.359Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = GET
path = /v1/system/identity-providers
versions = all
|
| 3156 | 2026-03-09T10:56:12.359Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = POST
path = /v1/system/identity-providers/local/users
versions = all starting from 2026030200.0.0
|
| 3157 | 2026-03-09T10:56:12.359Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = POST
path = /v1/system/identity-providers/local/users
versions = all ending with 2026030200.0.0
|
| 3158 | 2026-03-09T10:56:12.359Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = DELETE
path = /v1/system/identity-providers/local/users/{user_id}
versions = all
|
| 3159 | 2026-03-09T10:56:12.359Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = POST
path = /v1/system/identity-providers/local/users/{user_id}/set-password
versions = all
|
| 3160 | 2026-03-09T10:56:12.359Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = POST
path = /v1/system/identity-providers/saml
versions = all
|
| 3161 | 2026-03-09T10:56:12.359Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = GET
path = /v1/system/identity-providers/saml/{provider}
versions = all
|
| 3162 | 2026-03-09T10:56:12.360Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = GET
path = /v1/system/ip-pools
versions = all starting from 2026020900.0.0
|
| 3163 | 2026-03-09T10:56:12.360Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = GET
path = /v1/system/ip-pools
versions = all ending with 2026020900.0.0
|
| 3164 | 2026-03-09T10:56:12.360Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = POST
path = /v1/system/ip-pools
versions = all starting from 2026020900.0.0
|
| 3165 | 2026-03-09T10:56:12.360Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = POST
path = /v1/system/ip-pools
versions = all ending with 2026020900.0.0
|
| 3166 | 2026-03-09T10:56:12.360Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = DELETE
path = /v1/system/ip-pools/{pool}
versions = all starting from 2026020900.0.0
|
| 3167 | 2026-03-09T10:56:12.360Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = DELETE
path = /v1/system/ip-pools/{pool}
versions = all ending with 2026020900.0.0
|
| 3168 | 2026-03-09T10:56:12.360Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = GET
path = /v1/system/ip-pools/{pool}
versions = all starting from 2026020900.0.0
|
| 3169 | 2026-03-09T10:56:12.360Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = GET
path = /v1/system/ip-pools/{pool}
versions = all ending with 2026020900.0.0
|
| 3170 | 2026-03-09T10:56:12.360Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = PUT
path = /v1/system/ip-pools/{pool}
versions = all starting from 2026020900.0.0
|
| 3171 | 2026-03-09T10:56:12.360Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = PUT
path = /v1/system/ip-pools/{pool}
versions = all ending with 2026020900.0.0
|
| 3172 | 2026-03-09T10:56:12.360Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = GET
path = /v1/system/ip-pools/{pool}/ranges
versions = all starting from 2026020900.0.0
|
| 3173 | 2026-03-09T10:56:12.360Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = GET
path = /v1/system/ip-pools/{pool}/ranges
versions = all ending with 2026020900.0.0
|
| 3174 | 2026-03-09T10:56:12.360Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = POST
path = /v1/system/ip-pools/{pool}/ranges/add
versions = all starting from 2026020900.0.0
|
| 3175 | 2026-03-09T10:56:12.360Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = POST
path = /v1/system/ip-pools/{pool}/ranges/add
versions = all ending with 2026020900.0.0
|
| 3176 | 2026-03-09T10:56:12.360Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = POST
path = /v1/system/ip-pools/{pool}/ranges/remove
versions = all starting from 2026020900.0.0
|
| 3177 | 2026-03-09T10:56:12.360Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = POST
path = /v1/system/ip-pools/{pool}/ranges/remove
versions = all ending with 2026020900.0.0
|
| 3178 | 2026-03-09T10:56:12.360Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = GET
path = /v1/system/ip-pools/{pool}/silos
versions = all starting from 2026020900.0.0
|
| 3179 | 2026-03-09T10:56:12.360Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = GET
path = /v1/system/ip-pools/{pool}/silos
versions = all ending with 2026020900.0.0
|
| 3180 | 2026-03-09T10:56:12.360Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = POST
path = /v1/system/ip-pools/{pool}/silos
versions = all starting from 2026020900.0.0
|
| 3181 | 2026-03-09T10:56:12.360Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = POST
path = /v1/system/ip-pools/{pool}/silos
versions = all ending with 2026020900.0.0
|
| 3182 | 2026-03-09T10:56:12.360Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = DELETE
path = /v1/system/ip-pools/{pool}/silos/{silo}
versions = all starting from 2026020900.0.0
|
| 3183 | 2026-03-09T10:56:12.360Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = DELETE
path = /v1/system/ip-pools/{pool}/silos/{silo}
versions = all ending with 2026020900.0.0
|
| 3184 | 2026-03-09T10:56:12.360Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = PUT
path = /v1/system/ip-pools/{pool}/silos/{silo}
versions = all starting from 2026020900.0.0
|
| 3185 | 2026-03-09T10:56:12.360Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = PUT
path = /v1/system/ip-pools/{pool}/silos/{silo}
versions = all ending with 2026020900.0.0
|
| 3186 | 2026-03-09T10:56:12.360Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = GET
path = /v1/system/ip-pools/{pool}/utilization
versions = all starting from 2026020900.0.0
|
| 3187 | 2026-03-09T10:56:12.360Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = GET
path = /v1/system/ip-pools/{pool}/utilization
versions = all ending with 2026020900.0.0
|
| 3188 | 2026-03-09T10:56:12.360Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = GET
path = /v1/system/ip-pools-service
versions = all starting from 2026020900.0.0
|
| 3189 | 2026-03-09T10:56:12.360Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = GET
path = /v1/system/ip-pools-service
versions = all ending with 2026020900.0.0
|
| 3190 | 2026-03-09T10:56:12.360Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = GET
path = /v1/system/ip-pools-service/ranges
versions = all starting from 2026020900.0.0
|
| 3191 | 2026-03-09T10:56:12.360Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = GET
path = /v1/system/ip-pools-service/ranges
versions = all ending with 2026020900.0.0
|
| 3192 | 2026-03-09T10:56:12.360Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = POST
path = /v1/system/ip-pools-service/ranges/add
versions = all starting from 2026020900.0.0
|
| 3193 | 2026-03-09T10:56:12.360Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = POST
path = /v1/system/ip-pools-service/ranges/add
versions = all ending with 2026020900.0.0
|
| 3194 | 2026-03-09T10:56:12.360Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = POST
path = /v1/system/ip-pools-service/ranges/remove
versions = all starting from 2026020900.0.0
|
| 3195 | 2026-03-09T10:56:12.360Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = POST
path = /v1/system/ip-pools-service/ranges/remove
versions = all ending with 2026020900.0.0
|
| 3196 | 2026-03-09T10:56:12.360Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = GET
path = /v1/system/metrics/{metric_name}
versions = all
|
| 3197 | 2026-03-09T10:56:12.360Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = GET
path = /v1/system/multicast-groups/by-ip/{address}
versions = all ending with 2026010800.0.0
|
| 3198 | 2026-03-09T10:56:12.360Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = GET
path = /v1/system/networking/address-lot
versions = all
|
| 3199 | 2026-03-09T10:56:12.360Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = POST
path = /v1/system/networking/address-lot
versions = all
|
| 3200 | 2026-03-09T10:56:12.360Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = DELETE
path = /v1/system/networking/address-lot/{address_lot}
versions = all
|
| 3201 | 2026-03-09T10:56:12.360Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = GET
path = /v1/system/networking/address-lot/{address_lot}
versions = all
|
| 3202 | 2026-03-09T10:56:12.360Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = GET
path = /v1/system/networking/address-lot/{address_lot}/blocks
versions = all
|
| 3203 | 2026-03-09T10:56:12.360Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = GET
path = /v1/system/networking/allow-list
versions = all
|
| 3204 | 2026-03-09T10:56:12.360Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = PUT
path = /v1/system/networking/allow-list
versions = all
|
| 3205 | 2026-03-09T10:56:12.360Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = POST
path = /v1/system/networking/bfd-disable
versions = all
|
| 3206 | 2026-03-09T10:56:12.361Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = POST
path = /v1/system/networking/bfd-enable
versions = all
|
| 3207 | 2026-03-09T10:56:12.361Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = GET
path = /v1/system/networking/bfd-status
versions = all
|
| 3208 | 2026-03-09T10:56:12.361Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = DELETE
path = /v1/system/networking/bgp
versions = all
|
| 3209 | 2026-03-09T10:56:12.361Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = GET
path = /v1/system/networking/bgp
versions = all starting from 2026021301.0.0
|
| 3210 | 2026-03-09T10:56:12.361Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = GET
path = /v1/system/networking/bgp
versions = all ending with 2026021301.0.0
|
| 3211 | 2026-03-09T10:56:12.361Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = POST
path = /v1/system/networking/bgp
versions = all starting from 2026021301.0.0
|
| 3212 | 2026-03-09T10:56:12.361Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = POST
path = /v1/system/networking/bgp
versions = all ending with 2026021301.0.0
|
| 3213 | 2026-03-09T10:56:12.361Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = GET
path = /v1/system/networking/bgp-announce-set
versions = all
|
| 3214 | 2026-03-09T10:56:12.361Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = PUT
path = /v1/system/networking/bgp-announce-set
versions = all
|
| 3215 | 2026-03-09T10:56:12.361Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = DELETE
path = /v1/system/networking/bgp-announce-set/{announce_set}
versions = all
|
| 3216 | 2026-03-09T10:56:12.361Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = GET
path = /v1/system/networking/bgp-announce-set/{announce_set}/announcement
versions = all
|
| 3217 | 2026-03-09T10:56:12.361Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = GET
path = /v1/system/networking/bgp-exported
versions = all starting from 2026021301.0.0
|
| 3218 | 2026-03-09T10:56:12.361Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = GET
path = /v1/system/networking/bgp-exported
versions = all ending with 2026021301.0.0
|
| 3219 | 2026-03-09T10:56:12.361Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = GET
path = /v1/system/networking/bgp-imported
versions = all starting from 2026021301.0.0
|
| 3220 | 2026-03-09T10:56:12.361Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = GET
path = /v1/system/networking/bgp-message-history
versions = all
|
| 3221 | 2026-03-09T10:56:12.361Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = GET
path = /v1/system/networking/bgp-routes-ipv4
versions = all ending with 2026021301.0.0
|
| 3222 | 2026-03-09T10:56:12.361Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = GET
path = /v1/system/networking/bgp-status
versions = all starting from 2026021301.0.0
|
| 3223 | 2026-03-09T10:56:12.361Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = GET
path = /v1/system/networking/bgp-status
versions = from 2025121200.0.0 to 2026021301.0.0
|
| 3224 | 2026-03-09T10:56:12.361Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = GET
path = /v1/system/networking/bgp-status
