Max level shown:
1 [ Mar 24 18:29:45 Enabled. ]
2 [ Mar 24 18:29:45 Rereading configuration. ]
3 [ Mar 24 18:29:46 Rereading configuration. ]
4 [ Mar 24 18:29:53 Executing start method ("ctrun -l child -o noorphan,regent /opt/oxide/omicron-nexus/bin/nexus /var/svc/manifest/site/nexus/config.toml &"). ]
5 [ Mar 24 18:29:53 Method "start" exited with status 0. ]
6 note: configured to log to "/dev/stdout"
72026-03-24T18:29:54.712ZDEBGnexus: registered DTrace probes
82026-03-24T18:29:54.715ZINFOnexus: setting up nexus server file = nexus/src/lib.rs:88
92026-03-24T18:29:54.730ZINFOnexus (ServerContext): registering Oso class class = Action file = nexus/auth/src/authz/oso_generic.rs:68
102026-03-24T18:29:54.731ZINFOnexus (ServerContext): registering Oso class class = AuditLog file = nexus/auth/src/authz/oso_generic.rs:68
112026-03-24T18:29:54.731ZINFOnexus (ServerContext): registering Oso class class = AnyActor file = nexus/auth/src/authz/oso_generic.rs:68
122026-03-24T18:29:54.731ZINFOnexus (ServerContext): registering Oso class class = AuthenticatedActor file = nexus/auth/src/authz/oso_generic.rs:68
132026-03-24T18:29:54.731ZINFOnexus (ServerContext): registering Oso class class = BlueprintConfig file = nexus/auth/src/authz/oso_generic.rs:68
142026-03-24T18:29:54.731ZINFOnexus (ServerContext): registering Oso class class = Database file = nexus/auth/src/authz/oso_generic.rs:68
152026-03-24T18:29:54.731ZINFOnexus (ServerContext): registering Oso class class = DnsConfig file = nexus/auth/src/authz/oso_generic.rs:68
162026-03-24T18:29:54.731ZINFOnexus (ServerContext): registering Oso class class = Fleet file = nexus/auth/src/authz/oso_generic.rs:68
172026-03-24T18:29:54.732ZINFOnexus (ServerContext): registering Oso class class = Inventory file = nexus/auth/src/authz/oso_generic.rs:68
182026-03-24T18:29:54.732ZINFOnexus (ServerContext): registering Oso class class = IpPoolList file = nexus/auth/src/authz/oso_generic.rs:68
192026-03-24T18:29:54.732ZINFOnexus (ServerContext): registering Oso class class = VpcList file = nexus/auth/src/authz/oso_generic.rs:68
202026-03-24T18:29:54.732ZINFOnexus (ServerContext): registering Oso class class = ConsoleSessionList file = nexus/auth/src/authz/oso_generic.rs:68
212026-03-24T18:29:54.732ZINFOnexus (ServerContext): registering Oso class class = DeviceAuthRequestList file = nexus/auth/src/authz/oso_generic.rs:68
222026-03-24T18:29:54.732ZINFOnexus (ServerContext): registering Oso class class = QuiesceState file = nexus/auth/src/authz/oso_generic.rs:68
232026-03-24T18:29:54.732ZINFOnexus (ServerContext): registering Oso class class = SiloCertificateList file = nexus/auth/src/authz/oso_generic.rs:68
242026-03-24T18:29:54.732ZINFOnexus (ServerContext): registering Oso class class = SiloGroupList file = nexus/auth/src/authz/oso_generic.rs:68
252026-03-24T18:29:54.732ZINFOnexus (ServerContext): registering Oso class class = SiloIdentityProviderList file = nexus/auth/src/authz/oso_generic.rs:68
262026-03-24T18:29:54.732ZINFOnexus (ServerContext): registering Oso class class = SiloUserList file = nexus/auth/src/authz/oso_generic.rs:68
272026-03-24T18:29:54.732ZINFOnexus (ServerContext): registering Oso class class = SiloUserSessionList file = nexus/auth/src/authz/oso_generic.rs:68
282026-03-24T18:29:54.732ZINFOnexus (ServerContext): registering Oso class class = SiloUserTokenList file = nexus/auth/src/authz/oso_generic.rs:68
292026-03-24T18:29:54.732ZINFOnexus (ServerContext): registering Oso class class = SubnetPoolList file = nexus/auth/src/authz/oso_generic.rs:68
302026-03-24T18:29:54.732ZINFOnexus (ServerContext): registering Oso class class = UpdateTrustRootList file = nexus/auth/src/authz/oso_generic.rs:68
312026-03-24T18:29:54.732ZINFOnexus (ServerContext): registering Oso class class = TargetReleaseConfig file = nexus/auth/src/authz/oso_generic.rs:68
322026-03-24T18:29:54.732ZINFOnexus (ServerContext): registering Oso class class = AlertClassList file = nexus/auth/src/authz/oso_generic.rs:68
332026-03-24T18:29:54.732ZINFOnexus (ServerContext): registering Oso class class = ScimClientBearerTokenList file = nexus/auth/src/authz/oso_generic.rs:68
342026-03-24T18:29:54.732ZINFOnexus (ServerContext): registering Oso class class = MulticastGroupList file = nexus/auth/src/authz/oso_generic.rs:68
352026-03-24T18:29:54.733ZINFOnexus (ServerContext): registering Oso class class = Project file = nexus/auth/src/authz/oso_generic.rs:68
362026-03-24T18:29:54.733ZINFOnexus (ServerContext): registering Oso class class = Disk file = nexus/auth/src/authz/oso_generic.rs:68
372026-03-24T18:29:54.733ZINFOnexus (ServerContext): registering Oso class class = Snapshot file = nexus/auth/src/authz/oso_generic.rs:68
382026-03-24T18:29:54.733ZINFOnexus (ServerContext): registering Oso class class = ProjectImage file = nexus/auth/src/authz/oso_generic.rs:68
392026-03-24T18:29:54.733ZINFOnexus (ServerContext): registering Oso class class = AffinityGroup file = nexus/auth/src/authz/oso_generic.rs:68
402026-03-24T18:29:54.733ZINFOnexus (ServerContext): registering Oso class class = AntiAffinityGroup file = nexus/auth/src/authz/oso_generic.rs:68
412026-03-24T18:29:54.733ZINFOnexus (ServerContext): registering Oso class class = Instance file = nexus/auth/src/authz/oso_generic.rs:68
422026-03-24T18:29:54.733ZINFOnexus (ServerContext): registering Oso class class = IpPool file = nexus/auth/src/authz/oso_generic.rs:68
432026-03-24T18:29:54.733ZINFOnexus (ServerContext): registering Oso class class = InstanceNetworkInterface file = nexus/auth/src/authz/oso_generic.rs:68
442026-03-24T18:29:54.733ZINFOnexus (ServerContext): registering Oso class class = Vpc file = nexus/auth/src/authz/oso_generic.rs:68
452026-03-24T18:29:54.733ZINFOnexus (ServerContext): registering Oso class class = VpcRouter file = nexus/auth/src/authz/oso_generic.rs:68
462026-03-24T18:29:54.733ZINFOnexus (ServerContext): registering Oso class class = InternetGateway file = nexus/auth/src/authz/oso_generic.rs:68
472026-03-24T18:29:54.733ZINFOnexus (ServerContext): registering Oso class class = InternetGatewayIpPool file = nexus/auth/src/authz/oso_generic.rs:68
482026-03-24T18:29:54.734ZINFOnexus (ServerContext): registering Oso class class = InternetGatewayIpAddress file = nexus/auth/src/authz/oso_generic.rs:68
492026-03-24T18:29:54.734ZINFOnexus (ServerContext): registering Oso class class = RouterRoute file = nexus/auth/src/authz/oso_generic.rs:68
502026-03-24T18:29:54.734ZINFOnexus (ServerContext): registering Oso class class = VpcSubnet file = nexus/auth/src/authz/oso_generic.rs:68
512026-03-24T18:29:54.734ZINFOnexus (ServerContext): registering Oso class class = FloatingIp file = nexus/auth/src/authz/oso_generic.rs:68
522026-03-24T18:29:54.734ZINFOnexus (ServerContext): registering Oso class class = ExternalSubnet file = nexus/auth/src/authz/oso_generic.rs:68
532026-03-24T18:29:54.734ZINFOnexus (ServerContext): registering Oso class class = Image file = nexus/auth/src/authz/oso_generic.rs:68
542026-03-24T18:29:54.734ZINFOnexus (ServerContext): registering Oso class class = SiloImage file = nexus/auth/src/authz/oso_generic.rs:68
552026-03-24T18:29:54.734ZINFOnexus (ServerContext): registering Oso class class = AddressLot file = nexus/auth/src/authz/oso_generic.rs:68
562026-03-24T18:29:54.734ZINFOnexus (ServerContext): registering Oso class class = Blueprint file = nexus/auth/src/authz/oso_generic.rs:68
572026-03-24T18:29:54.734ZINFOnexus (ServerContext): registering Oso class class = LoopbackAddress file = nexus/auth/src/authz/oso_generic.rs:68
582026-03-24T18:29:54.734ZINFOnexus (ServerContext): registering Oso class class = Certificate file = nexus/auth/src/authz/oso_generic.rs:68
592026-03-24T18:29:54.734ZINFOnexus (ServerContext): registering Oso class class = ConsoleSession file = nexus/auth/src/authz/oso_generic.rs:68
602026-03-24T18:29:54.734ZINFOnexus (ServerContext): registering Oso class class = DeviceAuthRequest file = nexus/auth/src/authz/oso_generic.rs:68
612026-03-24T18:29:54.734ZINFOnexus (ServerContext): registering Oso class class = DeviceAccessToken file = nexus/auth/src/authz/oso_generic.rs:68
622026-03-24T18:29:54.734ZINFOnexus (ServerContext): registering Oso class class = PhysicalDisk file = nexus/auth/src/authz/oso_generic.rs:68
632026-03-24T18:29:54.734ZINFOnexus (ServerContext): registering Oso class class = Rack file = nexus/auth/src/authz/oso_generic.rs:68
642026-03-24T18:29:54.734ZINFOnexus (ServerContext): registering Oso class class = SshKey file = nexus/auth/src/authz/oso_generic.rs:68
652026-03-24T18:29:54.734ZINFOnexus (ServerContext): registering Oso class class = Silo file = nexus/auth/src/authz/oso_generic.rs:68
662026-03-24T18:29:54.734ZINFOnexus (ServerContext): registering Oso class class = SiloUser file = nexus/auth/src/authz/oso_generic.rs:68
672026-03-24T18:29:54.734ZINFOnexus (ServerContext): registering Oso class class = SiloGroup file = nexus/auth/src/authz/oso_generic.rs:68
682026-03-24T18:29:54.734ZINFOnexus (ServerContext): registering Oso class class = SupportBundle file = nexus/auth/src/authz/oso_generic.rs:68
692026-03-24T18:29:54.734ZINFOnexus (ServerContext): registering Oso class class = IdentityProvider file = nexus/auth/src/authz/oso_generic.rs:68
702026-03-24T18:29:54.734ZINFOnexus (ServerContext): registering Oso class class = SamlIdentityProvider file = nexus/auth/src/authz/oso_generic.rs:68
712026-03-24T18:29:54.734ZINFOnexus (ServerContext): registering Oso class class = Sled file = nexus/auth/src/authz/oso_generic.rs:68
722026-03-24T18:29:54.734ZINFOnexus (ServerContext): registering Oso class class = SubnetPool file = nexus/auth/src/authz/oso_generic.rs:68
732026-03-24T18:29:54.734ZINFOnexus (ServerContext): registering Oso class class = TufRepo file = nexus/auth/src/authz/oso_generic.rs:68
742026-03-24T18:29:54.734ZINFOnexus (ServerContext): registering Oso class class = TufArtifact file = nexus/auth/src/authz/oso_generic.rs:68
752026-03-24T18:29:54.734ZINFOnexus (ServerContext): registering Oso class class = TufTrustRoot file = nexus/auth/src/authz/oso_generic.rs:68
762026-03-24T18:29:54.734ZINFOnexus (ServerContext): registering Oso class class = Alert file = nexus/auth/src/authz/oso_generic.rs:68
772026-03-24T18:29:54.735ZINFOnexus (ServerContext): registering Oso class class = AlertReceiver file = nexus/auth/src/authz/oso_generic.rs:68
782026-03-24T18:29:54.735ZINFOnexus (ServerContext): registering Oso class class = WebhookSecret file = nexus/auth/src/authz/oso_generic.rs:68
792026-03-24T18:29:54.735ZINFOnexus (ServerContext): registering Oso class class = Zpool file = nexus/auth/src/authz/oso_generic.rs:68
802026-03-24T18:29:54.735ZINFOnexus (ServerContext): registering Oso class class = Service file = nexus/auth/src/authz/oso_generic.rs:68
812026-03-24T18:29:54.735ZINFOnexus (ServerContext): registering Oso class class = UserBuiltin file = nexus/auth/src/authz/oso_generic.rs:68
822026-03-24T18:29:54.735ZINFOnexus (ServerContext): registering Oso class class = ScimClientBearerToken file = nexus/auth/src/authz/oso_generic.rs:68
832026-03-24T18:29:54.735ZINFOnexus (ServerContext): registering Oso class class = MulticastGroup file = nexus/auth/src/authz/oso_generic.rs:68
842026-03-24T18:29:54.735ZINFOnexus (ServerContext): full Oso configuration config = #\n# Oso configuration for Omicron\n# This file is augmented by generated snippets.\n#\n\n#\n# ACTOR TYPES AND BASIC RULES\n#\n\n# `AnyActor` includes both authenticated and unauthenticated users.\nactor AnyActor {}\n\n# An `AuthenticatedActor` has an identity in the system. All of our operations\n# today require that an actor be authenticated.\nactor AuthenticatedActor {}\n\n# For any resource, `actor` can perform action `action` on it if they're\n# authenticated and their role(s) give them the corresponding permission on that\n# resource.\nallow(actor: AnyActor, action: Action, resource) if\n actor.authenticated and\n has_permission(actor.authn_actor.unwrap(), action.to_perm(), resource);\n\n# Define role relationships\nhas_role(actor: AuthenticatedActor, role: String, resource: Resource)\n\tif resource.has_role(actor, role);\n\n#\n# ROLES AND PERMISSIONS IN THE FLEET/SILO/PROJECT HIERARCHY\n#\n# We define the following permissions for most resources in the system:\n#\n# - "create_child": required to create child resources (of any type)\n#\n# - "list_children": required to list child resources (of all types) of a\n# resource\n#\n# - "modify": required to modify or delete a resource\n#\n# - "read": required to read a resource\n#\n# We define the following predefined roles for only a few high-level resources:\n# the Fleet (see below), Silo, Organization, and Project. The specific roles\n# are oriented around intended use-cases:\n#\n# - "admin": has all permissions on the resource\n#\n# - "collaborator": has "read", "list_children", and "create_child", plus\n# the "admin" role for child resources. The idea is that if you're an\n# Organization Collaborator, you have full control over the Projects within\n# the Organization, but you cannot modify or delete the Organization itself.\n#\n# - "viewer": has "read" and "list_children" on a resource\n#\n# Below the Project level, permissions are granted via roles at the Project\n# level. For example, for someone to be able to create, modify, or delete any\n# Instances, they must be granted project.collaborator, which means they can\n# create, modify, or delete _all_ resources in the Project.\n#\n# The complete set of predefined roles:\n#\n# - fleet.admin (superuser for the whole system)\n# - fleet.collaborator (can manage Silos)\n# - fleet.viewer (can read most non-siloed resources in the system)\n# - silo.admin (superuser for the silo)\n# - silo.collaborator (can create and own Organizations; grants project.admin on all projects)\n# - silo.limited-collaborator (grants project.limited-collaborator on all projects)\n# - silo.viewer (can read most resources within the Silo; grants project.viewer)\n# - organization.admin (complete control over an organization)\n# - organization.collaborator (can manage Projects)\n# - organization.viewer (can read most resources within the Organization)\n# - project.admin (complete control over a Project)\n# - project.collaborator (can manage all resources within the Project, including networking)\n# - project.limited-collaborator (can manage compute resources, but not networking resources)\n# - project.viewer (can read most resources within the Project)\n#\n# Outside the Silo/Organization/Project hierarchy, we (currently) treat most\n# resources as nested under Fleet or else a synthetic resource (see below). We\n# do not yet support role assignments on anything other than Fleet, Silo,\n# Organization, or Project.\n#\n\n# "Fleet" is a global singleton representing the whole system. The name comes\n# from the idea described in RFD 24, but it's not quite right. This probably\n# should be more like "Region" or "AvailabilityZone". The precise boundaries\n# have not yet been figured out.\nresource Fleet {\n\tpermissions = [\n\t "list_children",\n\t "modify",\n\t "read",\n\t "create_child",\n\t];\n\n\troles = [\n\t # Roles that can be attached by users\n\t "admin",\n\t "collaborator",\n\t "viewer",\n\n\t # Internal-only roles\n\t "external-authenticator"\n\t];\n\n\t# Roles implied by other roles on this resource\n\t"viewer" if "collaborator";\n\t"collaborator" if "admin";\n\n\t# Permissions granted directly by roles on this resource\n\t"list_children" if "viewer";\n\t"read" if "viewer";\n\t"create_child" if "collaborator";\n\t"modify" if "admin";\n}\n\n# For fleets specifically, roles can be conferred by roles on the user's Silo.\n# Note that certain Actors may not ever have any roles assigned to them, like\n# SCIM Actors.\nhas_role(actor: AuthenticatedActor, role: String, _: Fleet) if\n\tsilo_role in actor.confers_fleet_role(role) and\n\thas_role(actor, silo_role, actor.silo.unwrap());\n\nresource Silo {\n\tpermissions = [\n\t "list_children",\n\t "modify",\n\t "read",\n\t "create_child",\n\t];\n\troles = [ "admin", "collaborator", "limited-collaborator", "viewer" ];\n\n\t# Roles implied by other roles on this resource\n\t"viewer" if "limited-collaborator";\n\t"limited-collaborator" if "collaborator";\n\t"collaborator" if "admin";\n\n\t# Permissions granted directly by roles on this resource\n\t"list_children" if "viewer";\n\t"read" if "viewer";\n\n\t"create_child" if "collaborator";\n\t"modify" if "admin";\n\n\t# Permissions implied by roles on this resource's parent (Fleet). Fleet\n\t# privileges allow a user to see and potentially administer the Silo,\n\t# but they do not give anyone permission to look at anything inside the\n\t# Silo. To achieve this, we use permission rules here. (If we granted\n\t# Fleet administrators _roles_ on the Silo, then those would cascade\n\t# into the Silo as well.)\n\trelations = { parent_fleet: Fleet };\n\t"read" if "viewer" on "parent_fleet";\n\t"modify" if "collaborator" on "parent_fleet";\n\n\t# external authenticator has to create silo users\n\t"list_children" if "external-authenticator" on "parent_fleet";\n\t"create_child" if "external-authenticator" on "parent_fleet";\n}\n\nhas_relation(fleet: Fleet, "parent_fleet", silo: Silo)\n\tif silo.fleet = fleet;\n\n# As a special case, all authenticated users can read their own Silo. That's\n# not quite the same as having the "viewer" role. For example, they cannot list\n# Organizations in the Silo.\n#\n# One reason this is necessary is because if an unprivileged user tries to\n# create an Organization using "POST /organizations", they should get back a 403\n# (which implies they're able to see /organizations, which is essentially seeing\n# the Silo itself) rather than a 404. This behavior isn't a hard constraint\n# (i.e., you could reasonably get a 404 for an API you're not allowed to call).\n# Nor is the implementation (i.e., we could special-case this endpoint somehow).\n# But granting this permission is the simplest way to keep this endpoint's\n# behavior consistent with the rest of the API.\n#\n# This rule is also used to determine if a user can list the identity providers\n# in the Silo (which they should be able to), since that's predicated on being\n# able to read the Silo.\n#\n# It's unclear what else would break if users couldn't see their own Silo.\nhas_permission(actor: AuthenticatedActor, "read", silo: Silo)\n\tif actor.is_user and silo in actor.silo;\n\nresource Project {\n\tpermissions = [\n\t "list_children",\n\t "modify",\n\t "read",\n\t "create_child",\n\t];\n\troles = [ "admin", "collaborator", "limited-collaborator", "viewer" ];\n\n\t# Roles implied by other roles on this resource\n\t# Role hierarchy: admin > collaborator > limited-collaborator > viewer\n\t#\n\t# The "limited-collaborator" role can create/modify non-networking\n\t# resources (instances, disks, etc.) but cannot create/modify networking\n\t# infrastructure (VPCs, subnets, routers, internet gateways).\n\t# See nexus/authz-macros for InProjectLimited vs InProjectFull.