versions = all ending with 2025121200.0.0
|
| 3225 | 2026-03-09T10:56:12.361Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = GET
path = /v1/system/networking/inbound-icmp
versions = all
|
| 3226 | 2026-03-09T10:56:12.361Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = PUT
path = /v1/system/networking/inbound-icmp
versions = all
|
| 3227 | 2026-03-09T10:56:12.361Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = GET
path = /v1/system/networking/loopback-address
versions = all
|
| 3228 | 2026-03-09T10:56:12.361Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = POST
path = /v1/system/networking/loopback-address
versions = all
|
| 3229 | 2026-03-09T10:56:12.361Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = DELETE
path = /v1/system/networking/loopback-address/{rack_id}/{switch_location}/{address}/{subnet_mask}
versions = all
|
| 3230 | 2026-03-09T10:56:12.361Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = DELETE
path = /v1/system/networking/switch-port-settings
versions = all
|
| 3231 | 2026-03-09T10:56:12.361Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = GET
path = /v1/system/networking/switch-port-settings
versions = all
|
| 3232 | 2026-03-09T10:56:12.361Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = POST
path = /v1/system/networking/switch-port-settings
versions = all starting from 2026021301.0.0
|
| 3233 | 2026-03-09T10:56:12.361Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = POST
path = /v1/system/networking/switch-port-settings
versions = all ending with 2026021301.0.0
|
| 3234 | 2026-03-09T10:56:12.361Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = GET
path = /v1/system/networking/switch-port-settings/{port}
versions = all starting from 2026021301.0.0
|
| 3235 | 2026-03-09T10:56:12.361Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = GET
path = /v1/system/networking/switch-port-settings/{port}
versions = all ending with 2026021301.0.0
|
| 3236 | 2026-03-09T10:56:12.361Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = GET
path = /v1/system/policy
versions = all
|
| 3237 | 2026-03-09T10:56:12.361Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = PUT
path = /v1/system/policy
versions = all
|
| 3238 | 2026-03-09T10:56:12.361Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = GET
path = /v1/system/scim/tokens
versions = all
|
| 3239 | 2026-03-09T10:56:12.361Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = POST
path = /v1/system/scim/tokens
versions = all
|
| 3240 | 2026-03-09T10:56:12.361Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = DELETE
path = /v1/system/scim/tokens/{token_id}
versions = all
|
| 3241 | 2026-03-09T10:56:12.361Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = GET
path = /v1/system/scim/tokens/{token_id}
versions = all
|
| 3242 | 2026-03-09T10:56:12.361Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = GET
path = /v1/system/silo-quotas
versions = all
|
| 3243 | 2026-03-09T10:56:12.361Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = GET
path = /v1/system/silos
versions = all
|
| 3244 | 2026-03-09T10:56:12.361Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = POST
path = /v1/system/silos
versions = all
|
| 3245 | 2026-03-09T10:56:12.361Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = DELETE
path = /v1/system/silos/{silo}
versions = all
|
| 3246 | 2026-03-09T10:56:12.361Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = GET
path = /v1/system/silos/{silo}
versions = all
|
| 3247 | 2026-03-09T10:56:12.361Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = GET
path = /v1/system/silos/{silo}/ip-pools
versions = all starting from 2026010100.0.0
|
| 3248 | 2026-03-09T10:56:12.361Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = GET
path = /v1/system/silos/{silo}/ip-pools
versions = all ending with 2026010100.0.0
|
| 3249 | 2026-03-09T10:56:12.361Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = GET
path = /v1/system/silos/{silo}/policy
versions = all
|
| 3250 | 2026-03-09T10:56:12.361Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = PUT
path = /v1/system/silos/{silo}/policy
versions = all
|
| 3251 | 2026-03-09T10:56:12.362Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = GET
path = /v1/system/silos/{silo}/quotas
versions = all
|
| 3252 | 2026-03-09T10:56:12.362Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = PUT
path = /v1/system/silos/{silo}/quotas
versions = all
|
| 3253 | 2026-03-09T10:56:12.362Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = GET
path = /v1/system/silos/{silo}/subnet-pools
versions = all starting from 2026020600.0.0
|
| 3254 | 2026-03-09T10:56:12.362Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = GET
path = /v1/system/subnet-pools
versions = all starting from 2026020900.0.0
|
| 3255 | 2026-03-09T10:56:12.362Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = GET
path = /v1/system/subnet-pools
versions = from 2026012800.0.0 to 2026020900.0.0
|
| 3256 | 2026-03-09T10:56:12.362Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = GET
path = /v1/system/subnet-pools
versions = from 2026011601.0.0 to 2026012800.0.0
|
| 3257 | 2026-03-09T10:56:12.362Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = POST
path = /v1/system/subnet-pools
versions = all starting from 2026020900.0.0
|
| 3258 | 2026-03-09T10:56:12.362Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = POST
path = /v1/system/subnet-pools
versions = from 2026012800.0.0 to 2026020900.0.0
|
| 3259 | 2026-03-09T10:56:12.362Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = POST
path = /v1/system/subnet-pools
versions = from 2026012201.0.0 to 2026012800.0.0
|
| 3260 | 2026-03-09T10:56:12.362Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = POST
path = /v1/system/subnet-pools
versions = from 2026011601.0.0 to 2026012201.0.0
|
| 3261 | 2026-03-09T10:56:12.362Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = DELETE
path = /v1/system/subnet-pools/{pool}
versions = all starting from 2026020900.0.0
|
| 3262 | 2026-03-09T10:56:12.362Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = DELETE
path = /v1/system/subnet-pools/{pool}
versions = from 2026011601.0.0 to 2026020900.0.0
|
| 3263 | 2026-03-09T10:56:12.362Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = GET
path = /v1/system/subnet-pools/{pool}
versions = all starting from 2026020900.0.0
|
| 3264 | 2026-03-09T10:56:12.362Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = GET
path = /v1/system/subnet-pools/{pool}
versions = from 2026012800.0.0 to 2026020900.0.0
|
| 3265 | 2026-03-09T10:56:12.362Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = GET
path = /v1/system/subnet-pools/{pool}
versions = from 2026011601.0.0 to 2026012800.0.0
|
| 3266 | 2026-03-09T10:56:12.362Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = PUT
path = /v1/system/subnet-pools/{pool}
versions = all starting from 2026020900.0.0
|
| 3267 | 2026-03-09T10:56:12.362Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = PUT
path = /v1/system/subnet-pools/{pool}
versions = from 2026012800.0.0 to 2026020900.0.0
|
| 3268 | 2026-03-09T10:56:12.362Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = PUT
path = /v1/system/subnet-pools/{pool}
versions = from 2026011601.0.0 to 2026012800.0.0
|
| 3269 | 2026-03-09T10:56:12.362Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = GET
path = /v1/system/subnet-pools/{pool}/members
versions = all starting from 2026020900.0.0
|
| 3270 | 2026-03-09T10:56:12.362Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = GET
path = /v1/system/subnet-pools/{pool}/members
versions = from 2026012800.0.0 to 2026020900.0.0
|
| 3271 | 2026-03-09T10:56:12.362Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = GET
path = /v1/system/subnet-pools/{pool}/members
versions = from 2026011601.0.0 to 2026012800.0.0
|
| 3272 | 2026-03-09T10:56:12.362Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = POST
path = /v1/system/subnet-pools/{pool}/members/add
versions = all starting from 2026020900.0.0
|
| 3273 | 2026-03-09T10:56:12.362Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = POST
path = /v1/system/subnet-pools/{pool}/members/add
versions = from 2026012800.0.0 to 2026020900.0.0
|
| 3274 | 2026-03-09T10:56:12.362Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = POST
path = /v1/system/subnet-pools/{pool}/members/add
versions = from 2026012201.0.0 to 2026012800.0.0
|
| 3275 | 2026-03-09T10:56:12.362Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = POST
path = /v1/system/subnet-pools/{pool}/members/add
versions = from 2026011601.0.0 to 2026012201.0.0
|
| 3276 | 2026-03-09T10:56:12.362Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = POST
path = /v1/system/subnet-pools/{pool}/members/remove
versions = all starting from 2026020900.0.0
|
| 3277 | 2026-03-09T10:56:12.362Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = POST
path = /v1/system/subnet-pools/{pool}/members/remove
versions = from 2026011601.0.0 to 2026020900.0.0
|
| 3278 | 2026-03-09T10:56:12.362Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = GET
path = /v1/system/subnet-pools/{pool}/silos
versions = all starting from 2026020900.0.0
|
| 3279 | 2026-03-09T10:56:12.362Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = GET
path = /v1/system/subnet-pools/{pool}/silos
versions = from 2026011601.0.0 to 2026020900.0.0
|
| 3280 | 2026-03-09T10:56:12.362Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = POST
path = /v1/system/subnet-pools/{pool}/silos
versions = all starting from 2026020900.0.0
|
| 3281 | 2026-03-09T10:56:12.362Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = POST
path = /v1/system/subnet-pools/{pool}/silos
versions = from 2026011601.0.0 to 2026020900.0.0
|
| 3282 | 2026-03-09T10:56:12.362Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = DELETE
path = /v1/system/subnet-pools/{pool}/silos/{silo}
versions = all starting from 2026020900.0.0
|
| 3283 | 2026-03-09T10:56:12.362Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = DELETE
path = /v1/system/subnet-pools/{pool}/silos/{silo}
versions = from 2026011601.0.0 to 2026020900.0.0
|
| 3284 | 2026-03-09T10:56:12.362Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = PUT
path = /v1/system/subnet-pools/{pool}/silos/{silo}
versions = all starting from 2026020900.0.0
|
| 3285 | 2026-03-09T10:56:12.362Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = PUT
path = /v1/system/subnet-pools/{pool}/silos/{silo}
versions = from 2026011601.0.0 to 2026020900.0.0
|
| 3286 | 2026-03-09T10:56:12.362Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = GET
path = /v1/system/subnet-pools/{pool}/utilization
versions = all starting from 2026020900.0.0
|
| 3287 | 2026-03-09T10:56:12.362Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = GET
path = /v1/system/subnet-pools/{pool}/utilization
versions = from 2026011601.0.0 to 2026020900.0.0
|
| 3288 | 2026-03-09T10:56:12.362Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = POST
path = /v1/system/timeseries/query
versions = all
|
| 3289 | 2026-03-09T10:56:12.362Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = GET
path = /v1/system/timeseries/schemas
versions = all
|
| 3290 | 2026-03-09T10:56:12.362Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = PUT
path = /v1/system/update/recovery-finish
versions = all starting from 2026022500.0.0
|
| 3291 | 2026-03-09T10:56:12.362Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = GET
path = /v1/system/update/repositories
versions = all
|
| 3292 | 2026-03-09T10:56:12.362Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = PUT
path = /v1/system/update/repositories
versions = all
|
| 3293 | 2026-03-09T10:56:12.362Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = GET
path = /v1/system/update/repositories/{system_version}
versions = all
|
| 3294 | 2026-03-09T10:56:12.362Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = GET
path = /v1/system/update/status
versions = all
|