\n\t"viewer" if "limited-collaborator";\n\t"limited-collaborator" if "collaborator";\n\t"collaborator" if "admin";\n\n\t# Permissions granted directly by roles on this resource\n\t"list_children" if "viewer";\n\t"read" if "viewer";\n\t"create_child" if "limited-collaborator";\n\t"modify" if "admin";\n\n\t# Roles implied by roles on this resource's parent (Silo)\n\trelations = { parent_silo: Silo };\n\t"admin" if "collaborator" on "parent_silo";\n\t"limited-collaborator" if "limited-collaborator" on "parent_silo";\n\t"viewer" if "viewer" on "parent_silo";\n}\nhas_relation(silo: Silo, "parent_silo", project: Project)\n\tif project.silo = silo;\n\n#\n# GENERAL RESOURCES OUTSIDE THE SILO/PROJECT HIERARCHY\n#\n# Many resources use snippets of Polar generated by the `authz_resource!` Rust\n# macro. Some resources require custom Polar code. Those appear here.\n#\n\nresource Certificate {\n\tpermissions = [ "read", "modify" ];\n\trelations = { parent_silo: Silo, parent_fleet: Fleet };\n\n\t# Fleet-level and silo-level roles both grant privileges on certificates.\n\t"read" if "admin" on "parent_silo";\n\t"modify" if "admin" on "parent_silo";\n\t"read" if "admin" on "parent_fleet";\n\t"modify" if "admin" on "parent_fleet";\n}\nhas_relation(silo: Silo, "parent_silo", certificate: Certificate)\n\tif certificate.silo = silo;\nhas_relation(fleet: Fleet, "parent_fleet", certificate: Certificate)\n\tif certificate.silo.fleet = fleet;\n\nresource SiloUser {\n\tpermissions = [\n\t "list_children",\n\t "modify",\n\t "read",\n\t "create_child",\n\t];\n\n\t# Fleet and Silo administrators can manage a Silo's users. This is one\n\t# of the only areas of Silo configuration that Fleet Administrators have\n\t# permissions on.\n\trelations = { parent_silo: Silo, parent_fleet: Fleet };\n\t"list_children" if "read" on "parent_silo";\n\t"read" if "read" on "parent_silo";\n\t"modify" if "admin" on "parent_silo";\n\t"create_child" if "admin" on "parent_silo";\n\t"list_children" if "read" on "parent_fleet";\n\t"read" if "read" on "parent_fleet";\n\t"modify" if "admin" on "parent_fleet";\n\t"create_child" if "admin" on "parent_fleet";\n}\nhas_relation(silo: Silo, "parent_silo", user: SiloUser)\n\tif user.silo = silo;\nhas_relation(fleet: Fleet, "parent_fleet", user: SiloUser)\n\tif user.silo.fleet = fleet;\n\n# authenticated actors have all permissions on themselves\nhas_permission(actor: AuthenticatedActor, _perm: String, silo_user: SiloUser)\n if actor.equals_silo_user(silo_user);\n\nhas_permission(actor: AuthenticatedActor, "read", silo_user: SiloUser)\n if actor.is_user and silo_user.silo in actor.silo;\n\nresource SiloGroup {\n\tpermissions = [\n\t "list_children",\n\t "modify",\n\t "read",\n\t "create_child",\n\t];\n\n\trelations = { parent_silo: Silo };\n\t"list_children" if "read" on "parent_silo";\n\t"read" if "read" on "parent_silo";\n\t"modify" if "admin" on "parent_silo";\n\t"create_child" if "admin" on "parent_silo";\n}\nhas_relation(silo: Silo, "parent_silo", group: SiloGroup)\n\tif group.silo = silo;\n\nresource SshKey {\n\tpermissions = [ "read", "modify" ];\n\trelations = { silo_user: SiloUser };\n\n\t"read" if "read" on "silo_user";\n}\n# We want to allow the user to modify the ssh key but disallow a SCIM IdP token\n# from doing the same.\nhas_permission(actor: AuthenticatedActor, "modify", ssh_key: SshKey)\n\tif actor.is_user and has_permission(actor, "modify", ssh_key.silo_user);\nhas_relation(user: SiloUser, "silo_user", ssh_key: SshKey)\n\tif ssh_key.silo_user = user;\n\nresource IdentityProvider {\n\tpermissions = [\n\t "read",\n\t "modify",\n\t "create_child",\n\t "list_children",\n\t];\n\trelations = { parent_silo: Silo, parent_fleet: Fleet };\n\n\t# Silo-level roles grant privileges on identity providers.\n\t"read" if "viewer" on "parent_silo";\n\t"list_children" if "viewer" on "parent_silo";\n\t"modify" if "admin" on "parent_silo";\n\t"create_child" if "admin" on "parent_silo";\n\n\t# Fleet-level roles also grant privileges on identity providers.\n\t"read" if "viewer" on "parent_fleet";\n\t"list_children" if "viewer" on "parent_fleet";\n\t"modify" if "admin" on "parent_fleet";\n\t"create_child" if "admin" on "parent_fleet";\n}\nhas_relation(silo: Silo, "parent_silo", identity_provider: IdentityProvider)\n\tif identity_provider.silo = silo;\nhas_relation(fleet: Fleet, "parent_fleet", collection: IdentityProvider)\n\tif collection.silo.fleet = fleet;\n\nresource SamlIdentityProvider {\n\tpermissions = [\n\t "read",\n\t "modify",\n\t "create_child",\n\t "list_children",\n\t];\n\trelations = { parent_silo: Silo, parent_fleet: Fleet };\n\n\t# Silo-level roles grant privileges on identity providers.\n\t"read" if "viewer" on "parent_silo";\n\t"list_children" if "viewer" on "parent_silo";\n\t"modify" if "admin" on "parent_silo";\n\t"create_child" if "admin" on "parent_silo";\n\n\t# Fleet-level roles also grant privileges on identity providers.\n\t"read" if "viewer" on "parent_fleet";\n\t"list_children" if "viewer" on "parent_fleet";\n\t"modify" if "admin" on "parent_fleet";\n\t"create_child" if "admin" on "parent_fleet";\n}\nhas_relation(silo: Silo, "parent_silo", saml_identity_provider: SamlIdentityProvider)\n\tif saml_identity_provider.silo = silo;\nhas_relation(fleet: Fleet, "parent_fleet", collection: SamlIdentityProvider)\n\tif collection.silo.fleet = fleet;\n\nresource ScimClientBearerToken {\n\tpermissions = [ "read", "modify" ];\n\trelations = { parent_silo: Silo, parent_fleet: Fleet };\n\n # necessary to authenticate SCIM actors\n\t"read" if "external-authenticator" on "parent_fleet";\n\n\t# Silo-level roles grant privileges for SCIM client tokens.\n\t"read" if "admin" on "parent_silo";\n\t"modify" if "admin" on "parent_silo";\n\n\t# Fleet-level roles also grant privileges for SCIM client tokens.\n\t"read" if "admin" on "parent_fleet";\n\t"modify" if "admin" on "parent_fleet";\n}\nhas_relation(silo: Silo, "parent_silo", scim_client_bearer_token: ScimClientBearerToken)\n\tif scim_client_bearer_token.silo = silo;\nhas_relation(fleet: Fleet, "parent_fleet", collection: ScimClientBearerToken)\n\tif collection.silo.fleet = fleet;\n\n\n#\n# SYNTHETIC RESOURCES OUTSIDE THE SILO HIERARCHY\n#\n# The resources here do not correspond to anything that appears explicitly in\n# the API or is stored in the database. These are used either at the top level\n# of the API path (e.g., "/v1/system/ip-pools") or as an implementation detail of the system\n# (in the case of console sessions and "Database"). The policies are\n# either statically-defined in this file or driven by role assignments on the\n# Fleet. None of these resources defines their own roles.\n#\n\n# Describes the quiesce state of a particular Nexus instance.\n#\n# These authz checks must not require the database. We grant this directly to\n# callers of the internal API.\nresource QuiesceState {\n\tpermissions = [ "read", "modify" ];\n}\nhas_permission(USER_INTERNAL_API: AuthenticatedActor, "read", _q: QuiesceState);\nhas_permission(\n USER_INTERNAL_API: AuthenticatedActor,\n "modify",\n _q: QuiesceState\n);\n\n# Describes the policy for reading and modifying DNS configuration\n# (both internal and external)\nresource DnsConfig {\n\tpermissions = [ "read", "modify" ];\n\trelations = { parent_fleet: Fleet };\n\t# "external-authenticator" requires these permissions because that's the\n\t# context that Nexus uses when creating and deleting Silos. These\n\t# operations necessarily need to read and modify DNS configuration.\n\t"read" if "external-authenticator" on "parent_fleet";\n\t"modify" if "external-authenticator" on "parent_fleet";\n\t# "admin" on the parent fleet also gets these permissions, primarily for\n\t# the test suite.\n\t"read" if "admin" on "parent_fleet";\n\t"modify" if "admin" on "parent_fleet";\n}\nhas_relation(fleet: Fleet, "parent_fleet", dns_config: DnsConfig)\n\tif dns_config.fleet = fleet;\n\n# Describes the policy for accessing blueprints\nresource BlueprintConfig {\n\tpermissions = [\n\t "list_children", # list blueprints\n\t "create_child", # create blueprint\n\t "read", # read the current target\n\t "modify", # change the current target\n\t];\n\n\trelations = { parent_fleet: Fleet };\n\t"create_child" if "admin" on "parent_fleet";\n\t"modify" if "admin" on "parent_fleet";\n\t"list_children" if "viewer" on "parent_fleet";\n\t"read" if "viewer" on "parent_fleet";\n}\nhas_relation(fleet: Fleet, "parent_fleet", list: BlueprintConfig)\n\tif list.fleet = fleet;\n\n# Describes the policy for accessing "/v1/system/update/trust-roots" in the API\nresource UpdateTrustRootList {\n\tpermissions = [ "list_children", "create_child" ];\n\trelations = { parent_fleet: Fleet };\n\t"list_children" if "viewer" on "parent_fleet";\n\t"create_child" if "admin" on "parent_fleet";\n}\nhas_relation(fleet: Fleet, "parent_fleet", collection: UpdateTrustRootList)\n\tif collection.fleet = fleet;\n\n# Describes the policy for accessing blueprints\nresource TargetReleaseConfig {\n\tpermissions = [\n\t "read", # read the current target release\n\t "modify", # change the current target release\n\t];\n\n\trelations = { parent_fleet: Fleet };\n\t"read" if "viewer" on "parent_fleet";\n\t"modify" if "admin" on "parent_fleet";\n}\nhas_relation(fleet: Fleet, "parent_fleet", resource: TargetReleaseConfig)\n\tif resource.fleet = fleet;\n\n# Describes the policy for reading and modifying low-level inventory\nresource Inventory {\n\tpermissions = [ "read", "modify" ];\n\trelations = { parent_fleet: Fleet };\n\t"read" if "viewer" on "parent_fleet";\n\t"modify" if "admin" on "parent_fleet";\n}\nhas_relation(fleet: Fleet, "parent_fleet", inventory: Inventory)\n\tif inventory.fleet = fleet;\n\n# Describes the policy for accessing "/v1/system/ip-pools" in the API\nresource IpPoolList {\n\tpermissions = [\n\t "list_children",\n\t "modify",\n\t "create_child",\n\t];\n\n\t# Fleet Administrators can create or modify the IP Pools list.\n\trelations = { parent_fleet: Fleet };\n\t"modify" if "admin" on "parent_fleet";\n\t"create_child" if "admin" on "parent_fleet";\n\n\t# Fleet Viewers can list IP Pools\n\t"list_children" if "viewer" on "parent_fleet";\n}\nhas_relation(fleet: Fleet, "parent_fleet", ip_pool_list: IpPoolList)\n\tif ip_pool_list.fleet = fleet;\n\n# Any authenticated user can create a child of a provided IP Pool.\n# This is necessary to use the pools when provisioning instances.\nhas_permission(actor: AuthenticatedActor, "create_child", ip_pool: IpPool)\n\tif actor.is_user and silo in actor.silo and silo.fleet = ip_pool.fleet;\n\n# Describes the policy for accessing "/v1/multicast-groups" in the API\n# Groups are created when the first instance joins and deleted when the last leaves.\nresource MulticastGroupList {\n\tpermissions = [ "list_children" ];\n\n\trelations = { parent_fleet: Fleet };\n\n\t# Fleet Viewers can list multicast groups\n\t"list_children" if "viewer" on "parent_fleet";\n}\nhas_relation(fleet: Fleet, "parent_fleet", multicast_group_list: MulticastGroupList)\n\tif multicast_group_list.fleet = fleet;\n\n# Any authenticated user can list multicast groups in their fleet.\n# This enables silo users to discover groups for attaching instances,\n# without requiring the Fleet::Viewer role.\nhas_permission(actor: AuthenticatedActor, "list_children", multicast_group_list: MulticastGroupList)\n\tif actor.is_user and silo in actor.silo and silo.fleet = multicast_group_list.fleet;\n\n# MulticastGroup is a fleet-level discovery resource.\n# Join/leave authorization is gated by Instance::Modify, not the group itself.\nresource MulticastGroup {\n\tpermissions = [ "read", "list_children" ];\n\trelations = { parent_fleet: Fleet };\n}\nhas_relation(fleet: Fleet, "parent_fleet", multicast_group: MulticastGroup)\n\tif multicast_group.fleet = fleet;\n\n# Any authenticated user can read multicast groups in their fleet\nhas_permission(actor: AuthenticatedActor, "read", multicast_group: MulticastGroup)\n\tif actor.is_user and silo in actor.silo and silo.fleet = multicast_group.fleet;\n\n# Any authenticated user can list members of multicast groups in their fleet\nhas_permission(actor: AuthenticatedActor, "list_children", multicast_group: MulticastGroup)\n\tif actor.is_user and silo in actor.silo and silo.fleet = multicast_group.fleet;\n\n# Describes the policy for reading and writing the audit log\nresource AuditLog {\n\tpermissions = [\n\t "list_children", # retrieve audit log\n\t "create_child", # create audit log entry\n\t];\n\n\trelations = { parent_fleet: Fleet };\n\n\t# Fleet viewers can read the audit log\n\t"list_children" if "viewer" on "parent_fleet";\n}\n\n# Any actor should be able to write to the audit log because we need to be able\n# to write to the log from any request, authenticated or not. Audit log writes\n# are always a byproduct of other operations: there are no endpoints that allow\n# the user to write to the log deliberately. Note we use AuthenticatedActor\n# because we don't really mean unauthenticated -- in the case of login\n# operations, we use the external authenticator actor that creates the session\n# to authorize the audit log write.\nhas_permission(_actor: AuthenticatedActor, "create_child", _audit_log: AuditLog);\n\nhas_relation(fleet: Fleet, "parent_fleet", audit_log: AuditLog)\n\tif audit_log.fleet = fleet;\n\n# Describes the policy for creating and managing web console sessions.\nresource ConsoleSessionList {\n\tpermissions = [ "create_child" ];\n\trelations = { parent_fleet: Fleet };\n\t"create_child" if "external-authenticator" on "parent_fleet";\n}\nhas_relation(fleet: Fleet, "parent_fleet", collection: ConsoleSessionList)\n\tif collection.fleet = fleet;\n\n# Allow silo admins to delete and list user sessions\nresource SiloUserSessionList {\n permissions = [ "modify", "list_children" ];\n relations = { parent_silo: Silo };\n\n # A silo admin can modify (e.g., delete) a user's sessions.\n "modify" if "admin" on "parent_silo";\n\n # A silo admin can list a user's sessions.\n "list_children" if "admin" on "parent_silo";\n}\nhas_relation(silo: Silo, "parent_silo", authn_list: SiloUserSessionList)\n if authn_list.silo_user.silo = silo;\n\n# give users 'modify' and 'list_children' on their own sessions\nhas_permission(actor: AuthenticatedActor, "modify", authn_list: SiloUserSessionList)\n if actor.equals_silo_user(authn_list.silo_user);\nhas_permission(actor: AuthenticatedActor, "list_children", authn_list: SiloUserSessionList)\n if actor.equals_silo_user(authn_list.silo_user);\n\n# Allow silo admins to delete and list user access tokens\nresource SiloUserTokenList {\n permissions = [ "modify", "list_children" ];\n relations = { parent_silo: Silo };\n\n # A silo admin can modify (e.g., delete) a user's tokens.\n "modify" if "admin" on "parent_silo";\n\n # A silo admin can list a user's tokens.\n "list_children" if "admin" on "parent_silo";\n}\nhas_relation(silo: Silo, "parent_silo", authn_list: SiloUserTokenList)\n if authn_list.silo_user.silo = silo;\n\n# give users 'modify' and 'list_children' on their own tokens\nhas_permission(actor: AuthenticatedActor, "modify", authn_list: SiloUserTokenList)\n if actor.equals_silo_user(authn_list.silo_user);\nhas_permission(actor: AuthenticatedActor, "list_children", authn_list: SiloUserTokenList)\n if actor.equals_silo_user(authn_list.silo_user);\n\n# Describes the policy for creating and managing device authorization requests.\nresource DeviceAuthRequestList {\n\tpermissions = [ "create_child" ];\n\trelations = { parent_fleet: Fleet };\n\t"create_child" if "external-authenticator" on "parent_fleet";\n}\nhas_relation(fleet: Fleet, "parent_fleet", collection: DeviceAuthRequestList)\n\tif collection.fleet = fleet;\n\n# Describes the policy for creating and managing Silo certificates\nresource SiloCertificateList {\n\tpermissions = [ "list_children", "create_child" ];\n\n\trelations = { parent_silo: Silo, parent_fleet: Fleet };\n\n\t# Both Fleet and Silo administrators can see and modify the Silo's\n\t# certificates.\n\t"list_children" if "admin" on "parent_silo";\n\t"list_children" if "admin" on "parent_fleet";\n\t"create_child" if "admin" on "parent_silo";\n\t"create_child" if "admin" on "parent_fleet";\n}\nhas_relation(silo: Silo, "parent_silo", collection: SiloCertificateList)\n\tif collection.silo = silo;\nhas_relation(fleet: Fleet, "parent_fleet", collection: SiloCertificateList)\n\tif collection.silo.fleet = fleet;\n\n# Describes the policy for creating and managing Silo identity providers\nresource SiloIdentityProviderList {\n\tpermissions = [ "list_children", "create_child" ];\n\n\trelations = { parent_silo: Silo, parent_fleet: Fleet };\n\n\t# Everyone who can read the Silo (which includes all the users in the\n\t# Silo) can see the identity providers in it.\n\t"list_children" if "read" on "parent_silo";\n\n\t# Fleet and Silo administrators can manage the Silo's identity provider\n\t# configuration. This is one of the only areas of Silo configuration\n\t# that Fleet Administrators have permissions on. This is also one of\n\t# the only cases where we need to look two levels up the hierarchy to\n\t# see if somebody has the right permission. For most other things,\n\t# permissions cascade down the hierarchy so we only need to look at the\n\t# parent.\n\t"create_child" if "admin" on "parent_silo";\n\t"create_child" if "admin" on "parent_fleet";\n}\nhas_relation(silo: Silo, "parent_silo", collection: SiloIdentityProviderList)\n\tif collection.silo = silo;\nhas_relation(fleet: Fleet, "parent_fleet", collection: SiloIdentityProviderList)\n\tif collection.silo.fleet = fleet;\n\n# Describes the policy for creating and managing Silo users (mostly intended for\n# API-managed users)\nresource SiloUserList {\n\tpermissions = [ "list_children", "create_child" ];\n\n\trelations = { parent_silo: Silo, parent_fleet: Fleet };\n\n\t# Everyone who can read the Silo (which includes all the users in the\n\t# Silo) can see the users in it.\n\t"list_children" if "read" on "parent_silo";\n\n\t# Fleet and Silo administrators can manage the Silo's users. This is\n\t# one of the only areas of Silo configuration that Fleet Administrators\n\t# have permissions on. This is also one of the few cases (so far) where\n\t# we need to look two levels up the hierarchy to see if somebody has the\n\t# right permission. For most other things, permissions cascade down the\n\t# hierarchy so we only need to look at the parent.\n\t"create_child" if "admin" on "parent_silo";\n\t"list_children" if "admin" on "parent_fleet";\n\t"create_child" if "admin" on "parent_fleet";\n}\nhas_relation(silo: Silo, "parent_silo", collection: SiloUserList)\n\tif collection.silo = silo;\nhas_relation(fleet: Fleet, "parent_fleet", collection: SiloUserList)\n\tif collection.silo.fleet = fleet;\n\n# Grant SCIM IdP actors the permissions they need on users.