| 3295 | 2026-03-09T10:56:12.362Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = PUT
path = /v1/system/update/target-release
versions = all
|
| 3296 | 2026-03-09T10:56:12.362Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = GET
path = /v1/system/update/trust-roots
versions = all
|
| 3297 | 2026-03-09T10:56:12.362Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = POST
path = /v1/system/update/trust-roots
versions = all
|
| 3298 | 2026-03-09T10:56:12.363Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = DELETE
path = /v1/system/update/trust-roots/{trust_root_id}
versions = all
|
| 3299 | 2026-03-09T10:56:12.363Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = GET
path = /v1/system/update/trust-roots/{trust_root_id}
versions = all
|
| 3300 | 2026-03-09T10:56:12.363Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = GET
path = /v1/system/users
versions = all starting from 2026030200.0.0
|
| 3301 | 2026-03-09T10:56:12.363Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = GET
path = /v1/system/users
versions = all ending with 2026030200.0.0
|
| 3302 | 2026-03-09T10:56:12.363Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = GET
path = /v1/system/users/{user_id}
versions = all starting from 2026030200.0.0
|
| 3303 | 2026-03-09T10:56:12.363Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = GET
path = /v1/system/users/{user_id}
versions = all ending with 2026030200.0.0
|
| 3304 | 2026-03-09T10:56:12.363Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = GET
path = /v1/system/users-builtin
versions = all
|
| 3305 | 2026-03-09T10:56:12.363Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = GET
path = /v1/system/users-builtin/{user}
versions = all
|
| 3306 | 2026-03-09T10:56:12.363Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = GET
path = /v1/system/utilization/silos
versions = all
|
| 3307 | 2026-03-09T10:56:12.363Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = GET
path = /v1/system/utilization/silos/{silo}
versions = all
|
| 3308 | 2026-03-09T10:56:12.363Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = POST
path = /v1/timeseries/query
versions = all
|
| 3309 | 2026-03-09T10:56:12.363Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = GET
path = /v1/users
versions = all starting from 2026030200.0.0
|
| 3310 | 2026-03-09T10:56:12.363Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = GET
path = /v1/users
versions = all ending with 2026030200.0.0
|
| 3311 | 2026-03-09T10:56:12.363Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = GET
path = /v1/users/{user_id}
versions = all starting from 2026030200.0.0
|
| 3312 | 2026-03-09T10:56:12.363Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = GET
path = /v1/users/{user_id}
versions = all ending with 2026030200.0.0
|
| 3313 | 2026-03-09T10:56:12.363Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = GET
path = /v1/users/{user_id}/access-tokens
versions = all
|
| 3314 | 2026-03-09T10:56:12.363Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = POST
path = /v1/users/{user_id}/logout
versions = all
|
| 3315 | 2026-03-09T10:56:12.363Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = GET
path = /v1/users/{user_id}/sessions
versions = all
|
| 3316 | 2026-03-09T10:56:12.363Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = GET
path = /v1/utilization
versions = all
|
| 3317 | 2026-03-09T10:56:12.363Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = GET
path = /v1/vpc-firewall-rules
versions = all
|
| 3318 | 2026-03-09T10:56:12.363Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = PUT
path = /v1/vpc-firewall-rules
versions = all
|
| 3319 | 2026-03-09T10:56:12.363Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = GET
path = /v1/vpc-router-routes
versions = all
|
| 3320 | 2026-03-09T10:56:12.363Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = POST
path = /v1/vpc-router-routes
versions = all
|
| 3321 | 2026-03-09T10:56:12.363Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = DELETE
path = /v1/vpc-router-routes/{route}
versions = all
|
| 3322 | 2026-03-09T10:56:12.363Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = GET
path = /v1/vpc-router-routes/{route}
versions = all
|
| 3323 | 2026-03-09T10:56:12.363Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = PUT
path = /v1/vpc-router-routes/{route}
versions = all
|
| 3324 | 2026-03-09T10:56:12.363Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = GET
path = /v1/vpc-routers
versions = all
|
| 3325 | 2026-03-09T10:56:12.363Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = POST
path = /v1/vpc-routers
versions = all
|
| 3326 | 2026-03-09T10:56:12.363Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = DELETE
path = /v1/vpc-routers/{router}
versions = all
|
| 3327 | 2026-03-09T10:56:12.363Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = GET
path = /v1/vpc-routers/{router}
versions = all
|
| 3328 | 2026-03-09T10:56:12.363Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = PUT
path = /v1/vpc-routers/{router}
versions = all
|
| 3329 | 2026-03-09T10:56:12.363Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = GET
path = /v1/vpc-subnets
versions = all
|
| 3330 | 2026-03-09T10:56:12.363Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = POST
path = /v1/vpc-subnets
versions = all
|
| 3331 | 2026-03-09T10:56:12.363Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = DELETE
path = /v1/vpc-subnets/{subnet}
versions = all
|
| 3332 | 2026-03-09T10:56:12.363Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = GET
path = /v1/vpc-subnets/{subnet}
versions = all
|
| 3333 | 2026-03-09T10:56:12.363Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = PUT
path = /v1/vpc-subnets/{subnet}
versions = all
|
| 3334 | 2026-03-09T10:56:12.363Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = GET
path = /v1/vpc-subnets/{subnet}/network-interfaces
versions = all starting from 2026010300.0.0
|
| 3335 | 2026-03-09T10:56:12.363Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = GET
path = /v1/vpc-subnets/{subnet}/network-interfaces
versions = all ending with 2026010300.0.0
|
| 3336 | 2026-03-09T10:56:12.363Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = GET
path = /v1/vpcs
versions = all
|
| 3337 | 2026-03-09T10:56:12.363Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = POST
path = /v1/vpcs
versions = all
|
| 3338 | 2026-03-09T10:56:12.363Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = DELETE
path = /v1/vpcs/{vpc}
versions = all
|
| 3339 | 2026-03-09T10:56:12.363Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = GET
path = /v1/vpcs/{vpc}
versions = all
|
| 3340 | 2026-03-09T10:56:12.363Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = PUT
path = /v1/vpcs/{vpc}
versions = all
|
| 3341 | 2026-03-09T10:56:12.363Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = POST
path = /v1/webhook-receivers
versions = all
|
| 3342 | 2026-03-09T10:56:12.363Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = PUT
path = /v1/webhook-receivers/{receiver}
versions = all
|
| 3343 | 2026-03-09T10:56:12.363Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = GET
path = /v1/webhook-secrets
versions = all
|
| 3344 | 2026-03-09T10:56:12.363Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = POST
path = /v1/webhook-secrets
versions = all
|
| 3345 | 2026-03-09T10:56:12.363Z | DEBG | test_update_status (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:44755
method = DELETE
path = /v1/webhook-secrets/{secret_id}
versions = all
|
| 3346 | 2026-03-09T10:56:12.363Z | INFO | test_update_status (dropshot_external_techport): listening
local_addr = 127.0.0.1:44755
|
| 3347 | 2026-03-09T10:56:12.363Z | DEBG | test_update_status (dropshot_external_techport): successfully registered DTrace USDT probes
local_addr = 127.0.0.1:44755
|
| 3348 | 2026-03-09T10:56:12.364Z | DEBG | test_update_status (nexus-producer-server): registered DTrace probes
|
| 3349 | 2026-03-09T10:56:12.364Z | DEBG | test_update_status (dropshot): registered endpoint
local_addr = 127.0.0.1:33547
method = GET
path = /{producer_id}
versions = all
|
| 3350 | 2026-03-09T10:56:12.364Z | INFO | test_update_status (dropshot): listening
file = /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.7/src/server.rs:328
local_addr = 127.0.0.1:33547
|
| 3351 | 2026-03-09T10:56:12.364Z | DEBG | test_update_status (dropshot): successfully registered DTrace USDT probes
local_addr = 127.0.0.1:33547
|
| 3352 | 2026-03-09T10:56:12.364Z | DEBG | test_update_status (nexus-producer-server): Requested any available port, Dropshot server has been bound to 127.0.0.1:33547
|
| 3353 | 2026-03-09T10:56:12.364Z | DEBG | test_update_status (nexus-producer-server): Nexus IP provided explicitly, will use it
addr = 127.0.0.1:38163
|
| 3354 | 2026-03-09T10:56:12.364Z | DEBG | test_update_status (nexus-producer-server): starting producer registration task
|
| 3355 | 2026-03-09T10:56:12.364Z | INFO | test_update_status (nexus-producer-server): starting oximeter metric producer server
address = 127.0.0.1:33547
file = oximeter/producer/src/lib.rs:281
interval = 10s
producer_id = 913233fe-92a8-4635-9572-183f495429c4
|
| 3356 | 2026-03-09T10:56:12.364Z | DEBG | test_update_status (init_with_steps): Running step start_oximeter
|
| 3357 | 2026-03-09T10:56:12.364Z | DEBG | test_update_status: Starting Oximeter
|
| 3358 | 2026-03-09T10:56:12.364Z | DEBG | test_update_status (oximeter): registered DTrace probes
|
| 3359 | 2026-03-09T10:56:12.364Z | INFO | test_update_status (oximeter): starting oximeter server
file = oximeter/collector/src/lib.rs:264
|
| 3360 | 2026-03-09T10:56:12.364Z | DEBG | test_update_status (oximeter): creating ClickHouse client
|
| 3361 | 2026-03-09T10:56:12.364Z | DEBG | test_update_status (producer-registration-task): registering as oximeter producer with Nexus
registration_count = 0
|
| 3362 | 2026-03-09T10:56:12.364Z | DEBG | test_update_status (producer-registration-task): will register with Nexus at 127.0.0.1:38163
|
| 3363 | 2026-03-09T10:56:12.364Z | DEBG | test_update_status (clickhouse-client): registered USDT probes
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 9ee43f72-e15f-4ba3-a020-e23e52457815
|
| 3364 | 2026-03-09T10:56:12.367Z | TRAC | test_update_status (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 9ee43f72-e15f-4ba3-a020-e23e52457815
sql = SELECT MAX(value) AS max_version FROM oximeter.version;
|
| 3365 | 2026-03-09T10:56:12.384Z | WARN | test_update_status (clickhouse-client): oximeter database does not exist, or is out-of-date
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
file = oximeter/db/src/client/mod.rs:900
id = 9ee43f72-e15f-4ba3-a020-e23e52457815
|
| 3366 | 2026-03-09T10:56:12.384Z | DEBG | test_update_status (oximeter-agent): oximeter database does not exist, creating
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
|
| 3367 | 2026-03-09T10:56:12.384Z | INFO | test_update_status (clickhouse-client): reading db version
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
file = oximeter/db/src/client/mod.rs:800
id = 9ee43f72-e15f-4ba3-a020-e23e52457815
|
| 3368 | 2026-03-09T10:56:12.386Z | TRAC | test_update_status (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 9ee43f72-e15f-4ba3-a020-e23e52457815
sql = SELECT MAX(value) AS max_version FROM oximeter.version;
|
| 3369 | 2026-03-09T10:56:12.399Z | WARN | test_update_status (clickhouse-client): oximeter database does not exist, or is out-of-date
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
file = oximeter/db/src/client/mod.rs:900
id = 9ee43f72-e15f-4ba3-a020-e23e52457815
|
| 3370 | 2026-03-09T10:56:12.399Z | INFO | test_update_status (clickhouse-client): read oximeter database version
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
file = oximeter/db/src/client/mod.rs:805
id = 9ee43f72-e15f-4ba3-a020-e23e52457815
version = 0
|
| 3371 | 2026-03-09T10:56:12.399Z | INFO | test_update_status (clickhouse-client): initializing oximeter schema