\nhas_permission(actor: AuthenticatedActor, "read", silo_user: SiloUser)\n if actor.is_scim_idp and silo_user.silo in actor.silo;\nhas_permission(actor: AuthenticatedActor, "create_child", silo_user_list: SiloUserList)\n\tif actor.is_scim_idp and silo_user_list.silo in actor.silo;\nhas_permission(actor: AuthenticatedActor, "modify", silo_user: SiloUser)\n\tif actor.is_scim_idp and silo_user.silo in actor.silo;\nhas_permission(actor: AuthenticatedActor, "list_children", silo_user_list: SiloUserList)\n if actor.is_scim_idp and silo_user_list.silo in actor.silo;\n\n# Describes the policy for creating and managing Silo groups (mostly intended\n# for API-managed groups)\nresource SiloGroupList {\n\tpermissions = [ "list_children", "create_child" ];\n\n\trelations = { parent_silo: Silo, parent_fleet: Fleet };\n\n\t# Everyone who can read the Silo (which includes all the groups in the\n\t# Silo) can see the groups in it.\n\t"list_children" if "read" on "parent_silo";\n\n\t# Fleet and Silo administrators can manage the Silo's groups. This is\n\t# one of the only areas of Silo configuration that Fleet Administrators\n\t# have permissions on. This is also one of the few cases (so far) where\n\t# we need to look two levels up the hierarchy to see if somebody has the\n\t# right permission. For most other things, permissions cascade down the\n\t# hierarchy so we only need to look at the parent.\n\t"create_child" if "admin" on "parent_silo";\n\t"list_children" if "admin" on "parent_fleet";\n\t"create_child" if "admin" on "parent_fleet";\n}\nhas_relation(silo: Silo, "parent_silo", collection: SiloGroupList)\n\tif collection.silo = silo;\nhas_relation(fleet: Fleet, "parent_fleet", collection: SiloGroupList)\n\tif collection.silo.fleet = fleet;\n\n# Grant SCIM IdP actors the permissions they need on groups.\nhas_permission(actor: AuthenticatedActor, "read", silo_group: SiloGroup)\n if actor.is_scim_idp and silo_group.silo in actor.silo;\nhas_permission(actor: AuthenticatedActor, "create_child", silo_group_list: SiloGroupList)\n\tif actor.is_scim_idp and silo_group_list.silo in actor.silo;\nhas_permission(actor: AuthenticatedActor, "modify", silo_group: SiloGroup)\n\tif actor.is_scim_idp and silo_group.silo in actor.silo;\nhas_permission(actor: AuthenticatedActor, "list_children", silo_group_list: SiloGroupList)\n if actor.is_scim_idp and silo_group_list.silo in actor.silo;\n\n# These rules grants the external authenticator role the permissions it needs to\n# read silo users and modify their sessions. This is necessary for login to\n# work.\nhas_permission(actor: AuthenticatedActor, "read", silo: Silo)\n\tif has_role(actor, "external-authenticator", silo.fleet);\nhas_permission(actor: AuthenticatedActor, "read", user: SiloUser)\n\tif has_role(actor, "external-authenticator", user.silo.fleet);\nhas_permission(actor: AuthenticatedActor, "modify", user: SiloUser)\n\tif has_role(actor, "external-authenticator", user.silo.fleet);\nhas_permission(actor: AuthenticatedActor, "read", group: SiloGroup)\n\tif has_role(actor, "external-authenticator", group.silo.fleet);\nhas_permission(actor: AuthenticatedActor, "modify", group: SiloGroup)\n\tif has_role(actor, "external-authenticator", group.silo.fleet);\n\nhas_permission(actor: AuthenticatedActor, "read", session: ConsoleSession)\n\tif has_role(actor, "external-authenticator", session.fleet);\nhas_permission(actor: AuthenticatedActor, "modify", session: ConsoleSession)\n\tif has_role(actor, "external-authenticator", session.fleet);\n\n# All authenticated users can read and delete device authn requests because\n# by necessity these operations happen before we've figured out what user (or\n# even Silo) the device auth is associated with. Any user can claim a device\n# auth request with the right user code (that's how it works) -- it's the user\n# code and associated logic that prevents unauthorized access here.\nhas_permission(actor: AuthenticatedActor, "read", _device_auth: DeviceAuthRequest)\n if actor.is_user;\nhas_permission(actor: AuthenticatedActor, "modify", _device_auth: DeviceAuthRequest)\n if actor.is_user;\n\nhas_permission(actor: AuthenticatedActor, "read", device_token: DeviceAccessToken)\n\tif has_role(actor, "external-authenticator", device_token.fleet);\n\nhas_permission(actor: AuthenticatedActor, "read", identity_provider: IdentityProvider)\n\tif has_role(actor, "external-authenticator", identity_provider.silo.fleet);\n\nhas_permission(actor: AuthenticatedActor, "read", saml_identity_provider: SamlIdentityProvider)\n\tif has_role(actor, "external-authenticator", saml_identity_provider.silo.fleet);\n\n# Describes the policy for who can access the internal database.\nresource Database {\n\tpermissions = [\n\t # "query" is required to perform any query against the database,\n\t # whether a read or write query. This is checked when an operation\n\t # checks out a database connection from the connection pool.\n\t #\n\t # Any authenticated user gets this permission. There's generally\n\t # some other authz check involved in the database query. For\n\t # example, if you're querying the database to "read" a "Project", we\n\t # should also be checking that. So why do we do this at all? It's\n\t # a belt-and-suspenders measure so that if we somehow introduced an\n\t # unauthenticated code path that hits the database, it cannot be\n\t # used to DoS the database because we won't allow the operation to\n\t # make the query. (As long as the code path _is_ authenticated, we\n\t # can use throttling mechanisms to prevent DoS.)\n\t "query",\n\n\t # "modify" is required to populate database data that's delivered\n\t # with the system. It should also be required for schema changes,\n\t # when we support those. This is separate from "query" so that we\n\t # cannot accidentally invoke these code paths from API calls and\n\t # other general functions.\n\t "modify"\n\t];\n}\n\n# All authenticated users have the "query" permission on the database.\nhas_permission(_actor: AuthenticatedActor, "query", _resource: Database);\n\n# The "db-init" user is the only one with the "modify" permission.\nhas_permission(USER_DB_INIT: AuthenticatedActor, "modify", _resource: Database);\nhas_permission(USER_DB_INIT: AuthenticatedActor, "create_child", _resource: IpPoolList);\n# It also has "admin" on the internal silo to populate it with built-in resources.\n# TODO-completeness: actually limit to just internal silo and not all silos\nhas_role(USER_DB_INIT: AuthenticatedActor, "admin", _silo: Silo);\n\n# Allow the internal API admin permissions on all silos.\nhas_role(USER_INTERNAL_API: AuthenticatedActor, "admin", _silo: Silo);\n\nresource WebhookSecret {\n\tpermissions = [ "read", "modify" ];\n\trelations = { parent_alert_receiver: AlertReceiver };\n\n\t"read" if "read" on "parent_alert_receiver";\n\t"modify" if "modify" on "parent_alert_receiver";\n}\n\nhas_relation(rx: AlertReceiver, "parent_alert_receiver", secret: WebhookSecret)\n\tif secret.alert_receiver = rx;\n\nresource AlertClassList {\n\tpermissions = [ "list_children" ];\n\trelations = { parent_fleet: Fleet };\n\n\t"list_children" if "viewer" on "parent_fleet";\n}\n\nhas_relation(fleet: Fleet, "parent_fleet", collection: AlertClassList)\n\tif collection.fleet = fleet;\n\nresource ScimClientBearerTokenList {\n\tpermissions = [ "create_child", "list_children" ];\n\trelations = { parent_silo: Silo, parent_fleet: Fleet };\n\n\t# Silo-level roles grant privileges for SCIM client tokens.\n # These are all admin because being able to create these tokens would allow\n # a user to grant themselves admin by modifying group membership through SCIM calls\n\t"create_child" if "admin" on "parent_silo";\n\t"list_children" if "admin" on "parent_silo";\n\n # Fleet-level roles also grant privileges for SCIM client tokens, for\n # configuration before silo admins are present.\n\t"create_child" if "admin" on "parent_fleet";\n\t"list_children" if "admin" on "parent_fleet";\n}\nhas_relation(silo: Silo, "parent_silo", scim_client_bearer_token_list: ScimClientBearerTokenList)\n\tif scim_client_bearer_token_list.silo = silo;\nhas_relation(fleet: Fleet, "parent_fleet", collection: ScimClientBearerTokenList)\n\tif collection.silo.fleet = fleet;\n\n# VpcList is a synthetic resource for controlling VPC creation.\n# Unlike other project resources, VPC creation requires the full "collaborator"\n# role rather than "limited-collaborator", enforcing the networking restriction.\n# This allows organizations to restrict who can reconfigure the network topology\n# while still allowing users with limited-collaborator to work with compute\n# resources (instances, disks, etc.) within the existing network.\nresource VpcList {\n\tpermissions = [ "list_children", "create_child" ];\n\n\trelations = { containing_project: Project };\n\n\t"list_children" if "read" on "containing_project";\n\t"create_child" if "collaborator" on "containing_project";\n}\nhas_relation(project: Project, "containing_project", collection: VpcList)\n\tif collection.project = project;\n\n# Describes the policy for accessing "/v1/system/subnet-pools" in the API\nresource SubnetPoolList {\n\tpermissions = [\n\t "list_children",\n\t "modify",\n\t "create_child",\n\t];\n\n\t# Fleet Administrators can create or modify the Subnet Pools list.\n\trelations = { parent_fleet: Fleet };\n\t"modify" if "admin" on "parent_fleet";\n\t"create_child" if "admin" on "parent_fleet";\n\n\t# Fleet Viewers can list External Subnet Pools\n\t"list_children" if "viewer" on "parent_fleet";\n}\nhas_relation(fleet: Fleet, "parent_fleet", subnet_pool_list: SubnetPoolList)\n\tif subnet_pool_list.fleet = fleet;\n\n\n\n resource Disk {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = { containing_project: Project };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "limited-collaborator" on "containing_project";\n "create_child" if "limited-collaborator" on "containing_project";\n }\n\n has_relation(parent: Project, "containing_project", child: Disk)\n if child.project = parent;\n \n\n resource Snapshot {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = { containing_project: Project };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "limited-collaborator" on "containing_project";\n "create_child" if "limited-collaborator" on "containing_project";\n }\n\n has_relation(parent: Project, "containing_project", child: Snapshot)\n if child.project = parent;\n \n\n resource ProjectImage {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = { containing_project: Project };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "limited-collaborator" on "containing_project";\n "create_child" if "limited-collaborator" on "containing_project";\n }\n\n has_relation(parent: Project, "containing_project", child: ProjectImage)\n if child.project = parent;\n \n\n resource AffinityGroup {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = { containing_project: Project };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "limited-collaborator" on "containing_project";\n "create_child" if "limited-collaborator" on "containing_project";\n }\n\n has_relation(parent: Project, "containing_project", child: AffinityGroup)\n if child.project = parent;\n \n\n resource AntiAffinityGroup {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = { containing_project: Project };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "limited-collaborator" on "containing_project";\n "create_child" if "limited-collaborator" on "containing_project";\n }\n\n has_relation(parent: Project, "containing_project", child: AntiAffinityGroup)\n if child.project = parent;\n \n\n resource Instance {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = { containing_project: Project };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "limited-collaborator" on "containing_project";\n "create_child" if "limited-collaborator" on "containing_project";\n }\n\n has_relation(parent: Project, "containing_project", child: Instance)\n if child.project = parent;\n \n\n resource IpPool {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: IpPool)\n if child.fleet = fleet;\n \n\n resource InstanceNetworkInterface {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = {\n containing_project: Project,\n parent: Instance\n };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "limited-collaborator" on "containing_project";\n "create_child" if "limited-collaborator" on "containing_project";\n }\n\n has_relation(project: Project, "containing_project", child: InstanceNetworkInterface)\n if has_relation(project, "containing_project", child.instance);\n\n has_relation(parent: Instance, "parent", child: InstanceNetworkInterface)\n if child.instance = parent;\n \n\n resource Vpc {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = { containing_project: Project };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(parent: Project, "containing_project", child: Vpc)\n if child.project = parent;\n \n\n resource VpcRouter {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = {\n containing_project: Project,\n parent: Vpc\n };\n\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(project: Project, "containing_project", child: VpcRouter)\n if has_relation(project, "containing_project", child.vpc);\n\n has_relation(parent: Vpc, "parent", child: VpcRouter)\n if child.vpc = parent;\n \n\n resource InternetGateway {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = {\n containing_project: Project,\n parent: Vpc\n };\n\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(project: Project, "containing_project", child: InternetGateway)\n if has_relation(project, "containing_project", child.vpc);\n\n has_relation(parent: Vpc, "parent", child: InternetGateway)\n if child.vpc = parent;\n \n\n resource InternetGatewayIpPool {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = {\n containing_project: Project,\n parent: InternetGateway\n };\n\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(project: Project, "containing_project", child: InternetGatewayIpPool)\n if has_relation(project, "containing_project", child.internet_gateway);\n\n has_relation(parent: InternetGateway, "parent", child: InternetGatewayIpPool)\n if child.internet_gateway = parent;\n \n\n resource InternetGatewayIpAddress {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = {\n containing_project: Project,\n parent: InternetGateway\n };\n\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(project: Project, "containing_project", child: InternetGatewayIpAddress)\n if has_relation(project, "containing_project", child.internet_gateway);\n\n has_relation(parent: InternetGateway, "parent", child: InternetGatewayIpAddress)\n if child.internet_gateway = parent;\n \n\n resource RouterRoute {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = {\n containing_project: Project,\n parent: VpcRouter\n };\n\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(project: Project, "containing_project", child: RouterRoute)\n if has_relation(project, "containing_project", child.vpc_router);\n\n has_relation(parent: VpcRouter, "parent", child: RouterRoute)\n if child.vpc_router = parent;\n \n\n resource VpcSubnet {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = {\n containing_project: Project,\n parent: Vpc\n };\n\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(project: Project, "containing_project", child: VpcSubnet)\n if has_relation(project, "containing_project", child.vpc);\n\n has_relation(parent: Vpc, "parent", child: VpcSubnet)\n if child.vpc = parent;\n \n\n resource FloatingIp {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = { containing_project: Project };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "limited-collaborator" on "containing_project";\n "create_child" if "limited-collaborator" on "containing_project";\n }\n\n has_relation(parent: Project, "containing_project", child: FloatingIp)\n if child.project = parent;\n \n\n resource ExternalSubnet {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = { containing_project: Project };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "limited-collaborator" on "containing_project";\n "create_child" if "limited-collaborator" on "containing_project";\n }\n\n has_relation(parent: Project, "containing_project", child: ExternalSubnet)\n if child.project = parent;\n \n\n resource Image {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = { containing_silo: Silo };\n "list_children" if "viewer" on "containing_silo";\n "read" if "viewer" on "containing_silo";\n "modify" if "collaborator" on "containing_silo";\n "create_child" if "collaborator" on "containing_silo";\n }\n\n has_relation(parent: Silo, "containing_silo", child: Image)\n if child.silo = parent;\n \n\n resource SiloImage {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = { containing_silo: Silo };\n "list_children" if "viewer" on "containing_silo";\n "read" if "viewer" on "containing_silo";\n "modify" if "collaborator" on "containing_silo";\n "create_child" if "collaborator" on "containing_silo";\n }\n\n has_relation(parent: Silo, "containing_silo", child: SiloImage)\n if child.silo = parent;\n \n\n resource AddressLot {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: AddressLot)\n if child.fleet = fleet;\n \n\n resource Blueprint {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: Blueprint)\n if child.fleet = fleet;\n \n\n resource LoopbackAddress {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: LoopbackAddress)\n if child.fleet = fleet;\n \n\n\n resource ConsoleSession {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: ConsoleSession)\n if child.fleet = fleet;\n \n\n resource DeviceAuthRequest {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: DeviceAuthRequest)\n if child.fleet = fleet;\n \n\n resource DeviceAccessToken {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: DeviceAccessToken)\n if child.fleet = fleet;\n \n\n resource PhysicalDisk {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: PhysicalDisk)\n if child.fleet = fleet;\n \n\n resource Rack {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: Rack)\n if child.fleet = fleet;\n \n\n\n\n\n\n resource SupportBundle {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: SupportBundle)\n if child.fleet = fleet;\n \n\n\n\n resource Sled {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: Sled)\n if child.fleet = fleet;\n \n\n resource SubnetPool {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: SubnetPool)\n if child.fleet = fleet;\n \n\n resource TufRepo {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: TufRepo)\n if child.fleet = fleet;\n \n\n resource TufArtifact {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: TufArtifact)\n if child.fleet = fleet;\n \n\n resource TufTrustRoot {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: TufTrustRoot)\n if child.fleet = fleet;\n \n\n resource Alert {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: Alert)\n if child.fleet = fleet;\n \n\n resource AlertReceiver {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: AlertReceiver)\n if child.fleet = fleet;\n \n\n\n resource Zpool {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: Zpool)\n if child.fleet = fleet;\n \n\n resource Service {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: Service)\n if child.fleet = fleet;\n \n\n resource UserBuiltin {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: UserBuiltin)\n if child.fleet = fleet;\n \n\n file = nexus/auth/src/authz/oso_generic.rs:89
852026-03-24T18:29:54.770ZINFOnexus (ServerContext): Setting up resolver using DNS servers for subnet: Ipv6Subnet { net: Ipv6Net { addr: fd00:1122:3344::, width: 48 } } file = nexus/src/context.rs:233
862026-03-24T18:29:54.775ZINFOnexus (DnsResolver): new DNS resolver addresses = [[fd00:1122:3344:1::1]:53, [fd00:1122:3344:2::1]:53, [fd00:1122:3344:3::1]:53] file = internal-dns/resolver/src/resolver.rs:144
872026-03-24T18:29:54.778ZINFOnexus (ServerContext): Setting up qorb database pool from DNS dns_addrs = [[fd00:1122:3344:1::1]:53, [fd00:1122:3344:2::1]:53, [fd00:1122:3344:3::1]:53] file = nexus/src/context.rs:289
882026-03-24T18:29:54.792ZDEBGnexus (ServerContext): registered USDT probes
892026-03-24T18:29:55.327ZINFOnexus (datastore): Database schema version is up to date desired_version = 242.0.0 file = nexus/db-queries/src/db/datastore/db_metadata.rs:418 found_version = 242.0.0
902026-03-24T18:29:55.388ZWARNnexus (datastore): No db_metadata_nexus records exist - skipping access check explanation = This is expected during initial deployment or before migration file = nexus/db-queries/src/db/datastore/db_metadata.rs:346 nexus_id = 8b83c400-e1c0-469e-85c8-5bb331c1da4a (omicron_zone)
912026-03-24T18:29:55.388ZINFOnexus: Datastore is ready for usage file = nexus/db-queries/src/db/datastore/mod.rs:324
922026-03-24T18:29:55.391ZINFOnexus (SEC): SEC running file = /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/steno-0.4.1/src/sec.rs:813 sec_id = 8b83c400-e1c0-469e-85c8-5bb331c1da4a
932026-03-24T18:29:55.490ZDEBGnexus (clickhouse-client): registered USDT probes id = 65b45e0f-ae74-4f9c-89e1-56cb6244eb3c
942026-03-24T18:29:55.549ZINFOnexus (MgsUpdateDriver): starting MgsUpdateDriver file = nexus/mgs-updates/src/driver.rs:146
952026-03-24T18:29:55.557ZDEBGnexus (DataLoader): roles roles = RoleSet { roles: {} }
962026-03-24T18:29:55.593ZDEBGnexus (DataLoader): authorize result action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
972026-03-24T18:29:55.603ZDEBGnexus (DataLoader): attempting to create built-in users
982026-03-24T18:29:55.605ZDEBGnexus (DataLoader): roles roles = RoleSet { roles: {} }
992026-03-24T18:29:55.606ZDEBGnexus (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
1002026-03-24T18:29:55.638ZDEBGnexus (dropshot_internal): registered endpoint local_addr = [fd00:1122:3344:101::b]:12221 method = POST path = /crucible/0/upstairs/{upstairs_id}/downstairs/{downstairs_id}/stop-request versions = all
1012026-03-24T18:29:55.638ZDEBGnexus (dropshot_internal): registered endpoint local_addr = [fd00:1122:3344:101::b]:12221 method = POST path = /crucible/0/upstairs/{upstairs_id}/downstairs/{downstairs_id}/stopped versions = all
1022026-03-24T18:29:55.638ZDEBGnexus (dropshot_internal): registered endpoint local_addr = [fd00:1122:3344:101::b]:12221 method = POST path = /crucible/0/upstairs/{upstairs_id}/repair/{repair_id}/progress versions = all
1032026-03-24T18:29:55.638ZDEBGnexus (dropshot_internal): registered endpoint local_addr = [fd00:1122:3344:101::b]:12221 method = POST path = /crucible/0/upstairs/{upstairs_id}/repair-finish versions = all
1042026-03-24T18:29:55.639ZDEBGnexus (dropshot_internal): registered endpoint local_addr = [fd00:1122:3344:101::b]:12221 method = POST path = /crucible/0/upstairs/{upstairs_id}/repair-start versions = all
1052026-03-24T18:29:55.639ZDEBGnexus (dropshot_internal): registered endpoint local_addr = [fd00:1122:3344:101::b]:12221 method = POST path = /disk/{disk_id}/remove-read-only-parent versions = all
1062026-03-24T18:29:55.639ZDEBGnexus (dropshot_internal): registered endpoint local_addr = [fd00:1122:3344:101::b]:12221 method = PUT path = /disks/{disk_id} versions = all
1072026-03-24T18:29:55.639ZDEBGnexus (dropshot_internal): registered endpoint local_addr = [fd00:1122:3344:101::b]:12221 method = POST path = /metrics/collectors versions = all
1082026-03-24T18:29:55.639ZDEBGnexus (dropshot_internal): registered endpoint local_addr = [fd00:1122:3344:101::b]:12221 method = GET path = /metrics/collectors/{collector_id}/producers versions = all
1092026-03-24T18:29:55.639ZDEBGnexus (dropshot_internal): registered endpoint local_addr = [fd00:1122:3344:101::b]:12221 method = POST path = /metrics/producers versions = all
1102026-03-24T18:29:55.639ZDEBGnexus (dropshot_internal): registered endpoint local_addr = [fd00:1122:3344:101::b]:12221 method = GET path = /nat/ipv4/changeset/{from_gen} versions = all
1112026-03-24T18:29:55.639ZDEBGnexus (dropshot_internal): registered endpoint local_addr = [fd00:1122:3344:101::b]:12221 method = GET path = /probes/{sled} versions = all
1122026-03-24T18:29:55.639ZDEBGnexus (dropshot_internal): registered endpoint local_addr = [fd00:1122:3344:101::b]:12221 method = POST path = /refresh-vpc-routes versions = all
1132026-03-24T18:29:55.639ZDEBGnexus (dropshot_internal): registered endpoint local_addr = [fd00:1122:3344:101::b]:12221 method = GET path = /sled-agents/{sled_id} versions = all
1142026-03-24T18:29:55.639ZDEBGnexus (dropshot_internal): registered endpoint local_addr = [fd00:1122:3344:101::b]:12221 method = POST path = /sled-agents/{sled_id} versions = all
1152026-03-24T18:29:55.639ZDEBGnexus (dropshot_internal): registered endpoint local_addr = [fd00:1122:3344:101::b]:12221 method = PUT path = /switch/{switch_id} versions = all
1162026-03-24T18:29:55.639ZDEBGnexus (dropshot_internal): registered endpoint local_addr = [fd00:1122:3344:101::b]:12221 method = GET path = /v1/ping versions = all
1172026-03-24T18:29:55.639ZDEBGnexus (dropshot_internal): registered endpoint local_addr = [fd00:1122:3344:101::b]:12221 method = PUT path = /vmms/{propolis_id} versions = all
1182026-03-24T18:29:55.639ZDEBGnexus (dropshot_internal): registered endpoint local_addr = [fd00:1122:3344:101::b]:12221 method = POST path = /volume/{volume_id}/remove-read-only-parent versions = all
1192026-03-24T18:29:55.639ZINFOnexus (dropshot_internal): listening file = /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.7/src/server.rs:328 local_addr = [fd00:1122:3344:101::b]:12221
1202026-03-24T18:29:55.641ZDEBGnexus (dropshot_internal): successfully registered DTrace USDT probes local_addr = [fd00:1122:3344:101::b]:12221
1212026-03-24T18:29:55.652ZDEBGnexus (dropshot_lockstep): registered endpoint local_addr = [fd00:1122:3344:101::b]:12232 method = GET path = /bgtasks versions = all
1222026-03-24T18:29:55.652ZDEBGnexus (dropshot_lockstep): registered endpoint local_addr = [fd00:1122:3344:101::b]:12232 method = POST path = /bgtasks/activate versions = all
1232026-03-24T18:29:55.652ZDEBGnexus (dropshot_lockstep): registered endpoint local_addr = [fd00:1122:3344:101::b]:12232 method = GET path = /bgtasks/view/{bgtask_name} versions = all
1242026-03-24T18:29:55.652ZDEBGnexus (dropshot_lockstep): registered endpoint local_addr = [fd00:1122:3344:101::b]:12232 method = GET path = /clickhouse/policy versions = all
1252026-03-24T18:29:55.652ZDEBGnexus (dropshot_lockstep): registered endpoint local_addr = [fd00:1122:3344:101::b]:12232 method = POST path = /clickhouse/policy versions = all
1262026-03-24T18:29:55.652ZDEBGnexus (dropshot_lockstep): registered endpoint local_addr = [fd00:1122:3344:101::b]:12232 method = GET path = /debug/fetch-omdb-binary versions = all
1272026-03-24T18:29:55.652ZDEBGnexus (dropshot_lockstep): registered endpoint local_addr = [fd00:1122:3344:101::b]:12232 method = POST path = /demo-saga versions = all
1282026-03-24T18:29:55.652ZDEBGnexus (dropshot_lockstep): registered endpoint local_addr = [fd00:1122:3344:101::b]:12232 method = POST path = /demo-saga/{demo_saga_id}/complete versions = all
1292026-03-24T18:29:55.652ZDEBGnexus (dropshot_lockstep): registered endpoint local_addr = [fd00:1122:3344:101::b]:12232 method = GET path = /deployment/blueprints/all versions = all
1302026-03-24T18:29:55.652ZDEBGnexus (dropshot_lockstep): registered endpoint local_addr = [fd00:1122:3344:101::b]:12232 method = DELETE path = /deployment/blueprints/all/{blueprint_id} versions = all
1312026-03-24T18:29:55.652ZDEBGnexus (dropshot_lockstep): registered endpoint local_addr = [fd00:1122:3344:101::b]:12232 method = GET path = /deployment/blueprints/all/{blueprint_id} versions = all
1322026-03-24T18:29:55.652ZDEBGnexus (dropshot_lockstep): registered endpoint local_addr = [fd00:1122:3344:101::b]:12232 method = POST path = /deployment/blueprints/import versions = all
1332026-03-24T18:29:55.653ZDEBGnexus (dropshot_lockstep): registered endpoint local_addr = [fd00:1122:3344:101::b]:12232 method = POST path = /deployment/blueprints/regenerate versions = all
1342026-03-24T18:29:55.653ZDEBGnexus (dropshot_lockstep): registered endpoint local_addr = [fd00:1122:3344:101::b]:12232 method = GET path = /deployment/blueprints/target versions = all
1352026-03-24T18:29:55.653ZDEBGnexus (dropshot_lockstep): registered endpoint local_addr = [fd00:1122:3344:101::b]:12232 method = POST path = /deployment/blueprints/target versions = all
1362026-03-24T18:29:55.653ZDEBGnexus (dropshot_lockstep): registered endpoint local_addr = [fd00:1122:3344:101::b]:12232 method = PUT path = /deployment/blueprints/target/enabled versions = all
1372026-03-24T18:29:55.653ZDEBGnexus (dropshot_lockstep): registered endpoint local_addr = [fd00:1122:3344:101::b]:12232 method = GET path = /deployment/reconfigurator-config versions = all
1382026-03-24T18:29:55.653ZDEBGnexus (dropshot_lockstep): registered endpoint local_addr = [fd00:1122:3344:101::b]:12232 method = POST path = /deployment/reconfigurator-config versions = all
1392026-03-24T18:29:55.653ZDEBGnexus (dropshot_lockstep): registered endpoint local_addr = [fd00:1122:3344:101::b]:12232 method = GET path = /deployment/reconfigurator-config/{version} versions = all
1402026-03-24T18:29:55.653ZDEBGnexus (dropshot_lockstep): registered endpoint local_addr = [fd00:1122:3344:101::b]:12232 method = GET path = /deployment/update-status versions = all
1412026-03-24T18:29:55.653ZDEBGnexus (dropshot_lockstep): registered endpoint local_addr = [fd00:1122:3344:101::b]:12232 method = GET path = /experimental/v1/system/support-bundles versions = all
1422026-03-24T18:29:55.653ZDEBGnexus (dropshot_lockstep): registered endpoint local_addr = [fd00:1122:3344:101::b]:12232 method = POST path = /experimental/v1/system/support-bundles versions = all
1432026-03-24T18:29:55.653ZDEBGnexus (dropshot_lockstep): registered endpoint local_addr = [fd00:1122:3344:101::b]:12232 method = DELETE path = /experimental/v1/system/support-bundles/{bundle_id} versions = all
1442026-03-24T18:29:55.653ZDEBGnexus (dropshot_lockstep): registered endpoint local_addr = [fd00:1122:3344:101::b]:12232 method = GET path = /experimental/v1/system/support-bundles/{bundle_id} versions = all
1452026-03-24T18:29:55.653ZDEBGnexus (dropshot_lockstep): registered endpoint local_addr = [fd00:1122:3344:101::b]:12232 method = PUT path = /experimental/v1/system/support-bundles/{bundle_id} versions = all
1462026-03-24T18:29:55.653ZDEBGnexus (dropshot_lockstep): registered endpoint local_addr = [fd00:1122:3344:101::b]:12232 method = GET path = /experimental/v1/system/support-bundles/{bundle_id}/download versions = all
1472026-03-24T18:29:55.653ZDEBGnexus (dropshot_lockstep): registered endpoint local_addr = [fd00:1122:3344:101::b]:12232 method = HEAD path = /experimental/v1/system/support-bundles/{bundle_id}/download versions = all
1482026-03-24T18:29:55.653ZDEBGnexus (dropshot_lockstep): registered endpoint local_addr = [fd00:1122:3344:101::b]:12232 method = GET path = /experimental/v1/system/support-bundles/{bundle_id}/download/{file} versions = all
1492026-03-24T18:29:55.653ZDEBGnexus (dropshot_lockstep): registered endpoint local_addr = [fd00:1122:3344:101::b]:12232 method = HEAD path = /experimental/v1/system/support-bundles/{bundle_id}/download/{file} versions = all
1502026-03-24T18:29:55.653ZDEBGnexus (dropshot_lockstep): registered endpoint local_addr = [fd00:1122:3344:101::b]:12232 method = GET path = /experimental/v1/system/support-bundles/{bundle_id}/index versions = all
1512026-03-24T18:29:55.653ZDEBGnexus (dropshot_lockstep): registered endpoint local_addr = [fd00:1122:3344:101::b]:12232 method = POST path = /instances/{instance_id}/migrate versions = all
1522026-03-24T18:29:55.653ZDEBGnexus (dropshot_lockstep): registered endpoint local_addr = [fd00:1122:3344:101::b]:12232 method = GET path = /mgs-updates versions = all
1532026-03-24T18:29:55.654ZDEBGnexus (dropshot_lockstep): registered endpoint local_addr = [fd00:1122:3344:101::b]:12232 method = GET path = /oximeter/read-policy versions = all
1542026-03-24T18:29:55.654ZDEBGnexus (dropshot_lockstep): registered endpoint local_addr = [fd00:1122:3344:101::b]:12232 method = POST path = /oximeter/read-policy versions = all
1552026-03-24T18:29:55.654ZDEBGnexus (dropshot_lockstep): registered endpoint local_addr = [fd00:1122:3344:101::b]:12232 method = POST path = /physical-disk/expunge versions = all
1562026-03-24T18:29:55.654ZDEBGnexus (dropshot_lockstep): registered endpoint local_addr = [fd00:1122:3344:101::b]:12232 method = GET path = /quiesce versions = all
1572026-03-24T18:29:55.654ZDEBGnexus (dropshot_lockstep): registered endpoint local_addr = [fd00:1122:3344:101::b]:12232 method = POST path = /quiesce versions = all
1582026-03-24T18:29:55.654ZDEBGnexus (dropshot_lockstep): registered endpoint local_addr = [fd00:1122:3344:101::b]:12232 method = PUT path = /racks/{rack_id}/initialization-complete versions = all
1592026-03-24T18:29:55.654ZDEBGnexus (dropshot_lockstep): registered endpoint local_addr = [fd00:1122:3344:101::b]:12232 method = GET path = /sagas versions = all
1602026-03-24T18:29:55.654ZDEBGnexus (dropshot_lockstep): registered endpoint local_addr = [fd00:1122:3344:101::b]:12232 method = GET path = /sagas/{saga_id} versions = all
1612026-03-24T18:29:55.654ZDEBGnexus (dropshot_lockstep): registered endpoint local_addr = [fd00:1122:3344:101::b]:12232 method = POST path = /sleds/expunge versions = all
1622026-03-24T18:29:55.654ZDEBGnexus (dropshot_lockstep): registered endpoint local_addr = [fd00:1122:3344:101::b]:12232 method = GET path = /sleds/uninitialized versions = all
1632026-03-24T18:29:55.654ZDEBGnexus (dropshot_lockstep): registered endpoint local_addr = [fd00:1122:3344:101::b]:12232 method = GET path = /trust-quorum/config/{rack_id} versions = all
1642026-03-24T18:29:55.654ZDEBGnexus (dropshot_lockstep): registered endpoint local_addr = [fd00:1122:3344:101::b]:12232 method = POST path = /trust-quorum/lrtq-upgrade versions = all
1652026-03-24T18:29:55.654ZDEBGnexus (dropshot_lockstep): registered endpoint local_addr = [fd00:1122:3344:101::b]:12232 method = POST path = /trust-quorum/remove/{sled} versions = all
1662026-03-24T18:29:55.654ZDEBGnexus (dropshot_lockstep): registered endpoint local_addr = [fd00:1122:3344:101::b]:12232 method = GET path = /v1/ping versions = all
1672026-03-24T18:29:55.654ZINFOnexus (dropshot_lockstep): listening file = /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.7/src/server.rs:328 local_addr = [fd00:1122:3344:101::b]:12232
1682026-03-24T18:29:55.654ZDEBGnexus (dropshot_lockstep): successfully registered DTrace USDT probes local_addr = [fd00:1122:3344:101::b]:12232
1692026-03-24T18:29:55.654ZDEBGnexus (ServiceBalancer): roles roles = RoleSet { roles: {} }
1702026-03-24T18:29:55.656ZDEBGnexus (ServiceBalancer): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-00000000bac3 (built_in_user), .. }) resource = Database result = Ok(())
1712026-03-24T18:29:55.666ZWARNnexus: Cannot look up rack: Object (of type ById(386a345e-f45a-414e-a736-ceb668826f36)) not found: rack file = nexus/src/app/rack.rs:785
1722026-03-24T18:29:55.743ZINFOnexus (DataLoader): created 0 built-in users file = nexus/db-queries/src/db/datastore/silo_user.rs:913
1732026-03-24T18:29:55.743ZDEBGnexus (DataLoader): roles roles = RoleSet { roles: {} }
1742026-03-24T18:29:55.745ZDEBGnexus (DataLoader): authorize result action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
1752026-03-24T18:29:55.745ZDEBGnexus (DataLoader): attempting to create built-in role assignments
1762026-03-24T18:29:55.745ZDEBGnexus (DataLoader): roles roles = RoleSet { roles: {} }
1772026-03-24T18:29:55.745ZDEBGnexus (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
1782026-03-24T18:29:56.001ZINFOnexus (DataLoader): created 5 built-in role assignments file = nexus/db-queries/src/db/datastore/role.rs:55
1792026-03-24T18:29:56.001ZDEBGnexus (DataLoader): roles roles = RoleSet { roles: {} }
1802026-03-24T18:29:56.003ZDEBGnexus (DataLoader): authorize result action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
1812026-03-24T18:29:56.003ZDEBGnexus (DataLoader): attempting to create built-in silos
1822026-03-24T18:29:56.003ZDEBGnexus (DataLoader): roles roles = RoleSet { roles: {} }
1832026-03-24T18:29:56.003ZDEBGnexus (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
1842026-03-24T18:29:56.022ZINFOnexus (dropshot_lockstep): accepted connection file = /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.7/src/server.rs:1025 local_addr = [fd00:1122:3344:101::b]:12232 remote_addr = [fd00:1122:3344:101::1]:57008
1852026-03-24T18:29:56.108ZDEBGnexus (dropshot_lockstep): roles authenticated = true local_addr = [fd00:1122:3344:101::b]:12232 method = PUT remote_addr = [fd00:1122:3344:101::1]:57008 req_id = 09514a2e-6e00-475c-a405-022ef569a517 roles = RoleSet { roles: {} } type = user_builtin uri = /racks/386a345e-f45a-414e-a736-ceb668826f36/initialization-complete user_builtin_id = 001de000-05e4-4000-8000-000000000002
1862026-03-24T18:29:56.109ZDEBGnexus (dropshot_lockstep): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) authenticated = true local_addr = [fd00:1122:3344:101::b]:12232 method = PUT remote_addr = [fd00:1122:3344:101::1]:57008 req_id = 09514a2e-6e00-475c-a405-022ef569a517 resource = Database result = Ok(()) type = user_builtin uri = /racks/386a345e-f45a-414e-a736-ceb668826f36/initialization-complete user_builtin_id = 001de000-05e4-4000-8000-000000000002
1872026-03-24T18:29:56.116ZDEBGnexus (dropshot_lockstep): roles authenticated = true local_addr = [fd00:1122:3344:101::b]:12232 method = PUT remote_addr = [fd00:1122:3344:101::1]:57008 req_id = 09514a2e-6e00-475c-a405-022ef569a517 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} } type = user_builtin uri = /racks/386a345e-f45a-414e-a736-ceb668826f36/initialization-complete user_builtin_id = 001de000-05e4-4000-8000-000000000002
1882026-03-24T18:29:56.118ZDEBGnexus (dropshot_lockstep): authorize result action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) authenticated = true local_addr = [fd00:1122:3344:101::b]:12232 method = PUT remote_addr = [fd00:1122:3344:101::1]:57008 req_id = 09514a2e-6e00-475c-a405-022ef569a517 resource = Fleet result = Ok(()) type = user_builtin uri = /racks/386a345e-f45a-414e-a736-ceb668826f36/initialization-complete user_builtin_id = 001de000-05e4-4000-8000-000000000002
1892026-03-24T18:29:56.130ZDEBGnexus (dropshot_lockstep): roles authenticated = true local_addr = [fd00:1122:3344:101::b]:12232 method = PUT remote_addr = [fd00:1122:3344:101::1]:57008 req_id = 09514a2e-6e00-475c-a405-022ef569a517 roles = RoleSet { roles: {} } type = user_builtin uri = /racks/386a345e-f45a-414e-a736-ceb668826f36/initialization-complete user_builtin_id = 001de000-05e4-4000-8000-000000000002