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
file = oximeter/db/src/client/mod.rs:810
id = 9ee43f72-e15f-4ba3-a020-e23e52457815
|
| 3372 | 2026-03-09T10:56:12.399Z | DEBG | test_update_status (clickhouse-client): initializing ClickHouse database
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 9ee43f72-e15f-4ba3-a020-e23e52457815
|
| 3373 | 2026-03-09T10:56:12.402Z | TRAC | test_update_status (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 9ee43f72-e15f-4ba3-a020-e23e52457815
sql = CREATE DATABASE IF NOT EXISTS oximeter
|
| 3374 | 2026-03-09T10:56:12.406Z | TRAC | test_update_status (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 9ee43f72-e15f-4ba3-a020-e23e52457815
sql = \n\n/* The version table contains metadata about the `oximeter` database */\nCREATE TABLE IF NOT EXISTS oximeter.version\n(\n value UInt64,\n timestamp DateTime64(9, 'UTC')\n)\nENGINE = MergeTree()\nORDER BY (value, timestamp)
|
| 3375 | 2026-03-09T10:56:12.410Z | TRAC | test_update_status (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 9ee43f72-e15f-4ba3-a020-e23e52457815
sql = \n\n/* The measurement tables contain all individual samples from each timeseries.\n *\n * Each table stores a single datum type, and otherwise contains nearly the same\n * structure. The primary sorting key is on the timeseries name, key, and then\n * timestamp, so that all timeseries from the same schema are grouped, followed\n * by all samples from the same timeseries.\n *\n * This reflects that one usually looks up the _key_ in one or more field table,\n * and then uses that to index quickly into the measurements tables.\n */\nCREATE TABLE IF NOT EXISTS oximeter.measurements_bool\n(\n timeseries_name String,\n timeseries_key UInt64,\n timestamp DateTime64(9, 'UTC'),\n datum Nullable(Bool)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
|
| 3376 | 2026-03-09T10:56:12.413Z | TRAC | test_update_status (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 9ee43f72-e15f-4ba3-a020-e23e52457815
sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_i8\n(\n timeseries_name String,\n timeseries_key UInt64,\n timestamp DateTime64(9, 'UTC'),\n datum Nullable(Int8)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
|
| 3377 | 2026-03-09T10:56:12.416Z | TRAC | test_update_status (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 9ee43f72-e15f-4ba3-a020-e23e52457815
sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_u8\n(\n timeseries_name String,\n timeseries_key UInt64,\n timestamp DateTime64(9, 'UTC'),\n datum Nullable(UInt8)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
|
| 3378 | 2026-03-09T10:56:12.422Z | TRAC | test_update_status (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 9ee43f72-e15f-4ba3-a020-e23e52457815
sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_i16\n(\n timeseries_name String,\n timeseries_key UInt64,\n timestamp DateTime64(9, 'UTC'),\n datum Nullable(Int16)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
|
| 3379 | 2026-03-09T10:56:12.426Z | TRAC | test_update_status (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 9ee43f72-e15f-4ba3-a020-e23e52457815
sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_u16\n(\n timeseries_name String,\n timeseries_key UInt64,\n timestamp DateTime64(9, 'UTC'),\n datum Nullable(UInt16)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
|
| 3380 | 2026-03-09T10:56:12.429Z | TRAC | test_update_status (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 9ee43f72-e15f-4ba3-a020-e23e52457815
sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_i32\n(\n timeseries_name String,\n timeseries_key UInt64,\n timestamp DateTime64(9, 'UTC'),\n datum Nullable(Int32)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
|
| 3381 | 2026-03-09T10:56:12.431Z | DEBG | test_update_status (producer-registration-task): client request
body = Some(Body)
method = POST
uri = http://127.0.0.1:38163/metrics/producers
|
| 3382 | 2026-03-09T10:56:12.432Z | INFO | test_update_status (dropshot_internal): accepted connection
local_addr = 127.0.0.1:38163
remote_addr = 127.0.0.1:46271
|
| 3383 | 2026-03-09T10:56:12.432Z | TRAC | test_update_status (dropshot_internal): incoming request
local_addr = 127.0.0.1:38163
method = POST
remote_addr = 127.0.0.1:46271
req_id = cef0e1e3-82cf-4901-ab29-89913ba643a8
uri = /metrics/producers
|
| 3384 | 2026-03-09T10:56:12.432Z | DEBG | test_update_status (dropshot_internal): determined request API version
local_addr = 127.0.0.1:38163
method = POST
remote_addr = 127.0.0.1:46271
req_id = cef0e1e3-82cf-4901-ab29-89913ba643a8
uri = /metrics/producers
version = 1.0.0
|
| 3385 | 2026-03-09T10:56:12.432Z | TRAC | test_update_status (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 9ee43f72-e15f-4ba3-a020-e23e52457815
sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_u32\n(\n timeseries_name String,\n timeseries_key UInt64,\n timestamp DateTime64(9, 'UTC'),\n datum Nullable(UInt32)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
|
| 3386 | 2026-03-09T10:56:12.434Z | TRAC | test_update_status (dropshot_internal): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
authenticated = true
local_addr = 127.0.0.1:38163
method = POST
remote_addr = 127.0.0.1:46271
req_id = cef0e1e3-82cf-4901-ab29-89913ba643a8
resource = Database
type = user_builtin
uri = /metrics/producers
user_builtin_id = 001de000-05e4-4000-8000-000000000002
|
| 3387 | 2026-03-09T10:56:12.434Z | DEBG | test_update_status (dropshot_internal): roles
authenticated = true
local_addr = 127.0.0.1:38163
method = POST
remote_addr = 127.0.0.1:46271
req_id = cef0e1e3-82cf-4901-ab29-89913ba643a8
roles = RoleSet { roles: {} }
type = user_builtin
uri = /metrics/producers
user_builtin_id = 001de000-05e4-4000-8000-000000000002
|
| 3388 | 2026-03-09T10:56:12.434Z | DEBG | test_update_status (dropshot_internal): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
authenticated = true
local_addr = 127.0.0.1:38163
method = POST
remote_addr = 127.0.0.1:46271
req_id = cef0e1e3-82cf-4901-ab29-89913ba643a8
resource = Database
result = Ok(())
type = user_builtin
uri = /metrics/producers
user_builtin_id = 001de000-05e4-4000-8000-000000000002
|
| 3389 | 2026-03-09T10:56:12.435Z | TRAC | test_update_status (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 9ee43f72-e15f-4ba3-a020-e23e52457815
sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_i64\n(\n timeseries_name String,\n timeseries_key UInt64,\n timestamp DateTime64(9, 'UTC'),\n datum Nullable(Int64)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
|
| 3390 | 2026-03-09T10:56:12.438Z | TRAC | test_update_status (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 9ee43f72-e15f-4ba3-a020-e23e52457815
sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_u64\n(\n timeseries_name String,\n timeseries_key UInt64,\n timestamp DateTime64(9, 'UTC'),\n datum Nullable(UInt64)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
|
| 3391 | 2026-03-09T10:56:12.442Z | TRAC | test_update_status (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 9ee43f72-e15f-4ba3-a020-e23e52457815
sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_f32\n(\n timeseries_name String,\n timeseries_key UInt64,\n timestamp DateTime64(9, 'UTC'),\n datum Nullable(Float32)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
|
| 3392 | 2026-03-09T10:56:12.446Z | TRAC | test_update_status (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 9ee43f72-e15f-4ba3-a020-e23e52457815
sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_f64\n(\n timeseries_name String,\n timeseries_key UInt64,\n timestamp DateTime64(9, 'UTC'),\n datum Nullable(Float64)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
|
| 3393 | 2026-03-09T10:56:12.448Z | TRAC | test_update_status (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 9ee43f72-e15f-4ba3-a020-e23e52457815
sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_string\n(\n timeseries_name String,\n timeseries_key UInt64,\n timestamp DateTime64(9, 'UTC'),\n datum Nullable(String)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
|
| 3394 | 2026-03-09T10:56:12.451Z | TRAC | test_update_status (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 9ee43f72-e15f-4ba3-a020-e23e52457815
sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_bytes\n(\n timeseries_name String,\n timeseries_key UInt64,\n timestamp DateTime64(9, 'UTC'),\n /*\n * NOTE: Right now we can't unambiguously record a nullable byte array.\n * Arrays cannot be nested in `Nullable()` types, and encoding the array as\n * a string isn't palatable for a few reasons.\n * See: https://github.com/oxidecomputer/omicron/issues/4551 for more\n * details.\n */\n datum Array(UInt8)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
|
| 3395 | 2026-03-09T10:56:12.456Z | TRAC | test_update_status (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 9ee43f72-e15f-4ba3-a020-e23e52457815
sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_cumulativei64\n(\n timeseries_name String,\n timeseries_key UInt64,\n start_time DateTime64(9, 'UTC'),\n timestamp DateTime64(9, 'UTC'),\n datum Nullable(Int64)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, start_time, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
|
| 3396 | 2026-03-09T10:56:12.459Z | TRAC | test_update_status (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 9ee43f72-e15f-4ba3-a020-e23e52457815
sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_cumulativeu64\n(\n timeseries_name String,\n timeseries_key UInt64,\n start_time DateTime64(9, 'UTC'),\n timestamp DateTime64(9, 'UTC'),\n datum Nullable(UInt64)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, start_time, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
|
| 3397 | 2026-03-09T10:56:12.463Z | TRAC | test_update_status (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 9ee43f72-e15f-4ba3-a020-e23e52457815
sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_cumulativef32\n(\n timeseries_name String,\n timeseries_key UInt64,\n start_time DateTime64(9, 'UTC'),\n timestamp DateTime64(9, 'UTC'),\n datum Nullable(Float32)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, start_time, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
|
| 3398 | 2026-03-09T10:56:12.466Z | TRAC | test_update_status (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 9ee43f72-e15f-4ba3-a020-e23e52457815
sql = \n\n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_cumulativef64\n(\n timeseries_name String,\n timeseries_key UInt64,\n start_time DateTime64(9, 'UTC'),\n timestamp DateTime64(9, 'UTC'),\n datum Nullable(Float64)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, start_time, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
|
| 3399 | 2026-03-09T10:56:12.472Z | TRAC | test_update_status (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 9ee43f72-e15f-4ba3-a020-e23e52457815
sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_histogrami8\n(\n timeseries_name String,\n timeseries_key UInt64,\n start_time DateTime64(9, 'UTC'),\n timestamp DateTime64(9, 'UTC'),\n /*\n * NOTE: Array types cannot be Nullable, see\n * https://clickhouse.com/docs/en/sql-reference/data-types/nullable\n * for more details.\n *\n * This means we need to use empty arrays to indicate a missing value. This\n * is unfortunate, and at this point relies on the fact that an\n * `oximeter::Histogram` cannot have zero bins. If that changes, we'll need\n * to figure out another way to represent missing samples here.\n */\n bins Array(Int8),\n counts Array(UInt64),\n min Int8,\n max Int8,\n sum_of_samples Int64,\n squared_mean Float64,\n p50_marker_heights Array(Float64),\n p50_marker_positions Array(UInt64),\n p50_desired_marker_positions Array(Float64),\n p90_marker_heights Array(Float64),\n p90_marker_positions Array(UInt64),\n p90_desired_marker_positions Array(Float64),\n p99_marker_heights Array(Float64),\n p99_marker_positions Array(UInt64),\n p99_desired_marker_positions Array(Float64)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, start_time, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