1902026-03-24T18:29:56.130ZDEBGnexus (dropshot_lockstep): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) authenticated = true local_addr = [fd00:1122:3344:101::b]:12232 method = PUT remote_addr = [fd00:1122:3344:101::1]:57008 req_id = 09514a2e-6e00-475c-a405-022ef569a517 resource = Database result = Ok(()) type = user_builtin uri = /racks/386a345e-f45a-414e-a736-ceb668826f36/initialization-complete user_builtin_id = 001de000-05e4-4000-8000-000000000002
1912026-03-24T18:29:56.205ZDEBGnexus (dropshot_lockstep): roles authenticated = true local_addr = [fd00:1122:3344:101::b]:12232 method = PUT remote_addr = [fd00:1122:3344:101::1]:57008 req_id = 09514a2e-6e00-475c-a405-022ef569a517 roles = RoleSet { roles: {} } type = user_builtin uri = /racks/386a345e-f45a-414e-a736-ceb668826f36/initialization-complete user_builtin_id = 001de000-05e4-4000-8000-000000000002
1922026-03-24T18:29:56.206ZDEBGnexus (dropshot_lockstep): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) authenticated = true local_addr = [fd00:1122:3344:101::b]:12232 method = PUT remote_addr = [fd00:1122:3344:101::1]:57008 req_id = 09514a2e-6e00-475c-a405-022ef569a517 resource = Database result = Ok(()) type = user_builtin uri = /racks/386a345e-f45a-414e-a736-ceb668826f36/initialization-complete user_builtin_id = 001de000-05e4-4000-8000-000000000002
1932026-03-24T18:29:56.209ZINFOnexus (dropshot_internal): accepted connection file = /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.7/src/server.rs:1025 local_addr = [fd00:1122:3344:101::b]:12221 remote_addr = [fd00:1122:3344:101::1]:55291
1942026-03-24T18:29:56.209ZDEBGnexus (dropshot_internal): determined request API version local_addr = [fd00:1122:3344:101::b]:12221 method = GET remote_addr = [fd00:1122:3344:101::1]:55291 req_id = f34535de-e7d7-4eb6-b269-2682ee038b8e uri = /sled-agents/32482131-2003-4c82-8bdf-7b718f891115 version = 1.0.0
1952026-03-24T18:29:56.213ZDEBGnexus (dropshot_internal): roles authenticated = true local_addr = [fd00:1122:3344:101::b]:12221 method = GET remote_addr = [fd00:1122:3344:101::1]:55291 req_id = f34535de-e7d7-4eb6-b269-2682ee038b8e roles = RoleSet { roles: {} } type = user_builtin uri = /sled-agents/32482131-2003-4c82-8bdf-7b718f891115 user_builtin_id = 001de000-05e4-4000-8000-000000000002
1962026-03-24T18:29:56.213ZDEBGnexus (dropshot_internal): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) authenticated = true local_addr = [fd00:1122:3344:101::b]:12221 method = GET remote_addr = [fd00:1122:3344:101::1]:55291 req_id = f34535de-e7d7-4eb6-b269-2682ee038b8e resource = Database result = Ok(()) type = user_builtin uri = /sled-agents/32482131-2003-4c82-8bdf-7b718f891115 user_builtin_id = 001de000-05e4-4000-8000-000000000002
1972026-03-24T18:29:56.267ZINFOnexus (dropshot_internal): request completed error_message_external = not found: sled with id "32482131-2003-4c82-8bdf-7b718f891115" error_message_internal = not found: sled with id "32482131-2003-4c82-8bdf-7b718f891115" file = /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.7/src/server.rs:855 latency_us = 57306 local_addr = [fd00:1122:3344:101::b]:12221 method = GET remote_addr = [fd00:1122:3344:101::1]:55291 req_id = f34535de-e7d7-4eb6-b269-2682ee038b8e response_code = 404 uri = /sled-agents/32482131-2003-4c82-8bdf-7b718f891115
1982026-03-24T18:29:56.288ZINFOnexus (dropshot_lockstep): set cockroachdb setting authenticated = true file = nexus/db-queries/src/db/datastore/cockroachdb_settings.rs:121 local_addr = [fd00:1122:3344:101::b]:12232 method = PUT remote_addr = [fd00:1122:3344:101::1]:57008 req_id = 09514a2e-6e00-475c-a405-022ef569a517 setting = cluster.preserve_downgrade_option type = user_builtin uri = /racks/386a345e-f45a-414e-a736-ceb668826f36/initialization-complete user_builtin_id = 001de000-05e4-4000-8000-000000000002 value = 22.1
1992026-03-24T18:29:56.288ZDEBGnexus (dropshot_lockstep): roles authenticated = true local_addr = [fd00:1122:3344:101::b]:12232 method = PUT remote_addr = [fd00:1122:3344:101::1]:57008 req_id = 09514a2e-6e00-475c-a405-022ef569a517 roles = RoleSet { roles: {} } type = user_builtin uri = /racks/386a345e-f45a-414e-a736-ceb668826f36/initialization-complete user_builtin_id = 001de000-05e4-4000-8000-000000000002
2002026-03-24T18:29:56.288ZDEBGnexus (dropshot_lockstep): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) authenticated = true local_addr = [fd00:1122:3344:101::b]:12232 method = PUT remote_addr = [fd00:1122:3344:101::1]:57008 req_id = 09514a2e-6e00-475c-a405-022ef569a517 resource = Database result = Ok(()) type = user_builtin uri = /racks/386a345e-f45a-414e-a736-ceb668826f36/initialization-complete user_builtin_id = 001de000-05e4-4000-8000-000000000002
2012026-03-24T18:29:56.310ZINFOnexus (dropshot_lockstep): request completed error_message_external = not found: rack with id "386a345e-f45a-414e-a736-ceb668826f36" error_message_internal = not found: rack with id "386a345e-f45a-414e-a736-ceb668826f36" file = /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.7/src/server.rs:855 latency_us = 283102 local_addr = [fd00:1122:3344:101::b]:12232 method = PUT remote_addr = [fd00:1122:3344:101::1]:57008 req_id = 09514a2e-6e00-475c-a405-022ef569a517 response_code = 404 uri = /racks/386a345e-f45a-414e-a736-ceb668826f36/initialization-complete
2022026-03-24T18:29:56.785ZDEBGnexus (dropshot_lockstep): roles authenticated = true local_addr = [fd00:1122:3344:101::b]:12232 method = PUT remote_addr = [fd00:1122:3344:101::1]:57008 req_id = e808d6a7-70ae-44fd-aeac-c3038b61a318 roles = RoleSet { roles: {} } type = user_builtin uri = /racks/386a345e-f45a-414e-a736-ceb668826f36/initialization-complete user_builtin_id = 001de000-05e4-4000-8000-000000000002
2032026-03-24T18:29:56.786ZDEBGnexus (dropshot_lockstep): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) authenticated = true local_addr = [fd00:1122:3344:101::b]:12232 method = PUT remote_addr = [fd00:1122:3344:101::1]:57008 req_id = e808d6a7-70ae-44fd-aeac-c3038b61a318 resource = Database result = Ok(()) type = user_builtin uri = /racks/386a345e-f45a-414e-a736-ceb668826f36/initialization-complete user_builtin_id = 001de000-05e4-4000-8000-000000000002
2042026-03-24T18:29:56.787ZDEBGnexus (dropshot_lockstep): roles authenticated = true local_addr = [fd00:1122:3344:101::b]:12232 method = PUT remote_addr = [fd00:1122:3344:101::1]:57008 req_id = e808d6a7-70ae-44fd-aeac-c3038b61a318 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} } type = user_builtin uri = /racks/386a345e-f45a-414e-a736-ceb668826f36/initialization-complete user_builtin_id = 001de000-05e4-4000-8000-000000000002
2052026-03-24T18:29:56.789ZDEBGnexus (dropshot_lockstep): authorize result action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) authenticated = true local_addr = [fd00:1122:3344:101::b]:12232 method = PUT remote_addr = [fd00:1122:3344:101::1]:57008 req_id = e808d6a7-70ae-44fd-aeac-c3038b61a318 resource = Fleet result = Ok(()) type = user_builtin uri = /racks/386a345e-f45a-414e-a736-ceb668826f36/initialization-complete user_builtin_id = 001de000-05e4-4000-8000-000000000002
2062026-03-24T18:29:56.789ZDEBGnexus (dropshot_lockstep): roles authenticated = true local_addr = [fd00:1122:3344:101::b]:12232 method = PUT remote_addr = [fd00:1122:3344:101::1]:57008 req_id = e808d6a7-70ae-44fd-aeac-c3038b61a318 roles = RoleSet { roles: {} } type = user_builtin uri = /racks/386a345e-f45a-414e-a736-ceb668826f36/initialization-complete user_builtin_id = 001de000-05e4-4000-8000-000000000002
2072026-03-24T18:29:56.789ZDEBGnexus (dropshot_lockstep): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) authenticated = true local_addr = [fd00:1122:3344:101::b]:12232 method = PUT remote_addr = [fd00:1122:3344:101::1]:57008 req_id = e808d6a7-70ae-44fd-aeac-c3038b61a318 resource = Database result = Ok(()) type = user_builtin uri = /racks/386a345e-f45a-414e-a736-ceb668826f36/initialization-complete user_builtin_id = 001de000-05e4-4000-8000-000000000002
2082026-03-24T18:29:56.834ZDEBGnexus (dropshot_lockstep): roles authenticated = true local_addr = [fd00:1122:3344:101::b]:12232 method = PUT remote_addr = [fd00:1122:3344:101::1]:57008 req_id = e808d6a7-70ae-44fd-aeac-c3038b61a318 roles = RoleSet { roles: {} } type = user_builtin uri = /racks/386a345e-f45a-414e-a736-ceb668826f36/initialization-complete user_builtin_id = 001de000-05e4-4000-8000-000000000002
2092026-03-24T18:29:56.834ZDEBGnexus (dropshot_lockstep): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) authenticated = true local_addr = [fd00:1122:3344:101::b]:12232 method = PUT remote_addr = [fd00:1122:3344:101::1]:57008 req_id = e808d6a7-70ae-44fd-aeac-c3038b61a318 resource = Database result = Ok(()) type = user_builtin uri = /racks/386a345e-f45a-414e-a736-ceb668826f36/initialization-complete user_builtin_id = 001de000-05e4-4000-8000-000000000002
2102026-03-24T18:29:56.835ZINFOnexus (dropshot_lockstep): request completed error_message_external = not found: rack with id "386a345e-f45a-414e-a736-ceb668826f36" error_message_internal = not found: rack with id "386a345e-f45a-414e-a736-ceb668826f36" file = /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.7/src/server.rs:855 latency_us = 51184 local_addr = [fd00:1122:3344:101::b]:12232 method = PUT remote_addr = [fd00:1122:3344:101::1]:57008 req_id = e808d6a7-70ae-44fd-aeac-c3038b61a318 response_code = 404 uri = /racks/386a345e-f45a-414e-a736-ceb668826f36/initialization-complete
2112026-03-24T18:29:57.106ZINFOnexus (DataLoader): created 2 built-in silos file = nexus/db-queries/src/db/datastore/silo.rs:102
2122026-03-24T18:29:57.108ZDEBGnexus (DataLoader): roles roles = RoleSet { roles: {} }
2132026-03-24T18:29:57.108ZDEBGnexus (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
2142026-03-24T18:29:57.150ZDEBGnexus (DataLoader): roles roles = RoleSet { roles: {} }
2152026-03-24T18:29:57.152ZDEBGnexus (DataLoader): authorize result action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
2162026-03-24T18:29:57.152ZDEBGnexus (DataLoader): attempting to create built-in projects
2172026-03-24T18:29:57.152ZDEBGnexus (DataLoader): roles roles = RoleSet { roles: {} }
2182026-03-24T18:29:57.152ZDEBGnexus (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
2192026-03-24T18:29:57.162ZDEBGnexus (DataLoader): roles roles = RoleSet { roles: {} }
2202026-03-24T18:29:57.162ZDEBGnexus (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
2212026-03-24T18:29:57.223ZDEBGnexus (DataLoader): roles roles = RoleSet { roles: {} }
2222026-03-24T18:29:57.224ZDEBGnexus (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
2232026-03-24T18:29:57.668ZDEBGnexus (ServiceBalancer): roles roles = RoleSet { roles: {} }
2242026-03-24T18:29:57.668ZDEBGnexus (ServiceBalancer): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-00000000bac3 (built_in_user), .. }) resource = Database result = Ok(())
2252026-03-24T18:29:57.669ZWARNnexus: Cannot look up rack: Object (of type ById(386a345e-f45a-414e-a736-ceb668826f36)) not found: rack file = nexus/src/app/rack.rs:785
2262026-03-24T18:29:57.814ZDEBGnexus (DataLoader): roles roles = RoleSet { roles: {} }
2272026-03-24T18:29:57.817ZDEBGnexus (DataLoader): authorize result action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) } result = Ok(())
2282026-03-24T18:29:57.819ZDEBGnexus (DataLoader): roles roles = RoleSet { roles: {} }
2292026-03-24T18:29:57.819ZDEBGnexus (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
2302026-03-24T18:29:57.821ZDEBGnexus (DataLoader): roles roles = RoleSet { roles: {} }
2312026-03-24T18:29:57.821ZDEBGnexus (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
2322026-03-24T18:29:57.888ZDEBGnexus (DataLoader): roles roles = RoleSet { roles: {} }
2332026-03-24T18:29:57.890ZDEBGnexus (DataLoader): authorize result action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) } result = Ok(())
2342026-03-24T18:29:57.890ZDEBGnexus (DataLoader): roles roles = RoleSet { roles: {} }
2352026-03-24T18:29:57.890ZDEBGnexus (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
2362026-03-24T18:29:57.963ZINFOnexus (DataLoader): created built-in services project file = nexus/db-queries/src/db/datastore/project.rs:122
2372026-03-24T18:29:57.963ZDEBGnexus (DataLoader): roles roles = RoleSet { roles: {} }
2382026-03-24T18:29:57.964ZDEBGnexus (DataLoader): authorize result action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
2392026-03-24T18:29:57.964ZDEBGnexus (DataLoader): attempting to create built-in VPCs
2402026-03-24T18:29:57.964ZDEBGnexus (DataLoader): roles roles = RoleSet { roles: {} }
2412026-03-24T18:29:57.964ZDEBGnexus (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
2422026-03-24T18:29:57.976ZDEBGnexus (DataLoader): roles roles = RoleSet { roles: {} }
2432026-03-24T18:29:57.976ZDEBGnexus (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
2442026-03-24T18:29:57.978ZDEBGnexus (DataLoader): roles roles = RoleSet { roles: {} }
2452026-03-24T18:29:57.978ZDEBGnexus (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
2462026-03-24T18:29:57.981ZDEBGnexus (DataLoader): roles roles = RoleSet { roles: {} }
2472026-03-24T18:29:57.981ZDEBGnexus (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
2482026-03-24T18:29:57.983ZDEBGnexus (DataLoader): roles roles = RoleSet { roles: {} }
2492026-03-24T18:29:57.983ZDEBGnexus (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
2502026-03-24T18:29:57.994ZDEBGnexus (dropshot_lockstep): roles authenticated = true local_addr = [fd00:1122:3344:101::b]:12232 method = PUT remote_addr = [fd00:1122:3344:101::1]:57008 req_id = 209f497b-e668-483d-aa07-9f41be6ad2fc roles = RoleSet { roles: {} } type = user_builtin uri = /racks/386a345e-f45a-414e-a736-ceb668826f36/initialization-complete user_builtin_id = 001de000-05e4-4000-8000-000000000002
2512026-03-24T18:29:57.994ZDEBGnexus (dropshot_lockstep): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) authenticated = true local_addr = [fd00:1122:3344:101::b]:12232 method = PUT remote_addr = [fd00:1122:3344:101::1]:57008 req_id = 209f497b-e668-483d-aa07-9f41be6ad2fc resource = Database result = Ok(()) type = user_builtin uri = /racks/386a345e-f45a-414e-a736-ceb668826f36/initialization-complete user_builtin_id = 001de000-05e4-4000-8000-000000000002
2522026-03-24T18:29:58.012ZDEBGnexus (dropshot_lockstep): roles authenticated = true local_addr = [fd00:1122:3344:101::b]:12232 method = PUT remote_addr = [fd00:1122:3344:101::1]:57008 req_id = 209f497b-e668-483d-aa07-9f41be6ad2fc roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} } type = user_builtin uri = /racks/386a345e-f45a-414e-a736-ceb668826f36/initialization-complete user_builtin_id = 001de000-05e4-4000-8000-000000000002
2532026-03-24T18:29:58.014ZDEBGnexus (dropshot_lockstep): authorize result action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) authenticated = true local_addr = [fd00:1122:3344:101::b]:12232 method = PUT remote_addr = [fd00:1122:3344:101::1]:57008 req_id = 209f497b-e668-483d-aa07-9f41be6ad2fc resource = Fleet result = Ok(()) type = user_builtin uri = /racks/386a345e-f45a-414e-a736-ceb668826f36/initialization-complete user_builtin_id = 001de000-05e4-4000-8000-000000000002
2542026-03-24T18:29:58.014ZDEBGnexus (dropshot_lockstep): roles authenticated = true local_addr = [fd00:1122:3344:101::b]:12232 method = PUT remote_addr = [fd00:1122:3344:101::1]:57008 req_id = 209f497b-e668-483d-aa07-9f41be6ad2fc roles = RoleSet { roles: {} } type = user_builtin uri = /racks/386a345e-f45a-414e-a736-ceb668826f36/initialization-complete user_builtin_id = 001de000-05e4-4000-8000-000000000002
2552026-03-24T18:29:58.014ZDEBGnexus (dropshot_lockstep): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) authenticated = true local_addr = [fd00:1122:3344:101::b]:12232 method = PUT remote_addr = [fd00:1122:3344:101::1]:57008 req_id = 209f497b-e668-483d-aa07-9f41be6ad2fc resource = Database result = Ok(()) type = user_builtin uri = /racks/386a345e-f45a-414e-a736-ceb668826f36/initialization-complete user_builtin_id = 001de000-05e4-4000-8000-000000000002
2562026-03-24T18:29:58.052ZDEBGnexus (DataLoader): roles roles = RoleSet { roles: {} }
2572026-03-24T18:29:58.055ZDEBGnexus (DataLoader): authorize result action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) } result = Ok(())
2582026-03-24T18:29:58.055ZDEBGnexus (DataLoader): roles roles = RoleSet { roles: {} }
2592026-03-24T18:29:58.056ZDEBGnexus (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
2602026-03-24T18:29:58.062ZDEBGnexus (DataLoader): roles roles = RoleSet { roles: {} }
2612026-03-24T18:29:58.062ZDEBGnexus (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
2622026-03-24T18:29:58.064ZDEBGnexus (DataLoader): roles roles = RoleSet { roles: {} }
2632026-03-24T18:29:58.064ZDEBGnexus (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
2642026-03-24T18:29:58.065ZDEBGnexus (DataLoader): roles roles = RoleSet { roles: {} }
2652026-03-24T18:29:58.069ZDEBGnexus (DataLoader): authorize result action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) } result = Ok(())
2662026-03-24T18:29:58.069ZDEBGnexus (DataLoader): roles roles = RoleSet { roles: {} }
2672026-03-24T18:29:58.069ZDEBGnexus (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
2682026-03-24T18:29:58.093ZDEBGnexus (DataLoader): roles roles = RoleSet { roles: {} }
2692026-03-24T18:29:58.093ZDEBGnexus (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
2702026-03-24T18:29:58.100ZDEBGnexus (dropshot_lockstep): roles authenticated = true local_addr = [fd00:1122:3344:101::b]:12232 method = PUT remote_addr = [fd00:1122:3344:101::1]:57008 req_id = 209f497b-e668-483d-aa07-9f41be6ad2fc roles = RoleSet { roles: {} } type = user_builtin uri = /racks/386a345e-f45a-414e-a736-ceb668826f36/initialization-complete user_builtin_id = 001de000-05e4-4000-8000-000000000002
2712026-03-24T18:29:58.100ZDEBGnexus (dropshot_lockstep): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) authenticated = true local_addr = [fd00:1122:3344:101::b]:12232 method = PUT remote_addr = [fd00:1122:3344:101::1]:57008 req_id = 209f497b-e668-483d-aa07-9f41be6ad2fc resource = Database result = Ok(()) type = user_builtin uri = /racks/386a345e-f45a-414e-a736-ceb668826f36/initialization-complete user_builtin_id = 001de000-05e4-4000-8000-000000000002
2722026-03-24T18:29:58.101ZINFOnexus (dropshot_lockstep): request completed error_message_external = not found: rack with id "386a345e-f45a-414e-a736-ceb668826f36" error_message_internal = not found: rack with id "386a345e-f45a-414e-a736-ceb668826f36" file = /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.7/src/server.rs:855 latency_us = 108120 local_addr = [fd00:1122:3344:101::b]:12232 method = PUT remote_addr = [fd00:1122:3344:101::1]:57008 req_id = 209f497b-e668-483d-aa07-9f41be6ad2fc response_code = 404 uri = /racks/386a345e-f45a-414e-a736-ceb668826f36/initialization-complete
2732026-03-24T18:29:58.140ZDEBGnexus (DataLoader): roles roles = RoleSet { roles: {} }
2742026-03-24T18:29:58.141ZDEBGnexus (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
2752026-03-24T18:29:58.142ZDEBGnexus (DataLoader): roles roles = RoleSet { roles: {} }
2762026-03-24T18:29:58.142ZDEBGnexus (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
2772026-03-24T18:29:58.144ZDEBGnexus (DataLoader): roles roles = RoleSet { roles: {} }
2782026-03-24T18:29:58.148ZDEBGnexus (DataLoader): authorize result action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") } result = Ok(())
2792026-03-24T18:29:58.148ZDEBGnexus (DataLoader): roles roles = RoleSet { roles: {} }
2802026-03-24T18:29:58.148ZDEBGnexus (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
2812026-03-24T18:29:58.174ZDEBGnexus (DataLoader): roles roles = RoleSet { roles: {} }
2822026-03-24T18:29:58.174ZDEBGnexus (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
2832026-03-24T18:29:58.208ZDEBGnexus (dropshot_internal): determined request API version local_addr = [fd00:1122:3344:101::b]:12221 method = POST remote_addr = [fd00:1122:3344:101::1]:55291 req_id = 4c05cd30-4b78-46e2-8b3c-65b8c22ccc53 uri = /sled-agents/32482131-2003-4c82-8bdf-7b718f891115 version = 1.0.0
2842026-03-24T18:29:58.212ZINFOnexus: registered sled agent file = nexus/src/app/sled.rs:61 sled_uuid = 32482131-2003-4c82-8bdf-7b718f891115
2852026-03-24T18:29:58.217ZDEBGnexus (DataLoader): roles roles = RoleSet { roles: {} }
2862026-03-24T18:29:58.217ZDEBGnexus (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
2872026-03-24T18:29:58.230ZDEBGnexus (DataLoader): roles roles = RoleSet { roles: {} }
2882026-03-24T18:29:58.231ZDEBGnexus (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
2892026-03-24T18:29:58.232ZDEBGnexus (DataLoader): roles roles = RoleSet { roles: {} }
2902026-03-24T18:29:58.233ZDEBGnexus (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
2912026-03-24T18:29:58.234ZDEBGnexus (DataLoader): roles roles = RoleSet { roles: {} }
2922026-03-24T18:29:58.234ZDEBGnexus (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
2932026-03-24T18:29:58.235ZDEBGnexus (DataLoader): roles roles = RoleSet { roles: {} }
2942026-03-24T18:29:58.239ZDEBGnexus (DataLoader): authorize result action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") } result = Ok(())
2952026-03-24T18:29:58.239ZDEBGnexus (DataLoader): roles roles = RoleSet { roles: {} }
2962026-03-24T18:29:58.239ZDEBGnexus (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
2972026-03-24T18:29:58.291ZDEBGnexus (DataLoader): roles roles = RoleSet { roles: {} }
2982026-03-24T18:29:58.291ZDEBGnexus (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
2992026-03-24T18:29:58.399ZDEBGnexus (DataLoader): roles roles = RoleSet { roles: {} }
3002026-03-24T18:29:58.400ZDEBGnexus (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
3012026-03-24T18:29:58.404ZDEBGnexus (DataLoader): roles roles = RoleSet { roles: {} }
3022026-03-24T18:29:58.404ZDEBGnexus (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
3032026-03-24T18:29:58.406ZDEBGnexus (DataLoader): roles roles = RoleSet { roles: {} }
3042026-03-24T18:29:58.410ZDEBGnexus (DataLoader): authorize result action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-074c-4000-8000-000000000001, lookup_type: ById(001de000-074c-4000-8000-000000000001) } result = Ok(())
3052026-03-24T18:29:58.410ZDEBGnexus (DataLoader): roles roles = RoleSet { roles: {} }
3062026-03-24T18:29:58.411ZDEBGnexus (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
3072026-03-24T18:29:58.509ZINFOnexus (dropshot_internal): request completed file = /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.7/src/server.rs:867 latency_us = 301215 local_addr = [fd00:1122:3344:101::b]:12221 method = POST remote_addr = [fd00:1122:3344:101::1]:55291 req_id = 4c05cd30-4b78-46e2-8b3c-65b8c22ccc53 response_code = 204 uri = /sled-agents/32482131-2003-4c82-8bdf-7b718f891115
3082026-03-24T18:29:58.544ZDEBGnexus (DataLoader): roles roles = RoleSet { roles: {} }
3092026-03-24T18:29:58.545ZDEBGnexus (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
3102026-03-24T18:29:58.549ZDEBGnexus (DataLoader): roles roles = RoleSet { roles: {} }
3112026-03-24T18:29:58.550ZDEBGnexus (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
3122026-03-24T18:29:58.551ZDEBGnexus (DataLoader): roles roles = RoleSet { roles: {} }
3132026-03-24T18:29:58.551ZDEBGnexus (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
3142026-03-24T18:29:58.553ZDEBGnexus (DataLoader): roles roles = RoleSet { roles: {} }
3152026-03-24T18:29:58.557ZDEBGnexus (DataLoader): authorize result action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-074c-4000-8000-000000000001, lookup_type: ById(001de000-074c-4000-8000-000000000001) } result = Ok(())
3162026-03-24T18:29:58.557ZDEBGnexus (DataLoader): roles roles = RoleSet { roles: {} }
3172026-03-24T18:29:58.557ZDEBGnexus (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
3182026-03-24T18:29:58.688ZDEBGnexus (DataLoader): attempting to create built-in VPC firewall rules
3192026-03-24T18:29:58.688ZDEBGnexus (DataLoader): roles roles = RoleSet { roles: {} }
3202026-03-24T18:29:58.689ZDEBGnexus (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
3212026-03-24T18:29:58.691ZDEBGnexus (DataLoader): roles roles = RoleSet { roles: {} }
3222026-03-24T18:29:58.691ZDEBGnexus (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
3232026-03-24T18:29:58.702ZDEBGnexus (DataLoader): roles roles = RoleSet { roles: {} }
3242026-03-24T18:29:58.702ZDEBGnexus (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
3252026-03-24T18:29:58.704ZDEBGnexus (DataLoader): roles roles = RoleSet { roles: {} }
3262026-03-24T18:29:58.704ZDEBGnexus (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
3272026-03-24T18:29:58.706ZDEBGnexus (DataLoader): roles roles = RoleSet { roles: {} }
3282026-03-24T18:29:58.706ZDEBGnexus (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
3292026-03-24T18:29:58.707ZDEBGnexus (DataLoader): roles roles = RoleSet { roles: {} }
3302026-03-24T18:29:58.707ZDEBGnexus (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
3312026-03-24T18:29:58.708ZDEBGnexus (DataLoader): roles roles = RoleSet { roles: {} }
3322026-03-24T18:29:58.712ZDEBGnexus (DataLoader): authorize result action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) } result = Ok(())
3332026-03-24T18:29:58.712ZDEBGnexus (DataLoader): roles roles = RoleSet { roles: {} }
3342026-03-24T18:29:58.712ZDEBGnexus (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
3352026-03-24T18:29:58.714ZDEBGnexus (DataLoader): roles roles = RoleSet { roles: {} }
3362026-03-24T18:29:58.714ZDEBGnexus (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
3372026-03-24T18:29:58.715ZDEBGnexus (DataLoader): roles roles = RoleSet { roles: {} }
3382026-03-24T18:29:58.715ZDEBGnexus (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
3392026-03-24T18:29:58.717ZDEBGnexus (DataLoader): roles roles = RoleSet { roles: {} }
3402026-03-24T18:29:58.721ZDEBGnexus (DataLoader): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) } result = Ok(())
3412026-03-24T18:29:58.721ZDEBGnexus (DataLoader): roles roles = RoleSet { roles: {} }
3422026-03-24T18:29:58.721ZDEBGnexus (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
3432026-03-24T18:29:58.740ZDEBGnexus (DataLoader): roles roles = RoleSet { roles: {} }
3442026-03-24T18:29:58.740ZDEBGnexus (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
3452026-03-24T18:29:58.742ZDEBGnexus (DataLoader): roles roles = RoleSet { roles: {} }
3462026-03-24T18:29:58.742ZDEBGnexus (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
3472026-03-24T18:29:58.744ZDEBGnexus (DataLoader): roles roles = RoleSet { roles: {} }
3482026-03-24T18:29:58.744ZDEBGnexus (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
3492026-03-24T18:29:58.746ZDEBGnexus (DataLoader): roles roles = RoleSet { roles: {} }
3502026-03-24T18:29:58.749ZDEBGnexus (DataLoader): authorize result action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) } result = Ok(())
3512026-03-24T18:29:58.749ZDEBGnexus (DataLoader): roles roles = RoleSet { roles: {} }
3522026-03-24T18:29:58.750ZDEBGnexus (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
3532026-03-24T18:29:58.895ZWARNnexus (datastore): Retryable transaction failure file = nexus/db-queries/src/transaction_retry.rs:165 retry_after (ms) = 13 transaction = vpc_update_firewall_rules
3542026-03-24T18:29:58.927ZINFOnexus (datastore): transaction completed attempts = 2 file = nexus/db-queries/src/transaction_retry.rs:121 transaction = vpc_update_firewall_rules
3552026-03-24T18:29:58.927ZINFOnexus (DataLoader): created built-in VPC firewall rules file = nexus/db-queries/src/db/datastore/vpc.rs:301
3562026-03-24T18:29:58.927ZDEBGnexus (DataLoader): attempting to create built-in VPC Subnets
3572026-03-24T18:29:58.927ZDEBGnexus (DataLoader): roles roles = RoleSet { roles: {} }
3582026-03-24T18:29:58.928ZDEBGnexus (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
3592026-03-24T18:29:58.936ZDEBGnexus (DataLoader): roles roles = RoleSet { roles: {} }
3602026-03-24T18:29:58.936ZDEBGnexus (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
3612026-03-24T18:29:58.939ZDEBGnexus (DataLoader): roles roles = RoleSet { roles: {} }
3622026-03-24T18:29:58.939ZDEBGnexus (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
3632026-03-24T18:29:58.941ZDEBGnexus (DataLoader): roles roles = RoleSet { roles: {} }
3642026-03-24T18:29:58.941ZDEBGnexus (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
3652026-03-24T18:29:58.942ZDEBGnexus (DataLoader): roles roles = RoleSet { roles: {} }
3662026-03-24T18:29:58.943ZDEBGnexus (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
3672026-03-24T18:29:58.944ZDEBGnexus (DataLoader): roles roles = RoleSet { roles: {} }
3682026-03-24T18:29:58.944ZDEBGnexus (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
3692026-03-24T18:29:58.945ZDEBGnexus (DataLoader): roles roles = RoleSet { roles: {} }
3702026-03-24T18:29:58.949ZDEBGnexus (DataLoader): authorize result action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) } result = Ok(())
3712026-03-24T18:29:58.949ZDEBGnexus (DataLoader): roles roles = RoleSet { roles: {} }
3722026-03-24T18:29:58.949ZDEBGnexus (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
3732026-03-24T18:29:58.958ZDEBGnexus (DataLoader): roles roles = RoleSet { roles: {} }
3742026-03-24T18:29:58.958ZDEBGnexus (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
3752026-03-24T18:29:58.961ZDEBGnexus (DataLoader): roles roles = RoleSet { roles: {} }
3762026-03-24T18:29:58.961ZDEBGnexus (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
3772026-03-24T18:29:58.970ZDEBGnexus (DataLoader): roles roles = RoleSet { roles: {} }
3782026-03-24T18:29:58.970ZDEBGnexus (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
3792026-03-24T18:29:58.972ZDEBGnexus (DataLoader): roles roles = RoleSet { roles: {} }
3802026-03-24T18:29:58.973ZDEBGnexus (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
3812026-03-24T18:29:58.982ZDEBGnexus (DataLoader): roles roles = RoleSet { roles: {} }
3822026-03-24T18:29:58.982ZDEBGnexus (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
3832026-03-24T18:29:58.984ZDEBGnexus (DataLoader): roles roles = RoleSet { roles: {} }
3842026-03-24T18:29:58.984ZDEBGnexus (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
3852026-03-24T18:29:58.985ZDEBGnexus (DataLoader): roles roles = RoleSet { roles: {} }
3862026-03-24T18:29:58.990ZDEBGnexus (DataLoader): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }, key: 001de000-c470-4000-8000-000000000001, lookup_type: ById(001de000-c470-4000-8000-000000000001) } result = Ok(())
3872026-03-24T18:29:58.990ZDEBGnexus (DataLoader): roles roles = RoleSet { roles: {} }
3882026-03-24T18:29:58.990ZDEBGnexus (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
3892026-03-24T18:29:59.016ZDEBGnexus (DataLoader): roles roles = RoleSet { roles: {} }
3902026-03-24T18:29:59.016ZDEBGnexus (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
3912026-03-24T18:29:59.018ZDEBGnexus (DataLoader): roles roles = RoleSet { roles: {} }
3922026-03-24T18:29:59.018ZDEBGnexus (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
3932026-03-24T18:29:59.019ZDEBGnexus (DataLoader): roles roles = RoleSet { roles: {} }
3942026-03-24T18:29:59.019ZDEBGnexus (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
3952026-03-24T18:29:59.021ZDEBGnexus (DataLoader): roles roles = RoleSet { roles: {} }
3962026-03-24T18:29:59.024ZDEBGnexus (DataLoader): authorize result action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) } result = Ok(())
3972026-03-24T18:29:59.070ZDEBGnexus (DataLoader): roles roles = RoleSet { roles: {} }
3982026-03-24T18:29:59.071ZDEBGnexus (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
3992026-03-24T18:29:59.072ZDEBGnexus (DataLoader): roles roles = RoleSet { roles: {} }
4002026-03-24T18:29:59.072ZDEBGnexus (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
4012026-03-24T18:29:59.074ZDEBGnexus (DataLoader): roles roles = RoleSet { roles: {} }
4022026-03-24T18:29:59.074ZDEBGnexus (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
4032026-03-24T18:29:59.075ZDEBGnexus (DataLoader): roles roles = RoleSet { roles: {} }
4042026-03-24T18:29:59.079ZDEBGnexus (DataLoader): authorize result action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-074c-4000-8000-000000000001, lookup_type: ById(001de000-074c-4000-8000-000000000001) } result = Ok(())
4052026-03-24T18:29:59.079ZDEBGnexus (DataLoader): roles roles = RoleSet { roles: {} }
4062026-03-24T18:29:59.079ZDEBGnexus (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
4072026-03-24T18:29:59.091ZDEBGnexus (DataLoader): roles roles = RoleSet { roles: {} }
4082026-03-24T18:29:59.091ZDEBGnexus (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
4092026-03-24T18:29:59.095ZDEBGnexus (DataLoader): roles roles = RoleSet { roles: {} }
4102026-03-24T18:29:59.095ZDEBGnexus (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
4112026-03-24T18:29:59.097ZDEBGnexus (DataLoader): roles roles = RoleSet { roles: {} }
4122026-03-24T18:29:59.097ZDEBGnexus (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
4132026-03-24T18:29:59.099ZDEBGnexus (DataLoader): roles roles = RoleSet { roles: {} }
4142026-03-24T18:29:59.099ZDEBGnexus (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
4152026-03-24T18:29:59.100ZDEBGnexus (DataLoader): roles roles = RoleSet { roles: {} }
4162026-03-24T18:29:59.103ZDEBGnexus (DataLoader): authorize result action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) } result = Ok(())
4172026-03-24T18:29:59.120ZDEBGnexus (DataLoader): roles roles = RoleSet { roles: {} }
4182026-03-24T18:29:59.120ZDEBGnexus (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
4192026-03-24T18:29:59.122ZDEBGnexus (DataLoader): roles roles = RoleSet { roles: {} }
4202026-03-24T18:29:59.122ZDEBGnexus (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
4212026-03-24T18:29:59.123ZDEBGnexus (DataLoader): roles roles = RoleSet { roles: {} }
4222026-03-24T18:29:59.124ZDEBGnexus (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
4232026-03-24T18:29:59.125ZDEBGnexus (DataLoader): roles roles = RoleSet { roles: {} }
4242026-03-24T18:29:59.129ZDEBGnexus (DataLoader): authorize result action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-074c-4000-8000-000000000001, lookup_type: ById(001de000-074c-4000-8000-000000000001) } result = Ok(())
4252026-03-24T18:29:59.129ZDEBGnexus (DataLoader): roles roles = RoleSet { roles: {} }
4262026-03-24T18:29:59.129ZDEBGnexus (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
4272026-03-24T18:29:59.139ZDEBGnexus (DataLoader): roles roles = RoleSet { roles: {} }
4282026-03-24T18:29:59.139ZDEBGnexus (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
4292026-03-24T18:29:59.142ZINFOnexus (DataLoader): created built-in services vpc subnets file = nexus/db-queries/src/db/datastore/vpc.rs:367
4302026-03-24T18:29:59.142ZINFOnexus (DataLoader): created built-in services vpc file = nexus/db-queries/src/db/datastore/vpc.rs:233
4312026-03-24T18:29:59.142ZDEBGnexus (DataLoader): roles roles = RoleSet { roles: {} }
4322026-03-24T18:29:59.144ZDEBGnexus (DataLoader): authorize result action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
4332026-03-24T18:29:59.144ZDEBGnexus (DataLoader): attempting to create silo users
4342026-03-24T18:29:59.144ZDEBGnexus (DataLoader): roles roles = RoleSet { roles: {} }
4352026-03-24T18:29:59.144ZDEBGnexus (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
4362026-03-24T18:29:59.223ZINFOnexus (DataLoader): created 2 silo users file = nexus/db-queries/src/db/datastore/silo_user.rs:938
4372026-03-24T18:29:59.223ZDEBGnexus (DataLoader): attempting to create silo user role assignments
4382026-03-24T18:29:59.223ZDEBGnexus (DataLoader): roles roles = RoleSet { roles: {} }
4392026-03-24T18:29:59.223ZDEBGnexus (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
4402026-03-24T18:29:59.231ZINFOnexus (DataLoader): created 2 silo user role assignments file = nexus/db-queries/src/db/datastore/silo_user.rs:965
4412026-03-24T18:29:59.231ZDEBGnexus (DataLoader): roles roles = RoleSet { roles: {} }
4422026-03-24T18:29:59.232ZDEBGnexus (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
4432026-03-24T18:29:59.237ZDEBGnexus (DataLoader): roles roles = RoleSet { roles: {} }
4442026-03-24T18:29:59.237ZDEBGnexus (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
4452026-03-24T18:29:59.247ZDEBGnexus (DataLoader): roles roles = RoleSet { roles: {} }
4462026-03-24T18:29:59.247ZDEBGnexus (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
4472026-03-24T18:29:59.253ZDEBGnexus (DataLoader): roles roles = RoleSet { roles: {} }
4482026-03-24T18:29:59.254ZDEBGnexus (DataLoader): authorize result action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = IpPoolList result = Ok(())
4492026-03-24T18:29:59.254ZDEBGnexus (DataLoader): roles roles = RoleSet { roles: {} }
4502026-03-24T18:29:59.254ZDEBGnexus (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
4512026-03-24T18:29:59.521ZDEBGnexus (DataLoader): roles roles = RoleSet { roles: {} }
4522026-03-24T18:29:59.521ZDEBGnexus (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
4532026-03-24T18:29:59.523ZDEBGnexus (DataLoader): roles roles = RoleSet { roles: {} }
4542026-03-24T18:29:59.524ZDEBGnexus (DataLoader): authorize result action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = IpPoolList result = Ok(())
4552026-03-24T18:29:59.524ZDEBGnexus (DataLoader): roles roles = RoleSet { roles: {} }
4562026-03-24T18:29:59.525ZDEBGnexus (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
4572026-03-24T18:29:59.670ZDEBGnexus (ServiceBalancer): roles roles = RoleSet { roles: {} }
4582026-03-24T18:29:59.671ZDEBGnexus (ServiceBalancer): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-00000000bac3 (built_in_user), .. }) resource = Database result = Ok(())
4592026-03-24T18:29:59.672ZDEBGnexus (ServiceBalancer): roles roles = RoleSet { roles: {} }
4602026-03-24T18:29:59.672ZDEBGnexus (ServiceBalancer): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-00000000bac3 (built_in_user), .. }) resource = Database result = Ok(())