|
| 3400 | 2026-03-09T10:56:12.477Z | TRAC | test_update_status (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 9ee43f72-e15f-4ba3-a020-e23e52457815
sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_histogramu8\n(\n timeseries_name String,\n timeseries_key UInt64,\n start_time DateTime64(9, 'UTC'),\n timestamp DateTime64(9, 'UTC'),\n bins Array(UInt8),\n counts Array(UInt64),\n min UInt8,\n max UInt8,\n sum_of_samples Int64,\n squared_mean Float64,\n p50_marker_heights Array(Float64),\n p50_marker_positions Array(UInt64),\n p50_desired_marker_positions Array(Float64),\n p90_marker_heights Array(Float64),\n p90_marker_positions Array(UInt64),\n p90_desired_marker_positions Array(Float64),\n p99_marker_heights Array(Float64),\n p99_marker_positions Array(UInt64),\n p99_desired_marker_positions Array(Float64)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, start_time, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
|
| 3401 | 2026-03-09T10:56:12.479Z | TRAC | test_update_status (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 9ee43f72-e15f-4ba3-a020-e23e52457815
sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_histogrami16\n(\n timeseries_name String,\n timeseries_key UInt64,\n start_time DateTime64(9, 'UTC'),\n timestamp DateTime64(9, 'UTC'),\n bins Array(Int16),\n counts Array(UInt64),\n min Int16,\n max Int16,\n sum_of_samples Int64,\n squared_mean Float64,\n p50_marker_heights Array(Float64),\n p50_marker_positions Array(UInt64),\n p50_desired_marker_positions Array(Float64),\n p90_marker_heights Array(Float64),\n p90_marker_positions Array(UInt64),\n p90_desired_marker_positions Array(Float64),\n p99_marker_heights Array(Float64),\n p99_marker_positions Array(UInt64),\n p99_desired_marker_positions Array(Float64)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, start_time, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
|
| 3402 | 2026-03-09T10:56:12.482Z | TRAC | test_update_status (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 9ee43f72-e15f-4ba3-a020-e23e52457815
sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_histogramu16\n(\n timeseries_name String,\n timeseries_key UInt64,\n start_time DateTime64(9, 'UTC'),\n timestamp DateTime64(9, 'UTC'),\n bins Array(UInt16),\n counts Array(UInt64),\n min UInt16,\n max UInt16,\n sum_of_samples Int64,\n squared_mean Float64,\n p50_marker_heights Array(Float64),\n p50_marker_positions Array(UInt64),\n p50_desired_marker_positions Array(Float64),\n p90_marker_heights Array(Float64),\n p90_marker_positions Array(UInt64),\n p90_desired_marker_positions Array(Float64),\n p99_marker_heights Array(Float64),\n p99_marker_positions Array(UInt64),\n p99_desired_marker_positions Array(Float64)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, start_time, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
|
| 3403 | 2026-03-09T10:56:12.484Z | TRAC | test_update_status (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 9ee43f72-e15f-4ba3-a020-e23e52457815
sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_histogrami32\n(\n timeseries_name String,\n timeseries_key UInt64,\n start_time DateTime64(9, 'UTC'),\n timestamp DateTime64(9, 'UTC'),\n bins Array(Int32),\n counts Array(UInt64),\n min Int32,\n max Int32,\n sum_of_samples Int64,\n squared_mean Float64,\n p50_marker_heights Array(Float64),\n p50_marker_positions Array(UInt64),\n p50_desired_marker_positions Array(Float64),\n p90_marker_heights Array(Float64),\n p90_marker_positions Array(UInt64),\n p90_desired_marker_positions Array(Float64),\n p99_marker_heights Array(Float64),\n p99_marker_positions Array(UInt64),\n p99_desired_marker_positions Array(Float64)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, start_time, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
|
| 3404 | 2026-03-09T10:56:12.484Z | INFO | test_update_status (dropshot_internal): request completed
error_message_external = Service Unavailable
error_message_internal = no Oximeter instances available for assignment
latency_us = 52028
local_addr = 127.0.0.1:38163
method = POST
remote_addr = 127.0.0.1:46271
req_id = cef0e1e3-82cf-4901-ab29-89913ba643a8
response_code = 503
uri = /metrics/producers
|
| 3405 | 2026-03-09T10:56:12.486Z | DEBG | test_update_status (producer-registration-task): client response
result = Ok(Response { url: "http://127.0.0.1:38163/metrics/producers", status: 503, headers: {"content-type": "application/json", "x-request-id": "cef0e1e3-82cf-4901-ab29-89913ba643a8", "content-length": "133", "date": "Mon, 09 Mar 2026 10:56:12 GMT"} })
|
| 3406 | 2026-03-09T10:56:12.486Z | WARN | test_update_status (producer-registration-task): failed to register with Nexus, will retry
count = 0
delay = 123.173852ms
error = Error Response: status: 503 Service Unavailable; headers: {"content-type": "application/json", "x-request-id": "cef0e1e3-82cf-4901-ab29-89913ba643a8", "content-length": "133", "date": "Mon, 09 Mar 2026 10:56:12 GMT"}; value: Error { error_code: Some("ServiceNotAvailable"), message: "Service Unavailable", request_id: "cef0e1e3-82cf-4901-ab29-89913ba643a8" }
file = oximeter/producer/src/lib.rs:377
|
| 3407 | 2026-03-09T10:56:12.488Z | TRAC | test_update_status (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 9ee43f72-e15f-4ba3-a020-e23e52457815
sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_histogramu32\n(\n timeseries_name String,\n timeseries_key UInt64,\n start_time DateTime64(9, 'UTC'),\n timestamp DateTime64(9, 'UTC'),\n bins Array(UInt32),\n counts Array(UInt64),\n min UInt32,\n max UInt32,\n sum_of_samples Int64,\n squared_mean Float64,\n p50_marker_heights Array(Float64),\n p50_marker_positions Array(UInt64),\n p50_desired_marker_positions Array(Float64),\n p90_marker_heights Array(Float64),\n p90_marker_positions Array(UInt64),\n p90_desired_marker_positions Array(Float64),\n p99_marker_heights Array(Float64),\n p99_marker_positions Array(UInt64),\n p99_desired_marker_positions Array(Float64)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, start_time, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
|
| 3408 | 2026-03-09T10:56:12.491Z | TRAC | test_update_status (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 9ee43f72-e15f-4ba3-a020-e23e52457815
sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_histogrami64\n(\n timeseries_name String,\n timeseries_key UInt64,\n start_time DateTime64(9, 'UTC'),\n timestamp DateTime64(9, 'UTC'),\n bins Array(Int64),\n counts Array(UInt64),\n min Int64,\n max Int64,\n sum_of_samples Int64,\n squared_mean Float64,\n p50_marker_heights Array(Float64),\n p50_marker_positions Array(UInt64),\n p50_desired_marker_positions Array(Float64),\n p90_marker_heights Array(Float64),\n p90_marker_positions Array(UInt64),\n p90_desired_marker_positions Array(Float64),\n p99_marker_heights Array(Float64),\n p99_marker_positions Array(UInt64),\n p99_desired_marker_positions Array(Float64)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, start_time, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
|
| 3409 | 2026-03-09T10:56:12.494Z | TRAC | test_update_status (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 9ee43f72-e15f-4ba3-a020-e23e52457815
sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_histogramu64\n(\n timeseries_name String,\n timeseries_key UInt64,\n start_time DateTime64(9, 'UTC'),\n timestamp DateTime64(9, 'UTC'),\n bins Array(UInt64),\n counts Array(UInt64),\n min UInt64,\n max UInt64,\n sum_of_samples Int64,\n squared_mean Float64,\n p50_marker_heights Array(Float64),\n p50_marker_positions Array(UInt64),\n p50_desired_marker_positions Array(Float64),\n p90_marker_heights Array(Float64),\n p90_marker_positions Array(UInt64),\n p90_desired_marker_positions Array(Float64),\n p99_marker_heights Array(Float64),\n p99_marker_positions Array(UInt64),\n p99_desired_marker_positions Array(Float64)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, start_time, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
|
| 3410 | 2026-03-09T10:56:12.498Z | TRAC | test_update_status (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 9ee43f72-e15f-4ba3-a020-e23e52457815
sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_histogramf32\n(\n timeseries_name String,\n timeseries_key UInt64,\n start_time DateTime64(9, 'UTC'),\n timestamp DateTime64(9, 'UTC'),\n bins Array(Float32),\n counts Array(UInt64),\n min Float32,\n max Float32,\n sum_of_samples Float64,\n squared_mean Float64,\n p50_marker_heights Array(Float64),\n p50_marker_positions Array(UInt64),\n p50_desired_marker_positions Array(Float64),\n p90_marker_heights Array(Float64),\n p90_marker_positions Array(UInt64),\n p90_desired_marker_positions Array(Float64),\n p99_marker_heights Array(Float64),\n p99_marker_positions Array(UInt64),\n p99_desired_marker_positions Array(Float64)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, start_time, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
|
| 3411 | 2026-03-09T10:56:12.502Z | TRAC | test_update_status (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 9ee43f72-e15f-4ba3-a020-e23e52457815
sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_histogramf64\n(\n timeseries_name String,\n timeseries_key UInt64,\n start_time DateTime64(9, 'UTC'),\n timestamp DateTime64(9, 'UTC'),\n bins Array(Float64),\n counts Array(UInt64),\n min Float64,\n max Float64,\n sum_of_samples Float64,\n squared_mean Float64,\n p50_marker_heights Array(Float64),\n p50_marker_positions Array(UInt64),\n p50_desired_marker_positions Array(Float64),\n p90_marker_heights Array(Float64),\n p90_marker_positions Array(UInt64),\n p90_desired_marker_positions Array(Float64),\n p99_marker_heights Array(Float64),\n p99_marker_positions Array(UInt64),\n p99_desired_marker_positions Array(Float64)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, start_time, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
|
| 3412 | 2026-03-09T10:56:12.505Z | TRAC | test_update_status (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 9ee43f72-e15f-4ba3-a020-e23e52457815
sql = \n\n/* The field tables store named dimensions of each timeseries.\n *\n * As with the measurement tables, there is one field table for each field data\n * type. Fields are deduplicated by using the "replacing merge tree", though\n * this behavior **must not** be relied upon for query correctness.\n *\n * The index for the fields differs from the measurements, however. Rows are\n * sorted by timeseries name, then field name, field value, and finally\n * timeseries key. This reflects the most common pattern for looking them up:\n * by field name and possibly value, within a timeseries. The resulting keys are\n * usually then used to look up measurements.\n *\n * NOTE: We may want to consider a secondary index on these tables, sorting by\n * timeseries name and then key, since it would improve lookups where one\n * already has the key. Realistically though, these tables are quite small and\n * so performance benefits will be low in absolute terms.\n *\n * TTL: We use a materialized column to expire old field table records. This\n * column is generated automatically by the database whenever a new row is\n * inserted. It cannot be inserted directly, nor is it returned in a `SELECT *`\n * query. Since these tables are `ReplacingMergeTree`s, that means the last\n * record will remain during a deduplication, which will have the last\n * timestamp. ClickHouse will then expire old data for us, similar to the\n * measurement tables.\n */\nCREATE TABLE IF NOT EXISTS oximeter.fields_bool\n(\n timeseries_name String,\n timeseries_key UInt64,\n field_name String,\n field_value Bool,\n last_updated_at DateTime MATERIALIZED now()\n)\nENGINE = ReplacingMergeTree()\nORDER BY (timeseries_name, field_name, field_value, timeseries_key)\nTTL last_updated_at + INTERVAL 30 DAY
|
| 3413 | 2026-03-09T10:56:12.507Z | TRAC | test_update_status (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 9ee43f72-e15f-4ba3-a020-e23e52457815
sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.fields_i8\n(\n timeseries_name String,\n timeseries_key UInt64,\n field_name String,\n field_value Int8,\n last_updated_at DateTime MATERIALIZED now()\n)\nENGINE = ReplacingMergeTree()\nORDER BY (timeseries_name, field_name, field_value, timeseries_key)\nTTL last_updated_at + INTERVAL 30 DAY
|
| 3414 | 2026-03-09T10:56:12.509Z | TRAC | test_update_status (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 9ee43f72-e15f-4ba3-a020-e23e52457815
sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.fields_u8\n(\n timeseries_name String,\n timeseries_key UInt64,\n field_name String,\n field_value UInt8,\n last_updated_at DateTime MATERIALIZED now()\n)\nENGINE = ReplacingMergeTree()\nORDER BY (timeseries_name, field_name, field_value, timeseries_key)\nTTL last_updated_at + INTERVAL 30 DAY
|
| 3415 | 2026-03-09T10:56:12.511Z | TRAC | test_update_status (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 9ee43f72-e15f-4ba3-a020-e23e52457815
sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.fields_i16\n(\n timeseries_name String,\n timeseries_key UInt64,\n field_name String,\n field_value Int16,\n last_updated_at DateTime MATERIALIZED now()\n)\nENGINE = ReplacingMergeTree()\nORDER BY (timeseries_name, field_name, field_value, timeseries_key)\nTTL last_updated_at + INTERVAL 30 DAY
|
| 3416 | 2026-03-09T10:56:12.515Z | TRAC | test_update_status (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 9ee43f72-e15f-4ba3-a020-e23e52457815
sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.fields_u16\n(\n timeseries_name String,\n timeseries_key UInt64,\n field_name String,\n field_value UInt16,\n last_updated_at DateTime MATERIALIZED now()\n)\nENGINE = ReplacingMergeTree()\nORDER BY (timeseries_name, field_name, field_value, timeseries_key)\nTTL last_updated_at + INTERVAL 30 DAY
|
| 3417 | 2026-03-09T10:56:12.517Z | TRAC | test_update_status (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 9ee43f72-e15f-4ba3-a020-e23e52457815
sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.fields_i32\n(\n timeseries_name String,\n timeseries_key UInt64,\n field_name String,\n field_value Int32,\n last_updated_at DateTime MATERIALIZED now()\n)\nENGINE = ReplacingMergeTree()\nORDER BY (timeseries_name, field_name, field_value, timeseries_key)\nTTL last_updated_at + INTERVAL 30 DAY
|
| 3418 | 2026-03-09T10:56:12.523Z | TRAC | test_update_status (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 9ee43f72-e15f-4ba3-a020-e23e52457815
sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.fields_u32\n(\n timeseries_name String,\n timeseries_key UInt64,\n field_name String,\n field_value UInt32,\n last_updated_at DateTime MATERIALIZED now()\n)\nENGINE = ReplacingMergeTree()\nORDER BY (timeseries_name, field_name, field_value, timeseries_key)\nTTL last_updated_at + INTERVAL 30 DAY
|
| 3419 | 2026-03-09T10:56:12.529Z | TRAC | test_update_status (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 9ee43f72-e15f-4ba3-a020-e23e52457815
sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.fields_i64\n(\n timeseries_name String,\n timeseries_key UInt64,\n field_name String,\n field_value Int64,\n last_updated_at DateTime MATERIALIZED now()\n)\nENGINE = ReplacingMergeTree()\nORDER BY (timeseries_name, field_name, field_value, timeseries_key)\nTTL last_updated_at + INTERVAL 30 DAY
|
| 3420 | 2026-03-09T10:56:12.534Z | TRAC | test_update_status (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 9ee43f72-e15f-4ba3-a020-e23e52457815
sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.fields_u64\n(\n timeseries_name String,\n timeseries_key UInt64,\n field_name String,\n field_value UInt64,\n last_updated_at DateTime MATERIALIZED now()\n)\nENGINE = ReplacingMergeTree()\nORDER BY (timeseries_name, field_name, field_value, timeseries_key)\nTTL last_updated_at + INTERVAL 30 DAY
|
| 3421 | 2026-03-09T10:56:12.540Z | TRAC | test_update_status (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 9ee43f72-e15f-4ba3-a020-e23e52457815
sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.fields_ipaddr\n(\n timeseries_name String,\n timeseries_key UInt64,\n field_name String,\n field_value IPv6,\n last_updated_at DateTime MATERIALIZED now()\n)\nENGINE = ReplacingMergeTree()\nORDER BY (timeseries_name, field_name, field_value, timeseries_key)\nTTL last_updated_at + INTERVAL 30 DAY
|
| 3422 | 2026-03-09T10:56:12.546Z | TRAC | test_update_status (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 9ee43f72-e15f-4ba3-a020-e23e52457815
sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.fields_string\n(\n timeseries_name String,\n timeseries_key UInt64,\n field_name String,\n field_value String,\n last_updated_at DateTime MATERIALIZED now()\n)\nENGINE = ReplacingMergeTree()\nORDER BY (timeseries_name, field_name, field_value, timeseries_key)\nTTL last_updated_at + INTERVAL 30 DAY
|
| 3423 | 2026-03-09T10:56:12.553Z | TRAC | test_update_status (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 9ee43f72-e15f-4ba3-a020-e23e52457815
sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.fields_uuid\n(\n timeseries_name String,\n timeseries_key UInt64,\n field_name String,\n field_value UUID,\n last_updated_at DateTime MATERIALIZED now()\n)\nENGINE = ReplacingMergeTree()\nORDER BY (timeseries_name, field_name, field_value, timeseries_key)\nTTL last_updated_at + INTERVAL 30 DAY
|
| 3424 | 2026-03-09T10:56:12.557Z | TRAC | test_update_status (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 9ee43f72-e15f-4ba3-a020-e23e52457815
sql = \n\n/* The timeseries schema table stores the extracted schema for the samples\n * oximeter collects.\n */\nCREATE TABLE IF NOT EXISTS oximeter.timeseries_schema\n(\n timeseries_name String,\n fields Nested(\n name String,\n type Enum(\n 'Bool' = 1,\n 'I64' = 2,\n 'IpAddr' = 3,\n 'String' = 4,\n 'Uuid' = 6,\n 'I8' = 7,\n 'U8' = 8,\n 'I16' = 9,\n 'U16' = 10,\n 'I32' = 11,\n 'U32' = 12,\n 'U64' = 13\n ),\n source Enum(\n 'Target' = 1,\n 'Metric' = 2\n )\n ),\n datum_type Enum(\n 'Bool' = 1,\n 'I64' = 2,\n 'F64' = 3,\n 'String' = 4,\n 'Bytes' = 5,\n 'CumulativeI64' = 6,\n 'CumulativeF64' = 7,\n 'HistogramI64' = 8,\n 'HistogramF64' = 9,\n 'I8' = 10,\n 'U8' = 11,\n 'I16' = 12,\n 'U16' = 13,\n 'I32' = 14,\n 'U32' = 15,\n 'U64' = 16,\n 'F32' = 17,\n 'CumulativeU64' = 18,\n 'CumulativeF32' = 19,\n 'HistogramI8' = 20,\n 'HistogramU8' = 21,\n 'HistogramI16' = 22,\n 'HistogramU16' = 23,\n 'HistogramI32' = 24,\n 'HistogramU32' = 25,\n 'HistogramU64' = 26,\n 'HistogramF32' = 27\n ),\n created DateTime64(9, 'UTC')\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, fields.name)
|
| 3425 | 2026-03-09T10:56:12.565Z | INFO | test_update_status (clickhouse-client): inserting current version
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
file = oximeter/db/src/client/mod.rs:831
id = 9ee43f72-e15f-4ba3-a020-e23e52457815
version = 14
|
| 3426 | 2026-03-09T10:56:12.565Z | TRAC | test_update_status (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 9ee43f72-e15f-4ba3-a020-e23e52457815
sql = INSERT INTO oximeter.version (*) VALUES (14, now());
|
| 3427 | 2026-03-09T10:56:12.570Z | DEBG | test_update_status (clickhouse-client): registered USDT probes
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 98cc705c-3a77-4b90-b32d-1623d97e0d01
|
| 3428 | 2026-03-09T10:56:12.573Z | DEBG | test_update_status (dropshot): registered endpoint
local_addr = [::1]:32886
method = GET
path = /info
versions = all
|
| 3429 | 2026-03-09T10:56:12.574Z | DEBG | test_update_status (dropshot): registered endpoint
local_addr = [::1]:32886
method = GET
path = /producers
versions = all
|
| 3430 | 2026-03-09T10:56:12.574Z | DEBG | test_update_status (dropshot): registered endpoint
local_addr = [::1]:32886
method = DELETE
path = /producers/{producer_id}
versions = all
|
| 3431 | 2026-03-09T10:56:12.574Z | DEBG | test_update_status (dropshot): registered endpoint
local_addr = [::1]:32886
method = GET
path = /producers/{producer_id}
versions = all
|
| 3432 | 2026-03-09T10:56:12.574Z | INFO | test_update_status (dropshot): listening
file = /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.7/src/server.rs:328
local_addr = [::1]:32886
|
| 3433 | 2026-03-09T10:56:12.578Z | DEBG | test_update_status (dropshot): successfully registered DTrace USDT probes
local_addr = [::1]:32886
|
| 3434 | 2026-03-09T10:56:12.579Z | DEBG | test_update_status (oximeter): registered USDT probes
|
| 3435 | 2026-03-09T10:56:12.579Z | DEBG | test_update_status (oximeter): contacting nexus
|
| 3436 | 2026-03-09T10:56:12.636Z | DEBG | test_update_status (producer-registration-task): will register with Nexus at 127.0.0.1:38163
|
| 3437 | 2026-03-09T10:56:12.688Z | DEBG | test_update_status (producer-registration-task): client request
body = Some(Body)
method = POST
uri = http://127.0.0.1:38163/metrics/producers
|
| 3438 | 2026-03-09T10:56:12.746Z | DEBG | test_update_status (oximeter): client request
body = Some(Body)
method = POST
uri = http://127.0.0.1:38163/metrics/collectors
|
| 3439 | 2026-03-09T10:56:12.916Z | INFO | test_update_status (dropshot_internal): accepted connection
local_addr = 127.0.0.1:38163
remote_addr = 127.0.0.1:59073
|
| 3440 | 2026-03-09T10:56:12.916Z | INFO | test_update_status (dropshot_internal): accepted connection
local_addr = 127.0.0.1:38163
remote_addr = 127.0.0.1:47064
|
| 3441 | 2026-03-09T10:56:12.917Z | TRAC | test_update_status (dropshot_internal): incoming request
local_addr = 127.0.0.1:38163
method = POST
remote_addr = 127.0.0.1:59073
req_id = 5b7c3fe0-66e2-46ef-843a-346255c73582
uri = /metrics/producers
|
| 3442 | 2026-03-09T10:56:12.917Z | DEBG | test_update_status (dropshot_internal): determined request API version
local_addr = 127.0.0.1:38163
method = POST
remote_addr = 127.0.0.1:59073
req_id = 5b7c3fe0-66e2-46ef-843a-346255c73582
uri = /metrics/producers
version = 1.0.0
|
| 3443 | 2026-03-09T10:56:12.917Z | TRAC | test_update_status (dropshot_internal): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
authenticated = true
local_addr = 127.0.0.1:38163
method = POST
remote_addr = 127.0.0.1:59073
req_id = 5b7c3fe0-66e2-46ef-843a-346255c73582
resource = Database
type = user_builtin
uri = /metrics/producers
user_builtin_id = 001de000-05e4-4000-8000-000000000002
|
| 3444 | 2026-03-09T10:56:12.917Z | DEBG | test_update_status (dropshot_internal): roles
authenticated = true
local_addr = 127.0.0.1:38163
method = POST
remote_addr = 127.0.0.1:59073
req_id = 5b7c3fe0-66e2-46ef-843a-346255c73582
roles = RoleSet { roles: {} }
type = user_builtin
uri = /metrics/producers
user_builtin_id = 001de000-05e4-4000-8000-000000000002
|
| 3445 | 2026-03-09T10:56:12.918Z | DEBG | test_update_status (dropshot_internal): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
authenticated = true
local_addr = 127.0.0.1:38163
method = POST
remote_addr = 127.0.0.1:59073
req_id = 5b7c3fe0-66e2-46ef-843a-346255c73582
resource = Database
result = Ok(())
type = user_builtin
uri = /metrics/producers
user_builtin_id = 001de000-05e4-4000-8000-000000000002
|
| 3446 | 2026-03-09T10:56:12.919Z | TRAC | test_update_status (dropshot_internal): incoming request
local_addr = 127.0.0.1:38163
method = POST
remote_addr = 127.0.0.1:47064
req_id = 79c3b2cb-9879-471a-956c-7da30034985a
uri = /metrics/collectors
|
| 3447 | 2026-03-09T10:56:12.919Z | DEBG | test_update_status (dropshot_internal): determined request API version
local_addr = 127.0.0.1:38163
method = POST
remote_addr = 127.0.0.1:47064
req_id = 79c3b2cb-9879-471a-956c-7da30034985a
uri = /metrics/collectors