4612026-03-24T18:29:59.675ZDEBGnexus (ServiceBalancer): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
4622026-03-24T18:29:59.680ZDEBGnexus (ServiceBalancer): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-00000000bac3 (built_in_user), .. }) resource = Rack { parent: Fleet, key: 386a345e-f45a-414e-a736-ceb668826f36, lookup_type: ById(386a345e-f45a-414e-a736-ceb668826f36) } result = Ok(())
4632026-03-24T18:29:59.680ZINFOnexus: Still waiting for rack initialization: Rack { identity: RackIdentity { id: 386a345e-f45a-414e-a736-ceb668826f36, time_created: 2026-03-24T18:29:59.237616Z, time_modified: 2026-03-24T18:29:59.237616Z }, initialized: false, tuf_base_url: None, rack_subnet: None } file = nexus/src/app/rack.rs:779
4642026-03-24T18:29:59.699ZINFOnexus: populate complete file = nexus/src/app/mod.rs:621
4652026-03-24T18:29:59.699ZINFOnexus: activating background tasks file = nexus/src/app/mod.rs:652
4662026-03-24T18:29:59.702ZDEBGnexus (BackgroundTasks): activating background_task = dns_config_internal dns_group = internal iteration = 1 reason = Timeout
4672026-03-24T18:29:59.702ZDEBGnexus (BackgroundTasks): reading DNS version background_task = dns_config_internal dns_group = internal
4682026-03-24T18:29:59.702ZDEBGnexus (BackgroundTasks): activating background_task = decommissioned_disk_cleaner iteration = 1 reason = Timeout
4692026-03-24T18:29:59.702ZDEBGnexus (BackgroundTasks): activating background_task = sp_ereport_ingester iteration = 1 reason = Timeout
4702026-03-24T18:29:59.702ZDEBGnexus (BackgroundTasks): activating background_task = reconfigurator_config_watcher iteration = 1 reason = Timeout
4712026-03-24T18:29:59.702ZDEBGnexus (BackgroundTasks): activating background_task = dns_propagation_external dns_group = external iteration = 1 reason = Timeout
4722026-03-24T18:29:59.702ZWARNnexus (BackgroundTasks): DNS propagation: skipped background_task = dns_propagation_external dns_group = external file = nexus/src/app/background/tasks/dns_propagation.rs:61 reason = no config nor servers
4732026-03-24T18:29:59.702ZDEBGnexus (BackgroundTasks): activating background_task = nat_garbage_collector iteration = 1 reason = Timeout
4742026-03-24T18:29:59.702ZDEBGnexus (BackgroundTasks): activating background_task = dns_servers_internal dns_group = internal iteration = 1 reason = Timeout
4752026-03-24T18:29:59.702ZDEBGnexus (BackgroundTasks): activating background_task = dns_config_external dns_group = external iteration = 1 reason = Timeout
4762026-03-24T18:29:59.702ZDEBGnexus (BackgroundTasks): reading DNS version background_task = dns_config_external dns_group = external
4772026-03-24T18:29:59.702ZDEBGnexus (BackgroundTasks): roles background_task = dns_config_external dns_group = external roles = RoleSet { roles: {} }
4782026-03-24T18:29:59.702ZDEBGnexus (BackgroundTasks): activating background_task = metrics_producer_gc iteration = 1 reason = Timeout
4792026-03-24T18:29:59.703ZDEBGnexus (BackgroundTasks): activating background_task = dns_servers_external dns_group = external iteration = 1 reason = Timeout
4802026-03-24T18:29:59.703ZDEBGnexus (BackgroundTasks): activating background_task = bfd_manager iteration = 1 reason = Timeout
4812026-03-24T18:29:59.703ZDEBGnexus (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = dns_config_external dns_group = external resource = Database result = Ok(())
4822026-03-24T18:29:59.704ZDEBGnexus (BackgroundTasks): roles background_task = bfd_manager roles = RoleSet { roles: {} }
4832026-03-24T18:29:59.705ZDEBGnexus (BackgroundTasks): roles background_task = nat_garbage_collector roles = RoleSet { roles: {} }
4842026-03-24T18:29:59.705ZDEBGnexus (BackgroundTasks): activation complete background_task = dns_propagation_external dns_group = external elapsed = 2.903328ms iteration = 1 status = {"error":"no config nor servers"}
4852026-03-24T18:29:59.710ZDEBGnexus (BackgroundTasks): activating background_task = region_snapshot_replacement_start iteration = 1 reason = Timeout
4862026-03-24T18:29:59.710ZDEBGnexus (BackgroundTasks): activation complete background_task = sp_ereport_ingester elapsed = 4.948985ms iteration = 1 status = {"disabled":true,"errors":[],"sps":[]}
4872026-03-24T18:29:59.712ZDEBGnexus (BackgroundTasks): activating background_task = region_snapshot_replacement_garbage_collection iteration = 1 reason = Timeout
4882026-03-24T18:29:59.714ZDEBGnexus (BackgroundTasks): roles background_task = region_snapshot_replacement_garbage_collection roles = RoleSet { roles: {} }
4892026-03-24T18:29:59.715ZDEBGnexus (BackgroundTasks): activating background_task = inventory_loader iteration = 1 reason = Timeout
4902026-03-24T18:29:59.715ZDEBGnexus (BackgroundTasks): activating background_task = instance_reincarnation iteration = 1 reason = Timeout
4912026-03-24T18:29:59.715ZINFOnexus (BackgroundTasks): Metric producer GC running background_task = metrics_producer_gc expiration = 2026-03-24 18:19:59.702866746 UTC file = nexus/src/app/background/tasks/metrics_producer_gc.rs:48
4922026-03-24T18:29:59.715ZDEBGnexus (BackgroundTasks): activating background_task = blueprint_rendezvous iteration = 1 reason = Timeout
4932026-03-24T18:29:59.715ZWARNnexus (BackgroundTasks): Blueprint rendezvous: skipped background_task = blueprint_rendezvous file = nexus/src/app/background/tasks/blueprint_rendezvous.rs:53 reason = no blueprint
4942026-03-24T18:29:59.715ZDEBGnexus (BackgroundTasks): activating background_task = region_snapshot_replacement_finish iteration = 1 reason = Timeout
4952026-03-24T18:29:59.715ZDEBGnexus (BackgroundTasks): activation complete background_task = blueprint_rendezvous elapsed = 30.411\u{b5}s iteration = 1 status = {"error":"no blueprint"}
4962026-03-24T18:29:59.716ZDEBGnexus (BackgroundTasks): roles background_task = instance_reincarnation roles = RoleSet { roles: {} }
4972026-03-24T18:29:59.716ZDEBGnexus (BackgroundTasks): activating background_task = phantom_disks iteration = 1 reason = Timeout
4982026-03-24T18:29:59.716ZDEBGnexus (BackgroundTasks): roles background_task = inventory_loader roles = RoleSet { roles: {} }
4992026-03-24T18:29:59.716ZDEBGnexus (BackgroundTasks): activating background_task = region_replacement iteration = 1 reason = Timeout
5002026-03-24T18:29:59.716ZDEBGnexus (BackgroundTasks): roles background_task = metrics_producer_gc roles = RoleSet { roles: {} }
5012026-03-24T18:29:59.716ZDEBGnexus (BackgroundTasks): roles background_task = region_replacement roles = RoleSet { roles: {} }
5022026-03-24T18:29:59.716ZDEBGnexus (BackgroundTasks): activating background_task = saga_recovery iteration = 1 reason = Timeout
5032026-03-24T18:29:59.717ZDEBGnexus (BackgroundTasks): activating background_task = service_zone_nat_tracker iteration = 1 reason = Timeout
5042026-03-24T18:29:59.717ZDEBGnexus (BackgroundTasks): activating background_task = crdb_node_id_collector iteration = 1 reason = Timeout
5052026-03-24T18:29:59.717ZINFOnexus (SagaQuiesceHandle): saga recovery pass starting file = nexus/types/src/quiesce.rs:510
5062026-03-24T18:29:59.717ZDEBGnexus (SagaRecoverer): listing candidate sagas for recovery
5072026-03-24T18:29:59.717ZDEBGnexus (SagaRecoverer): roles roles = RoleSet { roles: {} }
5082026-03-24T18:29:59.717ZDEBGnexus (BackgroundTasks): activating background_task = blueprint_loader iteration = 1 reason = Timeout
5092026-03-24T18:29:59.717ZWARNnexus (BackgroundTasks): inventory collection is None background_task = service_zone_nat_tracker file = nexus/src/app/background/tasks/sync_service_zone_nat.rs:72
5102026-03-24T18:29:59.717ZDEBGnexus (BackgroundTasks): activation complete background_task = service_zone_nat_tracker elapsed = 144.872\u{b5}s iteration = 1 status = {"error":"inventory collection is None"}
5112026-03-24T18:29:59.717ZDEBGnexus (BackgroundTasks): roles background_task = region_snapshot_replacement_finish roles = RoleSet { roles: {} }
5122026-03-24T18:29:59.717ZDEBGnexus (BackgroundTasks): roles background_task = blueprint_loader roles = RoleSet { roles: {} }
5132026-03-24T18:29:59.719ZWARNnexus (BackgroundTasks): Blueprint execution: skipped background_task = crdb_node_id_collector file = nexus/src/app/background/tasks/crdb_node_id_collector.rs:76 reason = no blueprint
5142026-03-24T18:29:59.719ZDEBGnexus (BackgroundTasks): activation complete background_task = crdb_node_id_collector elapsed = 2.33248ms iteration = 1 status = {"error":"no blueprint"}
5152026-03-24T18:29:59.719ZDEBGnexus (BackgroundTasks): roles background_task = dns_config_external dns_group = external roles = RoleSet { roles: {} }
5162026-03-24T18:29:59.719ZDEBGnexus (BackgroundTasks): activating background_task = blueprint_executor iteration = 1 reason = Timeout
5172026-03-24T18:29:59.719ZDEBGnexus (BackgroundTasks): activating background_task = switch_port_config_manager iteration = 1 reason = Timeout
5182026-03-24T18:29:59.719ZDEBGnexus (BackgroundTasks): activating background_task = physical_disk_adoption iteration = 1 reason = Timeout
5192026-03-24T18:29:59.719ZDEBGnexus (BackgroundTasks): activating background_task = webhook_deliverator iteration = 1 reason = Timeout
5202026-03-24T18:29:59.719ZDEBGnexus (BackgroundTasks): activating background_task = blueprint_planner iteration = 1 reason = Timeout
5212026-03-24T18:29:59.719ZDEBGnexus (BackgroundTasks): activating background_task = inventory_collection iteration = 1 reason = Timeout
5222026-03-24T18:29:59.719ZINFOnexus (BackgroundTasks): Decommissioned disk cleaner running background_task = decommissioned_disk_cleaner file = nexus/src/app/background/tasks/decommissioned_disk_cleaner.rs:52
5232026-03-24T18:29:59.719ZDEBGnexus (BackgroundTasks): activating background_task = multicast_reconciler iteration = 1 reason = Timeout
5242026-03-24T18:29:59.719ZDEBGnexus (BackgroundTasks): activating background_task = abandoned_vmm_reaper iteration = 1 reason = Timeout
5252026-03-24T18:29:59.719ZWARNnexus (BackgroundTasks): Blueprint execution: skipped background_task = blueprint_executor file = nexus/src/app/background/tasks/blueprint_execution.rs:79 reason = no blueprint
5262026-03-24T18:29:59.719ZDEBGnexus (BackgroundTasks): activating background_task = instance_updater iteration = 1 reason = Timeout
5272026-03-24T18:29:59.719ZDEBGnexus (BackgroundTasks): reconfigurator config not yet loaded; doing nothing background_task = blueprint_planner
5282026-03-24T18:29:59.719ZDEBGnexus (BackgroundTasks): activating background_task = v2p_manager iteration = 1 reason = Timeout
5292026-03-24T18:29:59.719ZDEBGnexus (BackgroundTasks): activating background_task = fm_sitrep_loader iteration = 1 reason = Timeout
5302026-03-24T18:29:59.719ZDEBGnexus (BackgroundTasks): activating background_task = tuf_repo_pruner iteration = 1 reason = Timeout
5312026-03-24T18:29:59.719ZINFOnexus (BackgroundTasks): reconfigurator config not yet loaded; doing nothing background_task = tuf_repo_pruner file = nexus/src/app/background/tasks/tuf_repo_pruner.rs:100
5322026-03-24T18:29:59.719ZDEBGnexus (BackgroundTasks): activation complete background_task = blueprint_executor elapsed = 16.900461ms iteration = 1 status = {"error":"no blueprint"}
5332026-03-24T18:29:59.719ZDEBGnexus (BackgroundTasks): roles background_task = physical_disk_adoption roles = RoleSet { roles: {} }
5342026-03-24T18:29:59.719ZINFOnexus (BackgroundTasks): multicast group reconciler not enabled background_task = multicast_reconciler file = nexus/src/app/background/tasks/multicast/mod.rs:453
5352026-03-24T18:29:59.719ZDEBGnexus (BackgroundTasks): roles background_task = reconfigurator_config_watcher roles = RoleSet { roles: {} }
5362026-03-24T18:29:59.719ZDEBGnexus (BackgroundTasks): activating background_task = vpc_route_manager iteration = 1 reason = Timeout
5372026-03-24T18:29:59.719ZDEBGnexus (BackgroundTasks): roles background_task = abandoned_vmm_reaper roles = RoleSet { roles: {} }
5382026-03-24T18:29:59.719ZDEBGnexus (BackgroundTasks): activating background_task = lookup_region_port iteration = 1 reason = Timeout
5392026-03-24T18:29:59.719ZINFOnexus (BackgroundTasks): VPC route manager running background_task = vpc_route_manager file = nexus/src/app/background/tasks/vpc_routes.rs:60
5402026-03-24T18:29:59.719ZDEBGnexus (BackgroundTasks): roles background_task = switch_port_config_manager roles = RoleSet { roles: {} }
5412026-03-24T18:29:59.719ZDEBGnexus (BackgroundTasks): activating background_task = region_snapshot_replacement_step iteration = 1 reason = Timeout
5422026-03-24T18:29:59.719ZDEBGnexus (BackgroundTasks): looking for instances with destroyed active VMMs... background_task = instance_updater
5432026-03-24T18:29:59.719ZDEBGnexus (BackgroundTasks): roles background_task = webhook_deliverator roles = RoleSet { roles: {} }
5442026-03-24T18:29:59.719ZDEBGnexus (BackgroundTasks): activating background_task = instance_watcher iteration = 1 reason = Timeout
5452026-03-24T18:29:59.719ZDEBGnexus (BackgroundTasks): roles background_task = instance_updater roles = RoleSet { roles: {} }
5462026-03-24T18:29:59.719ZDEBGnexus (BackgroundTasks): roles background_task = lookup_region_port roles = RoleSet { roles: {} }
5472026-03-24T18:29:59.719ZDEBGnexus (BackgroundTasks): activating background_task = region_replacement_driver iteration = 1 reason = Timeout
5482026-03-24T18:29:59.719ZDEBGnexus (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
5492026-03-24T18:29:59.720ZDEBGnexus (BackgroundTasks): roles background_task = region_snapshot_replacement_step roles = RoleSet { roles: {} }
5502026-03-24T18:29:59.720ZDEBGnexus (BackgroundTasks): activating background_task = external_endpoints iteration = 1 reason = Timeout
5512026-03-24T18:29:59.720ZDEBGnexus (BackgroundTasks): roles background_task = v2p_manager roles = RoleSet { roles: {} }
5522026-03-24T18:29:59.720ZDEBGnexus (BackgroundTasks): activating background_task = support_bundle_collector iteration = 1 reason = Timeout
5532026-03-24T18:29:59.720ZDEBGnexus (BackgroundTasks): activating background_task = alert_dispatcher iteration = 1 reason = Timeout
5542026-03-24T18:29:59.720ZDEBGnexus (BackgroundTasks): roles background_task = instance_watcher roles = RoleSet { roles: {} }
5552026-03-24T18:29:59.720ZDEBGnexus (BackgroundTasks): roles background_task = support_bundle_collector roles = RoleSet { roles: {} }
5562026-03-24T18:29:59.720ZDEBGnexus (BackgroundTasks): roles background_task = alert_dispatcher roles = RoleSet { roles: {} }
5572026-03-24T18:29:59.723ZDEBGnexus (BackgroundTasks): activation complete background_task = blueprint_planner elapsed = 20.930254ms iteration = 1 status = "Disabled"
5582026-03-24T18:29:59.723ZDEBGnexus (BackgroundTasks): roles background_task = region_snapshot_replacement_start roles = RoleSet { roles: {} }
5592026-03-24T18:29:59.726ZDEBGnexus (BackgroundTasks): activation complete background_task = multicast_reconciler elapsed = 4.710622ms iteration = 1 status = {"disabled":true,"empty_groups_marked":0,"errors":[],"groups_created":0,"groups_deleted":0,"groups_verified":0,"members_deleted":0,"members_processed":0}
5602026-03-24T18:29:59.726ZDEBGnexus (BackgroundTasks): activation complete background_task = tuf_repo_pruner elapsed = 9.041049ms iteration = 1 status = {"reason":"reconfigurator config not yet loaded","status":"disabled"}
5612026-03-24T18:29:59.726ZDEBGnexus (BackgroundTasks): roles background_task = region_replacement_driver roles = RoleSet { roles: {} }
5622026-03-24T18:29:59.726ZDEBGnexus (BackgroundTasks): roles background_task = fm_sitrep_loader roles = RoleSet { roles: {} }
5632026-03-24T18:29:59.726ZDEBGnexus (BackgroundTasks): roles background_task = decommissioned_disk_cleaner roles = RoleSet { roles: {} }
5642026-03-24T18:29:59.726ZDEBGnexus (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = region_snapshot_replacement_garbage_collection resource = Database result = Ok(())
5652026-03-24T18:29:59.726ZDEBGnexus (BackgroundTasks): activating background_task = service_firewall_rule_propagation iteration = 1 reason = Timeout
5662026-03-24T18:29:59.726ZDEBGnexus (service-firewall-rule-progator): starting background task for service firewall rule propagation background_task = service_firewall_rule_propagation
5672026-03-24T18:29:59.726ZDEBGnexus (BackgroundTasks): activating background_task = tuf_artifact_replication iteration = 1 reason = Timeout
5682026-03-24T18:29:59.726ZDEBGnexus (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
5692026-03-24T18:29:59.726ZDEBGnexus (BackgroundTasks): activating background_task = read_only_region_replacement_start iteration = 1 reason = Timeout
5702026-03-24T18:29:59.726ZDEBGnexus (BackgroundTasks): roles background_task = tuf_artifact_replication roles = RoleSet { roles: {} }
5712026-03-24T18:29:59.726ZDEBGnexus (BackgroundTasks): roles background_task = dns_config_internal dns_group = internal roles = RoleSet { roles: {} }
5722026-03-24T18:29:59.727ZDEBGnexus (BackgroundTasks): activating background_task = dns_propagation_internal dns_group = internal iteration = 1 reason = Timeout
5732026-03-24T18:29:59.727ZWARNnexus (BackgroundTasks): DNS propagation: skipped background_task = dns_propagation_internal dns_group = internal file = nexus/src/app/background/tasks/dns_propagation.rs:61 reason = no config nor servers
5742026-03-24T18:29:59.727ZDEBGnexus (BackgroundTasks): activation complete background_task = dns_propagation_internal dns_group = internal elapsed = 24.239187ms iteration = 1 status = {"error":"no config nor servers"}
5752026-03-24T18:29:59.727ZDEBGnexus (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {} }
5762026-03-24T18:29:59.727ZDEBGnexus (BackgroundTasks): roles background_task = read_only_region_replacement_start roles = RoleSet { roles: {} }
5772026-03-24T18:29:59.727ZDEBGnexus (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = dns_config_internal dns_group = internal resource = Database result = Ok(())
5782026-03-24T18:29:59.727ZDEBGnexus (BackgroundTasks): activating background_task = fm_rendezvous iteration = 1 reason = Timeout
5792026-03-24T18:29:59.727ZDEBGnexus (BackgroundTasks): activating background_task = attached_subnet_manager iteration = 1 reason = Timeout
5802026-03-24T18:29:59.727ZINFOnexus (BackgroundTasks): starting attached subnet manager work background_task = attached_subnet_manager file = nexus/src/app/background/tasks/attached_subnets.rs:374
5812026-03-24T18:29:59.727ZDEBGnexus (BackgroundTasks): activation complete background_task = fm_rendezvous elapsed = 28.18\u{b5}s iteration = 1 status = "NoSitrep"
5822026-03-24T18:29:59.727ZDEBGnexus (BackgroundTasks): activating background_task = probe_distributor iteration = 1 reason = Timeout
5832026-03-24T18:29:59.727ZDEBGnexus (BackgroundTasks): activating background_task = session_cleanup iteration = 1 reason = Timeout
5842026-03-24T18:29:59.727ZDEBGnexus (BackgroundTasks): activating background_task = trust_quorum_manager iteration = 1 reason = Timeout
5852026-03-24T18:29:59.727ZDEBGnexus (BackgroundTasks): roles background_task = session_cleanup roles = RoleSet { roles: {} }
5862026-03-24T18:29:59.727ZDEBGnexus (BackgroundTasks): activating background_task = audit_log_cleanup iteration = 1 reason = Timeout