version = 1.0.0
|
| 3448 | 2026-03-09T10:56:12.920Z | TRAC | test_update_status (dropshot_internal): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
authenticated = true
local_addr = 127.0.0.1:38163
method = POST
remote_addr = 127.0.0.1:47064
req_id = 79c3b2cb-9879-471a-956c-7da30034985a
resource = Database
type = user_builtin
uri = /metrics/collectors
user_builtin_id = 001de000-05e4-4000-8000-000000000002
|
| 3449 | 2026-03-09T10:56:12.920Z | DEBG | test_update_status (dropshot_internal): roles
authenticated = true
local_addr = 127.0.0.1:38163
method = POST
remote_addr = 127.0.0.1:47064
req_id = 79c3b2cb-9879-471a-956c-7da30034985a
roles = RoleSet { roles: {} }
type = user_builtin
uri = /metrics/collectors
user_builtin_id = 001de000-05e4-4000-8000-000000000002
|
| 3450 | 2026-03-09T10:56:12.921Z | DEBG | test_update_status (dropshot_internal): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
authenticated = true
local_addr = 127.0.0.1:38163
method = POST
remote_addr = 127.0.0.1:47064
req_id = 79c3b2cb-9879-471a-956c-7da30034985a
resource = Database
result = Ok(())
type = user_builtin
uri = /metrics/collectors
user_builtin_id = 001de000-05e4-4000-8000-000000000002
|
| 3451 | 2026-03-09T10:56:12.927Z | INFO | test_update_status (dropshot_internal): request completed
error_message_external = Service Unavailable
error_message_internal = no Oximeter instances available for assignment
latency_us = 10441
local_addr = 127.0.0.1:38163
method = POST
remote_addr = 127.0.0.1:59073
req_id = 5b7c3fe0-66e2-46ef-843a-346255c73582
response_code = 503
uri = /metrics/producers
|
| 3452 | 2026-03-09T10:56:12.927Z | INFO | test_update_status (nexus): registered new oximeter metric collection server
address = [::1]:32886
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
|
| 3453 | 2026-03-09T10:56:12.927Z | INFO | test_update_status (dropshot_internal): request completed
latency_us = 7940
local_addr = 127.0.0.1:38163
method = POST
remote_addr = 127.0.0.1:47064
req_id = 79c3b2cb-9879-471a-956c-7da30034985a
response_code = 204
uri = /metrics/collectors
|
| 3454 | 2026-03-09T10:56:12.928Z | DEBG | test_update_status (oximeter): client response
result = Ok(Response { url: "http://127.0.0.1:38163/metrics/collectors", status: 204, headers: {"x-request-id": "79c3b2cb-9879-471a-956c-7da30034985a", "date": "Mon, 09 Mar 2026 10:56:12 GMT"} })
|
| 3455 | 2026-03-09T10:56:12.928Z | DEBG | test_update_status (producer-registration-task): client response
result = Ok(Response { url: "http://127.0.0.1:38163/metrics/producers", status: 503, headers: {"content-type": "application/json", "x-request-id": "5b7c3fe0-66e2-46ef-843a-346255c73582", "content-length": "133", "date": "Mon, 09 Mar 2026 10:56:12 GMT"} })
|
| 3456 | 2026-03-09T10:56:12.928Z | WARN | test_update_status (producer-registration-task): failed to register with Nexus, will retry
count = 1
delay = 565.753578ms
error = Error Response: status: 503 Service Unavailable; headers: {"content-type": "application/json", "x-request-id": "5b7c3fe0-66e2-46ef-843a-346255c73582", "content-length": "133", "date": "Mon, 09 Mar 2026 10:56:12 GMT"}; value: Error { error_code: Some("ServiceNotAvailable"), message: "Service Unavailable", request_id: "5b7c3fe0-66e2-46ef-843a-346255c73582" }
file = oximeter/producer/src/lib.rs:377
|
| 3457 | 2026-03-09T10:56:12.928Z | INFO | test_update_status (oximeter): oximeter registered with nexus
file = oximeter/collector/src/lib.rs:427
id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
|
| 3458 | 2026-03-09T10:56:12.928Z | DEBG | test_update_status (init_with_steps): Running step start_producer_server
|
| 3459 | 2026-03-09T10:56:12.928Z | DEBG | test_update_status: Starting test metric Producer Server
|
| 3460 | 2026-03-09T10:56:12.929Z | INFO | test_update_status (oximeter-agent): starting refresh list task
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
file = oximeter/collector/src/agent.rs:554
|
| 3461 | 2026-03-09T10:56:12.931Z | INFO | test_update_status (external client test context): client request
body = Body { inner: BoxBody }
method = GET
uri = http://127.0.0.1:60487/v1/system/update/status
|
| 3462 | 2026-03-09T10:56:12.931Z | INFO | test_update_status (oximeter-agent): refreshing list of producers from Nexus
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
file = oximeter/collector/src/agent.rs:557
|
| 3463 | 2026-03-09T10:56:12.967Z | INFO | test_update_status (dropshot_external): accepted connection
local_addr = 127.0.0.1:60487
remote_addr = 127.0.0.1:40546
|
| 3464 | 2026-03-09T10:56:12.969Z | DEBG | test_update_status (oximeter): client request
body = None
method = GET
uri = http://127.0.0.1:38163/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
|
| 3465 | 2026-03-09T10:56:12.969Z | TRAC | test_update_status (dropshot_internal): incoming request
local_addr = 127.0.0.1:38163
method = GET
remote_addr = 127.0.0.1:47064
req_id = 1cac6a59-7af7-474d-95c5-2adffc53fbc8
uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
|
| 3466 | 2026-03-09T10:56:12.969Z | DEBG | test_update_status (dropshot_internal): determined request API version
local_addr = 127.0.0.1:38163
method = GET
remote_addr = 127.0.0.1:47064
req_id = 1cac6a59-7af7-474d-95c5-2adffc53fbc8
uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
version = 1.0.0
|
| 3467 | 2026-03-09T10:56:12.970Z | TRAC | test_update_status (dropshot_internal): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
authenticated = true
local_addr = 127.0.0.1:38163
method = GET
remote_addr = 127.0.0.1:47064
req_id = 1cac6a59-7af7-474d-95c5-2adffc53fbc8
resource = Database
type = user_builtin
uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
user_builtin_id = 001de000-05e4-4000-8000-000000000002
|
| 3468 | 2026-03-09T10:56:12.970Z | DEBG | test_update_status (dropshot_internal): roles
authenticated = true
local_addr = 127.0.0.1:38163
method = GET
remote_addr = 127.0.0.1:47064
req_id = 1cac6a59-7af7-474d-95c5-2adffc53fbc8
roles = RoleSet { roles: {} }
type = user_builtin
uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
user_builtin_id = 001de000-05e4-4000-8000-000000000002
|
| 3469 | 2026-03-09T10:56:12.971Z | DEBG | test_update_status (dropshot_internal): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
authenticated = true
local_addr = 127.0.0.1:38163
method = GET
remote_addr = 127.0.0.1:47064
req_id = 1cac6a59-7af7-474d-95c5-2adffc53fbc8
resource = Database
result = Ok(())
type = user_builtin
uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
user_builtin_id = 001de000-05e4-4000-8000-000000000002
|
| 3470 | 2026-03-09T10:56:12.973Z | TRAC | test_update_status (dropshot_external): incoming request
local_addr = 127.0.0.1:60487
method = GET
remote_addr = 127.0.0.1:40546
req_id = b1122ac0-7afd-4666-be7d-cff9e3f898c9
uri = /v1/system/update/status
|
| 3471 | 2026-03-09T10:56:12.973Z | DEBG | test_update_status (dropshot_external): determined request API version
local_addr = 127.0.0.1:60487
method = GET
remote_addr = 127.0.0.1:40546
req_id = b1122ac0-7afd-4666-be7d-cff9e3f898c9
uri = /v1/system/update/status
version = 2026030200.0.0
|
| 3472 | 2026-03-09T10:56:12.976Z | TRAC | test_update_status (dropshot_external): authn: trying Spoof
local_addr = 127.0.0.1:60487
method = GET
remote_addr = 127.0.0.1:40546
req_id = b1122ac0-7afd-4666-be7d-cff9e3f898c9
uri = /v1/system/update/status
|
| 3473 | 2026-03-09T10:56:12.976Z | DEBG | test_update_status (dropshot_external): looking up silo for user
local_addr = 127.0.0.1:60487
method = GET
remote_addr = 127.0.0.1:40546
req_id = b1122ac0-7afd-4666-be7d-cff9e3f898c9
silo_user_id = 001de000-05e4-4000-8000-000000004007
uri = /v1/system/update/status
|
| 3474 | 2026-03-09T10:56:12.976Z | TRAC | test_update_status (ExternalAuthn): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. })
resource = Database
|
| 3475 | 2026-03-09T10:56:12.976Z | DEBG | test_update_status (ExternalAuthn): roles
roles = RoleSet { roles: {} }
|
| 3476 | 2026-03-09T10:56:12.977Z | DEBG | test_update_status (ExternalAuthn): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 3477 | 2026-03-09T10:56:12.981Z | INFO | test_update_status (dropshot_internal): request completed
latency_us = 11859
local_addr = 127.0.0.1:38163
method = GET
remote_addr = 127.0.0.1:47064
req_id = 1cac6a59-7af7-474d-95c5-2adffc53fbc8
response_code = 200
uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
|
| 3478 | 2026-03-09T10:56:12.982Z | TRAC | test_update_status (ExternalAuthn): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. })
resource = Database
|
| 3479 | 2026-03-09T10:56:12.982Z | DEBG | test_update_status (ExternalAuthn): roles
roles = RoleSet { roles: {} }
|
| 3480 | 2026-03-09T10:56:12.982Z | DEBG | test_update_status (ExternalAuthn): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 3481 | 2026-03-09T10:56:12.984Z | DEBG | test_update_status (oximeter): client response
result = Ok(Response { url: "http://127.0.0.1:38163/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending", status: 200, headers: {"content-type": "application/json", "x-request-id": "1cac6a59-7af7-474d-95c5-2adffc53fbc8", "content-length": "29", "date": "Mon, 09 Mar 2026 10:56:12 GMT"} })
|
| 3482 | 2026-03-09T10:56:12.986Z | INFO | test_update_status (oximeter-agent): refreshed list of producers from Nexus
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
file = oximeter/collector/src/agent.rs:632
n_current_tasks = 0
n_pruned_tasks = 0
|
| 3483 | 2026-03-09T10:56:12.987Z | TRAC | test_update_status (ExternalAuthn): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. })
resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007 (silo_user), lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
|
| 3484 | 2026-03-09T10:56:12.987Z | TRAC | test_update_status (ExternalAuthn): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. }
resource_id = 001de000-5110-4000-8000-000000000000
resource_type = Silo
|
| 3485 | 2026-03-09T10:56:12.987Z | TRAC | test_update_status (ExternalAuthn): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. })
resource = Database
|
| 3486 | 2026-03-09T10:56:12.988Z | DEBG | test_update_status (ExternalAuthn): roles
roles = RoleSet { roles: {} }
|
| 3487 | 2026-03-09T10:56:12.988Z | DEBG | test_update_status (ExternalAuthn): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 3488 | 2026-03-09T10:56:12.991Z | TRAC | test_update_status (ExternalAuthn): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 3489 | 2026-03-09T10:56:12.991Z | TRAC | test_update_status (ExternalAuthn): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. })
resource = Database
|
| 3490 | 2026-03-09T10:56:12.991Z | DEBG | test_update_status (ExternalAuthn): roles
roles = RoleSet { roles: {} }
|
| 3491 | 2026-03-09T10:56:12.991Z | DEBG | test_update_status (ExternalAuthn): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 3492 | 2026-03-09T10:56:12.997Z | DEBG | test_update_status (ExternalAuthn): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
|
| 3493 | 2026-03-09T10:56:13.005Z | DEBG | test_update_status (ExternalAuthn): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. })
resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007 (silo_user), lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
result = Ok(())
|
| 3494 | 2026-03-09T10:56:13.005Z | TRAC | test_update_status (ExternalAuthn): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. })
resource = Database
|
| 3495 | 2026-03-09T10:56:13.006Z | INFO | test_update_status (dropshot_internal): accepted connection
local_addr = 127.0.0.1:38163
remote_addr = 127.0.0.1:36975
|
| 3496 | 2026-03-09T10:56:13.006Z | DEBG | test_update_status (ExternalAuthn): roles
roles = RoleSet { roles: {} }
|
| 3497 | 2026-03-09T10:56:13.006Z | TRAC | test_update_status (dropshot_internal): incoming request
local_addr = 127.0.0.1:38163
method = POST
remote_addr = 127.0.0.1:36975
req_id = f322ef41-c833-4b03-9dbe-1721fd7f6efa
uri = /metrics/producers
|
| 3498 | 2026-03-09T10:56:13.006Z | DEBG | test_update_status (dropshot_internal): determined request API version
local_addr = 127.0.0.1:38163
method = POST
remote_addr = 127.0.0.1:36975
req_id = f322ef41-c833-4b03-9dbe-1721fd7f6efa
uri = /metrics/producers
version = 1.0.0
|
| 3499 | 2026-03-09T10:56:13.006Z | TRAC | test_update_status (dropshot_internal): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
authenticated = true
local_addr = 127.0.0.1:38163
method = POST
remote_addr = 127.0.0.1:36975
req_id = f322ef41-c833-4b03-9dbe-1721fd7f6efa
resource = Database
type = user_builtin
uri = /metrics/producers
user_builtin_id = 001de000-05e4-4000-8000-000000000002
|
| 3500 | 2026-03-09T10:56:13.006Z | DEBG | test_update_status (dropshot_internal): roles
authenticated = true
local_addr = 127.0.0.1:38163
method = POST
remote_addr = 127.0.0.1:36975
req_id = f322ef41-c833-4b03-9dbe-1721fd7f6efa
roles = RoleSet { roles: {} }
type = user_builtin
uri = /metrics/producers
user_builtin_id = 001de000-05e4-4000-8000-000000000002
|
| 3501 | 2026-03-09T10:56:13.006Z | DEBG | test_update_status (ExternalAuthn): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 3502 | 2026-03-09T10:56:13.010Z | DEBG | test_update_status (dropshot_internal): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
authenticated = true
local_addr = 127.0.0.1:38163
method = POST
remote_addr = 127.0.0.1:36975
req_id = f322ef41-c833-4b03-9dbe-1721fd7f6efa
resource = Database
result = Ok(())
type = user_builtin
uri = /metrics/producers
user_builtin_id = 001de000-05e4-4000-8000-000000000002
|
| 3503 | 2026-03-09T10:56:13.012Z | TRAC | test_update_status (ExternalAuthn): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. })
resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
|
| 3504 | 2026-03-09T10:56:13.015Z | TRAC | test_update_status (ExternalAuthn): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. }
resource_id = 001de000-5110-4000-8000-000000000000
resource_type = Silo
|
| 3505 | 2026-03-09T10:56:13.016Z | TRAC | test_update_status (ExternalAuthn): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. })
resource = Database
|
| 3506 | 2026-03-09T10:56:13.021Z | DEBG | test_update_status (ExternalAuthn): roles
roles = RoleSet { roles: {} }
|
| 3507 | 2026-03-09T10:56:13.024Z | DEBG | test_update_status (ExternalAuthn): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 3508 | 2026-03-09T10:56:13.028Z | TRAC | test_update_status (ExternalAuthn): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 3509 | 2026-03-09T10:56:13.029Z | TRAC | test_update_status (ExternalAuthn): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. })
resource = Database
|
| 3510 | 2026-03-09T10:56:13.029Z | DEBG | test_update_status (ExternalAuthn): roles
roles = RoleSet { roles: {} }
|
| 3511 | 2026-03-09T10:56:13.029Z | DEBG | test_update_status (ExternalAuthn): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 3512 | 2026-03-09T10:56:13.034Z | DEBG | test_update_status (ExternalAuthn): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
|
| 3513 | 2026-03-09T10:56:13.037Z | DEBG | test_update_status (ExternalAuthn): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. })
resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
result = Ok(())
|
| 3514 | 2026-03-09T10:56:13.037Z | TRAC | test_update_status (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }, device_token_expiration: None, credential_id: None }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [Spoof] })
local_addr = 127.0.0.1:60487
method = GET
remote_addr = 127.0.0.1:40546
req_id = b1122ac0-7afd-4666-be7d-cff9e3f898c9
uri = /v1/system/update/status
|
| 3515 | 2026-03-09T10:56:13.038Z | TRAC | test_update_status (dropshot_external): authorize begin
action = Read
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
local_addr = 127.0.0.1:60487
method = GET
remote_addr = 127.0.0.1:40546
req_id = b1122ac0-7afd-4666-be7d-cff9e3f898c9
resource = TargetReleaseConfig
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
uri = /v1/system/update/status
|
| 3516 | 2026-03-09T10:56:13.038Z | TRAC | test_update_status (dropshot_external): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }
authenticated = true
local_addr = 127.0.0.1:60487
method = GET
remote_addr = 127.0.0.1:40546
req_id = b1122ac0-7afd-4666-be7d-cff9e3f898c9
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
uri = /v1/system/update/status
|
| 3517 | 2026-03-09T10:56:13.038Z | TRAC | test_update_status (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
local_addr = 127.0.0.1:60487
method = GET
remote_addr = 127.0.0.1:40546
req_id = b1122ac0-7afd-4666-be7d-cff9e3f898c9
resource = Database
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
uri = /v1/system/update/status
|
| 3518 | 2026-03-09T10:56:13.038Z | DEBG | test_update_status (dropshot_external): roles
authenticated = true
local_addr = 127.0.0.1:60487
method = GET
remote_addr = 127.0.0.1:40546
req_id = b1122ac0-7afd-4666-be7d-cff9e3f898c9
roles = RoleSet { roles: {} }
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
uri = /v1/system/update/status
|
| 3519 | 2026-03-09T10:56:13.038Z | DEBG | test_update_status (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
local_addr = 127.0.0.1:60487
method = GET
remote_addr = 127.0.0.1:40546
req_id = b1122ac0-7afd-4666-be7d-cff9e3f898c9
resource = Database
result = Ok(())
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
uri = /v1/system/update/status
|
| 3520 | 2026-03-09T10:56:13.050Z | DEBG | test_update_status (dropshot_external): roles
authenticated = true
local_addr = 127.0.0.1:60487
method = GET
remote_addr = 127.0.0.1:40546
req_id = b1122ac0-7afd-4666-be7d-cff9e3f898c9
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
uri = /v1/system/update/status
|
| 3521 | 2026-03-09T10:56:13.055Z | DEBG | test_update_status (dropshot_external): authorize result
action = Read
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
local_addr = 127.0.0.1:60487
method = GET
remote_addr = 127.0.0.1:40546
req_id = b1122ac0-7afd-4666-be7d-cff9e3f898c9
resource = TargetReleaseConfig
result = Ok(())
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
uri = /v1/system/update/status
|
| 3522 | 2026-03-09T10:56:13.056Z | TRAC | test_update_status (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
local_addr = 127.0.0.1:60487
method = GET
remote_addr = 127.0.0.1:40546
req_id = b1122ac0-7afd-4666-be7d-cff9e3f898c9
resource = Database
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
uri = /v1/system/update/status
|
| 3523 | 2026-03-09T10:56:13.056Z | DEBG | test_update_status (dropshot_external): roles
authenticated = true
local_addr = 127.0.0.1:60487
method = GET
remote_addr = 127.0.0.1:40546
req_id = b1122ac0-7afd-4666-be7d-cff9e3f898c9
roles = RoleSet { roles: {} }
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
uri = /v1/system/update/status
|
| 3524 | 2026-03-09T10:56:13.056Z | DEBG | test_update_status (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
local_addr = 127.0.0.1:60487
method = GET
remote_addr = 127.0.0.1:40546
req_id = b1122ac0-7afd-4666-be7d-cff9e3f898c9
resource = Database
result = Ok(())
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
uri = /v1/system/update/status
|
| 3525 | 2026-03-09T10:56:13.060Z | TRAC | test_update_status (dropshot_external): authorize begin
action = Read
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
local_addr = 127.0.0.1:60487
method = GET
remote_addr = 127.0.0.1:40546
req_id = b1122ac0-7afd-4666-be7d-cff9e3f898c9
resource = Inventory
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
uri = /v1/system/update/status
|
| 3526 | 2026-03-09T10:56:13.060Z | TRAC | test_update_status (dropshot_external): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }
authenticated = true
local_addr = 127.0.0.1:60487
method = GET
remote_addr = 127.0.0.1:40546
req_id = b1122ac0-7afd-4666-be7d-cff9e3f898c9
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
uri = /v1/system/update/status
|
| 3527 | 2026-03-09T10:56:13.060Z | TRAC | test_update_status (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
local_addr = 127.0.0.1:60487
method = GET
remote_addr = 127.0.0.1:40546
req_id = b1122ac0-7afd-4666-be7d-cff9e3f898c9
resource = Database
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
uri = /v1/system/update/status
|
| 3528 | 2026-03-09T10:56:13.060Z | DEBG | test_update_status (dropshot_external): roles
authenticated = true
local_addr = 127.0.0.1:60487
method = GET
remote_addr = 127.0.0.1:40546
req_id = b1122ac0-7afd-4666-be7d-cff9e3f898c9
roles = RoleSet { roles: {} }
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
uri = /v1/system/update/status
|
| 3529 | 2026-03-09T10:56:13.060Z | INFO | test_update_status (nexus): assigned collector to new producer
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
producer_id = a6458b7d-87c3-4483-be96-854d814c20de
|
| 3530 | 2026-03-09T10:56:13.060Z | INFO | test_update_status (dropshot_internal): request completed
latency_us = 54080
local_addr = 127.0.0.1:38163
method = POST
remote_addr = 127.0.0.1:36975
req_id = f322ef41-c833-4b03-9dbe-1721fd7f6efa
response_code = 201
uri = /metrics/producers
|
| 3531 | 2026-03-09T10:56:13.060Z | DEBG | test_update_status (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
local_addr = 127.0.0.1:60487
method = GET
remote_addr = 127.0.0.1:40546
req_id = b1122ac0-7afd-4666-be7d-cff9e3f898c9
resource = Database
result = Ok(())
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
uri = /v1/system/update/status
|
| 3532 | 2026-03-09T10:56:13.076Z | DEBG | test_update_status (dropshot_external): roles
authenticated = true
local_addr = 127.0.0.1:60487
method = GET
remote_addr = 127.0.0.1:40546
req_id = b1122ac0-7afd-4666-be7d-cff9e3f898c9
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
uri = /v1/system/update/status
|
| 3533 | 2026-03-09T10:56:13.080Z | DEBG | test_update_status (dropshot_external): authorize result
action = Read
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
local_addr = 127.0.0.1:60487
method = GET
remote_addr = 127.0.0.1:40546
req_id = b1122ac0-7afd-4666-be7d-cff9e3f898c9
resource = Inventory
result = Ok(())
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
uri = /v1/system/update/status
|
| 3534 | 2026-03-09T10:56:13.080Z | TRAC | test_update_status (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
local_addr = 127.0.0.1:60487
method = GET
remote_addr = 127.0.0.1:40546
req_id = b1122ac0-7afd-4666-be7d-cff9e3f898c9
resource = Database
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
uri = /v1/system/update/status
|
| 3535 | 2026-03-09T10:56:13.080Z | DEBG | test_update_status (dropshot_external): roles
authenticated = true
local_addr = 127.0.0.1:60487
method = GET
remote_addr = 127.0.0.1:40546
req_id = b1122ac0-7afd-4666-be7d-cff9e3f898c9
roles = RoleSet { roles: {} }
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
uri = /v1/system/update/status
|
| 3536 | 2026-03-09T10:56:13.081Z | DEBG | test_update_status (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
local_addr = 127.0.0.1:60487
method = GET
remote_addr = 127.0.0.1:40546
req_id = b1122ac0-7afd-4666-be7d-cff9e3f898c9
resource = Database
result = Ok(())
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
uri = /v1/system/update/status
|
| 3537 | 2026-03-09T10:56:13.085Z | INFO | test_update_status (dropshot_external): request completed
error_message_external = Internal Server Error
error_message_internal = No inventory collection found
latency_us = 111222
local_addr = 127.0.0.1:60487
method = GET
remote_addr = 127.0.0.1:40546
req_id = b1122ac0-7afd-4666-be7d-cff9e3f898c9
response_code = 500
uri = /v1/system/update/status
|
| 3538 | 2026-03-09T10:56:13.085Z | INFO | test_update_status (external client test context): client received response
status = 500
|