5872026-03-24T18:29:59.727ZDEBGnexus (BackgroundTasks): activating background_task = fm_sitrep_gc iteration = 1 reason = Timeout
5882026-03-24T18:29:59.727ZDEBGnexus (BackgroundTasks): roles background_task = fm_sitrep_gc roles = RoleSet { roles: {} }
5892026-03-24T18:29:59.727ZDEBGnexus (BackgroundTasks): roles background_task = audit_log_cleanup roles = RoleSet { roles: {} }
5902026-03-24T18:29:59.727ZINFOnexus (BackgroundTasks): distributing networking probes to sleds background_task = probe_distributor file = nexus/src/app/background/tasks/probe_distributor.rs:44
5912026-03-24T18:29:59.727ZDEBGnexus (BackgroundTasks): roles background_task = probe_distributor roles = RoleSet { roles: {} }
5922026-03-24T18:29:59.727ZDEBGnexus (BackgroundTasks): activating background_task = audit_log_timeout_incomplete iteration = 1 reason = Timeout
5932026-03-24T18:29:59.727ZDEBGnexus (BackgroundTasks): roles background_task = audit_log_timeout_incomplete roles = RoleSet { roles: {} }
5942026-03-24T18:29:59.727ZDEBGnexus (BackgroundTasks): roles background_task = trust_quorum_manager bgtask = TrustQuorumManager roles = RoleSet { roles: {} }
5952026-03-24T18:29:59.728ZDEBGnexus (BackgroundTasks): roles background_task = external_endpoints roles = RoleSet { roles: {} }
5962026-03-24T18:29:59.728ZDEBGnexus (BackgroundTasks): roles background_task = dns_config_internal dns_group = internal roles = RoleSet { roles: {} }
5972026-03-24T18:29:59.728ZDEBGnexus (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = session_cleanup resource = Database result = Ok(())
5982026-03-24T18:29:59.728ZDEBGnexus (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = audit_log_cleanup resource = Database result = Ok(())
5992026-03-24T18:29:59.728ZDEBGnexus (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = trust_quorum_manager bgtask = TrustQuorumManager resource = Database result = Ok(())
6002026-03-24T18:29:59.728ZDEBGnexus (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = fm_sitrep_gc resource = Database result = Ok(())
6012026-03-24T18:29:59.728ZDEBGnexus (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = probe_distributor resource = Database result = Ok(())
6022026-03-24T18:29:59.728ZDEBGnexus (DnsResolver): lookup_all_socket_v6 srv dns_name = _external-dns._tcp.control-plane.oxide.internal response = SrvLookup(Lookup { query: Query { name: Name("_external-dns._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN }, records: [Record { name_labels: Name("_external-dns._tcp.control-plane.oxide.internal."), dns_class: IN, ttl: 0, rdata: SRV(SRV { priority: 0, weight: 0, port: 5353, target: Name("00f80240-9763-4a10-8195-e159892a9c53.host.control-plane.oxide.internal.") }) }, Record { name_labels: Name("_external-dns._tcp.control-plane.oxide.internal."), dns_class: IN, ttl: 0, rdata: SRV(SRV { priority: 0, weight: 0, port: 5353, target: Name("7a60e7fc-6b62-472d-874a-4ab638ecefec.host.control-plane.oxide.internal.") }) }, Record { name_labels: Name("7a60e7fc-6b62-472d-874a-4ab638ecefec.host.control-plane.oxide.internal."), dns_class: IN, ttl: 0, rdata: AAAA(AAAA(fd00:1122:3344:101::9)) }], valid_until: Instant { tv_sec: 809, tv_nsec: 534855628 } })
6032026-03-24T18:29:59.728ZDEBGnexus (DnsResolver): lookup_all_socket_v6 srv dns_name = _nameservice._tcp.control-plane.oxide.internal response = SrvLookup(Lookup { query: Query { name: Name("_nameservice._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN }, records: [Record { name_labels: Name("_nameservice._tcp.control-plane.oxide.internal."), dns_class: IN, ttl: 0, rdata: SRV(SRV { priority: 0, weight: 0, port: 5353, target: Name("2a647b28-6b36-47f3-8bec-787e7c022f3d.host.control-plane.oxide.internal.") }) }, Record { name_labels: Name("_nameservice._tcp.control-plane.oxide.internal."), dns_class: IN, ttl: 0, rdata: SRV(SRV { priority: 0, weight: 0, port: 5353, target: Name("8f4232be-8e97-46d2-bbdc-f130ae371ae3.host.control-plane.oxide.internal.") }) }, Record { name_labels: Name("_nameservice._tcp.control-plane.oxide.internal."), dns_class: IN, ttl: 0, rdata: SRV(SRV { priority: 0, weight: 0, port: 5353, target: Name("ffee0ab8-3e90-47e3-a5fc-599c5b7bce56.host.control-plane.oxide.internal.") }) }, Record { name_labels: Name("ffee0ab8-3e90-47e3-a5fc-599c5b7bce56.host.control-plane.oxide.internal."), dns_class: IN, ttl: 0, rdata: AAAA(AAAA(fd00:1122:3344:2::1)) }], valid_until: Instant { tv_sec: 809, tv_nsec: 534862148 } })
6042026-03-24T18:29:59.728ZDEBGnexus (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = audit_log_timeout_incomplete resource = Database result = Ok(())
6052026-03-24T18:29:59.728ZDEBGnexus (DnsResolver): lookup_all_socket_v6 srv dns_name = _dendrite._tcp.control-plane.oxide.internal response = SrvLookup(Lookup { query: Query { name: Name("_dendrite._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN }, records: [Record { name_labels: Name("_dendrite._tcp.control-plane.oxide.internal."), dns_class: IN, ttl: 0, rdata: SRV(SRV { priority: 0, weight: 0, port: 12224, target: Name("dendrite-32482131-2003-4c82-8bdf-7b718f891115.host.control-plane.oxide.internal.") }) }, Record { name_labels: Name("dendrite-32482131-2003-4c82-8bdf-7b718f891115.host.control-plane.oxide.internal."), dns_class: IN, ttl: 0, rdata: AAAA(AAAA(fd00:1122:3344:101::2)) }], valid_until: Instant { tv_sec: 809, tv_nsec: 535060550 } })
6062026-03-24T18:29:59.728ZDEBGnexus (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = nat_garbage_collector resource = Database result = Ok(())
6072026-03-24T18:29:59.729ZINFOnexus (BackgroundTasks): found DNS servers (initial) addresses = DnsServersList { addresses: [[fd00:1122:3344:101::8]:5353, [fd00:1122:3344:101::9]:5353] } background_task = dns_servers_external dns_group = external file = nexus/src/app/background/tasks/dns_servers.rs:113
6082026-03-24T18:29:59.729ZDEBGnexus (BackgroundTasks): activation complete background_task = dns_servers_external dns_group = external elapsed = 26.268845ms iteration = 1 status = {"addresses":["[fd00:1122:3344:101::8]:5353","[fd00:1122:3344:101::9]:5353"]}
6092026-03-24T18:29:59.729ZDEBGnexus (BackgroundTasks): activating background_task = dns_propagation_external dns_group = external iteration = 2 reason = Dependency
6102026-03-24T18:29:59.729ZWARNnexus (BackgroundTasks): DNS propagation: skipped background_task = dns_propagation_external dns_group = external file = nexus/src/app/background/tasks/dns_propagation.rs:69 reason = no config
6112026-03-24T18:29:59.729ZDEBGnexus (BackgroundTasks): activation complete background_task = dns_propagation_external dns_group = external elapsed = 3.43\u{b5}s iteration = 2 status = {"error":"no config"}
6122026-03-24T18:29:59.731ZINFOnexus (BackgroundTasks): found DNS servers (initial) addresses = DnsServersList { addresses: [[fd00:1122:3344:3::1]:5353, [fd00:1122:3344:1::1]:5353, [fd00:1122:3344:2::1]:5353] } background_task = dns_servers_internal dns_group = internal file = nexus/src/app/background/tasks/dns_servers.rs:113
6132026-03-24T18:29:59.731ZDEBGnexus (BackgroundTasks): activation complete background_task = dns_servers_internal dns_group = internal elapsed = 28.603725ms iteration = 1 status = {"addresses":["[fd00:1122:3344:3::1]:5353","[fd00:1122:3344:1::1]:5353","[fd00:1122:3344:2::1]:5353"]}
6142026-03-24T18:29:59.731ZDEBGnexus (BackgroundTasks): activating background_task = dns_propagation_internal dns_group = internal iteration = 2 reason = Dependency
6152026-03-24T18:29:59.731ZWARNnexus (BackgroundTasks): DNS propagation: skipped background_task = dns_propagation_internal dns_group = internal file = nexus/src/app/background/tasks/dns_propagation.rs:69 reason = no config
6162026-03-24T18:29:59.731ZDEBGnexus (BackgroundTasks): activation complete background_task = dns_propagation_internal dns_group = internal elapsed = 17.28\u{b5}s iteration = 2 status = {"error":"no config"}
6172026-03-24T18:29:59.731ZDEBGnexus (BackgroundTasks): roles background_task = fm_sitrep_gc roles = RoleSet { roles: {} }
6182026-03-24T18:29:59.732ZDEBGnexus (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = fm_sitrep_gc resource = Database result = Ok(())
6192026-03-24T18:29:59.732ZDEBGnexus (BackgroundTasks): roles background_task = session_cleanup roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
6202026-03-24T18:29:59.732ZDEBGnexus (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = region_snapshot_replacement_start resource = Database result = Ok(())
6212026-03-24T18:29:59.734ZDEBGnexus (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = metrics_producer_gc resource = Database result = Ok(())
6222026-03-24T18:29:59.734ZDEBGnexus (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = decommissioned_disk_cleaner resource = Database result = Ok(())
6232026-03-24T18:29:59.734ZDEBGnexus (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = dns_config_external dns_group = external resource = Database result = Ok(())
6242026-03-24T18:29:59.735ZDEBGnexus (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = region_snapshot_replacement_finish resource = Database result = Ok(())
6252026-03-24T18:29:59.735ZDEBGnexus (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = region_replacement resource = Database result = Ok(())
6262026-03-24T18:29:59.735ZDEBGnexus (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = region_replacement_driver resource = Database result = Ok(())
6272026-03-24T18:29:59.735ZDEBGnexus (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = physical_disk_adoption resource = Database result = Ok(())
6282026-03-24T18:29:59.735ZDEBGnexus (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = tuf_artifact_replication resource = Database result = Ok(())
6292026-03-24T18:29:59.736ZDEBGnexus (BackgroundTasks): roles background_task = trust_quorum_manager bgtask = TrustQuorumManager roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
6302026-03-24T18:29:59.736ZDEBGnexus (BackgroundTasks): roles background_task = decommissioned_disk_cleaner roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
6312026-03-24T18:29:59.736ZDEBGnexus (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = inventory_loader resource = Database result = Ok(())
6322026-03-24T18:29:59.736ZDEBGnexus (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = external_endpoints resource = Database result = Ok(())
6332026-03-24T18:29:59.736ZDEBGnexus (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = inventory_collection resource = Database result = Ok(())
6342026-03-24T18:29:59.736ZDEBGnexus (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = fm_sitrep_loader resource = Database result = Ok(())
6352026-03-24T18:29:59.736ZDEBGnexus (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = instance_reincarnation resource = Database result = Ok(())
6362026-03-24T18:29:59.736ZDEBGnexus (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = region_snapshot_replacement_step resource = Database result = Ok(())
6372026-03-24T18:29:59.736ZDEBGnexus (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = alert_dispatcher resource = Database result = Ok(())
6382026-03-24T18:29:59.736ZDEBGnexus (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = reconfigurator_config_watcher resource = Database result = Ok(())
6392026-03-24T18:29:59.736ZDEBGnexus (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = read_only_region_replacement_start resource = Database result = Ok(())
6402026-03-24T18:29:59.737ZDEBGnexus (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = instance_updater resource = Database result = Ok(())
6412026-03-24T18:29:59.737ZDEBGnexus (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = switch_port_config_manager resource = Database result = Ok(())
6422026-03-24T18:29:59.737ZDEBGnexus (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = vpc_route_manager resource = Database result = Ok(())
6432026-03-24T18:29:59.737ZDEBGnexus (SagaRecoverer): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000003a8a (built_in_user), .. }) resource = Database result = Ok(())
6442026-03-24T18:29:59.737ZDEBGnexus (BackgroundTasks): authorize result action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = session_cleanup resource = Fleet result = Ok(())
6452026-03-24T18:29:59.737ZDEBGnexus (BackgroundTasks): roles background_task = session_cleanup roles = RoleSet { roles: {} }
6462026-03-24T18:29:59.738ZDEBGnexus (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = session_cleanup resource = Database result = Ok(())
6472026-03-24T18:29:59.738ZDEBGnexus (BackgroundTasks): roles background_task = physical_disk_adoption roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
6482026-03-24T18:29:59.739ZDEBGnexus (BackgroundTasks): roles background_task = inventory_loader roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
6492026-03-24T18:29:59.740ZDEBGnexus (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = instance_watcher resource = Database result = Ok(())
6502026-03-24T18:29:59.740ZDEBGnexus (BackgroundTasks): roles background_task = fm_sitrep_loader roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
6512026-03-24T18:29:59.740ZDEBGnexus (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = abandoned_vmm_reaper resource = Database result = Ok(())
6522026-03-24T18:29:59.740ZDEBGnexus (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = blueprint_loader resource = Database result = Ok(())
6532026-03-24T18:29:59.740ZDEBGnexus (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = webhook_deliverator resource = Database result = Ok(())
6542026-03-24T18:29:59.740ZDEBGnexus (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = support_bundle_collector resource = Database result = Ok(())
6552026-03-24T18:29:59.740ZDEBGnexus (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = bfd_manager resource = Database result = Ok(())
6562026-03-24T18:29:59.740ZDEBGnexus (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = dns_config_internal dns_group = internal resource = Database result = Ok(())
6572026-03-24T18:29:59.740ZDEBGnexus (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = v2p_manager resource = Database result = Ok(())
6582026-03-24T18:29:59.740ZDEBGnexus (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = lookup_region_port resource = Database result = Ok(())
6592026-03-24T18:29:59.740ZDEBGnexus (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
6602026-03-24T18:29:59.742ZDEBGnexus (BackgroundTasks): roles background_task = reconfigurator_config_watcher roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
6612026-03-24T18:29:59.743ZDEBGnexus (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = trust_quorum_manager bgtask = TrustQuorumManager resource = Fleet result = Ok(())
6622026-03-24T18:29:59.743ZDEBGnexus (BackgroundTasks): roles background_task = trust_quorum_manager bgtask = TrustQuorumManager roles = RoleSet { roles: {} }
6632026-03-24T18:29:59.743ZDEBGnexus (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = trust_quorum_manager bgtask = TrustQuorumManager resource = Database result = Ok(())
6642026-03-24T18:29:59.743ZDEBGnexus (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = decommissioned_disk_cleaner resource = Fleet result = Ok(())
6652026-03-24T18:29:59.743ZDEBGnexus (BackgroundTasks): roles background_task = decommissioned_disk_cleaner roles = RoleSet { roles: {} }
6662026-03-24T18:29:59.744ZDEBGnexus (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = decommissioned_disk_cleaner resource = Database result = Ok(())
6672026-03-24T18:29:59.746ZDEBGnexus (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = fm_sitrep_loader resource = Fleet result = Ok(())
6682026-03-24T18:29:59.746ZDEBGnexus (BackgroundTasks): roles background_task = fm_sitrep_loader roles = RoleSet { roles: {} }
6692026-03-24T18:29:59.746ZDEBGnexus (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = fm_sitrep_loader resource = Database result = Ok(())
6702026-03-24T18:29:59.746ZDEBGnexus (BackgroundTasks): roles background_task = attached_subnet_manager roles = RoleSet { roles: {} }
6712026-03-24T18:29:59.746ZDEBGnexus (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = physical_disk_adoption resource = Fleet result = Ok(())
6722026-03-24T18:29:59.746ZDEBGnexus (BackgroundTasks): roles background_task = physical_disk_adoption roles = RoleSet { roles: {} }
6732026-03-24T18:29:59.746ZDEBGnexus (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = physical_disk_adoption resource = Database result = Ok(())
6742026-03-24T18:29:59.746ZDEBGnexus (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = attached_subnet_manager resource = Database result = Ok(())
6752026-03-24T18:29:59.747ZDEBGnexus (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = inventory_loader resource = Inventory result = Ok(())
6762026-03-24T18:29:59.748ZDEBGnexus (BackgroundTasks): roles background_task = inventory_loader roles = RoleSet { roles: {} }
6772026-03-24T18:29:59.748ZDEBGnexus (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = inventory_loader resource = Database result = Ok(())
6782026-03-24T18:29:59.748ZDEBGnexus (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = reconfigurator_config_watcher resource = BlueprintConfig result = Ok(())
6792026-03-24T18:29:59.748ZDEBGnexus (BackgroundTasks): roles background_task = reconfigurator_config_watcher roles = RoleSet { roles: {} }
6802026-03-24T18:29:59.748ZDEBGnexus (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = reconfigurator_config_watcher resource = Database result = Ok(())
6812026-03-24T18:29:59.778ZINFOnexus (BackgroundTasks): Metric producer GC complete (no errors) background_task = metrics_producer_gc expiration = 2026-03-24 18:19:59.702866746 UTC file = nexus/src/app/background/tasks/metrics_producer_gc.rs:69 pruned = {}
6822026-03-24T18:29:59.778ZDEBGnexus (BackgroundTasks): activation complete background_task = metrics_producer_gc elapsed = 75.783724ms iteration = 1 status = {"expiration":"2026-03-24T18:19:59.702866746Z","pruned":[]}
6832026-03-24T18:29:59.784ZDEBGnexus (DnsResolver): lookup_all_socket_v6 srv dns_name = _dendrite._tcp.control-plane.oxide.internal response = SrvLookup(Lookup { query: Query { name: Name("_dendrite._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN }, records: [Record { name_labels: Name("_dendrite._tcp.control-plane.oxide.internal."), dns_class: IN, ttl: 0, rdata: SRV(SRV { priority: 0, weight: 0, port: 12224, target: Name("dendrite-32482131-2003-4c82-8bdf-7b718f891115.host.control-plane.oxide.internal.") }) }, Record { name_labels: Name("dendrite-32482131-2003-4c82-8bdf-7b718f891115.host.control-plane.oxide.internal."), dns_class: IN, ttl: 0, rdata: AAAA(AAAA(fd00:1122:3344:101::2)) }], valid_until: Instant { tv_sec: 809, tv_nsec: 591182346 } })
6842026-03-24T18:29:59.789ZERROnexus (BackgroundTasks): dendrite for switch1 is unavailable, cannot perform nat cleanup background_task = nat_garbage_collector file = nexus/src/app/background/tasks/nat_cleanup.rs:89
6852026-03-24T18:29:59.789ZDEBGnexus (BackgroundTasks): activation complete background_task = nat_garbage_collector elapsed = 86.905939ms iteration = 1 status = {"error":"dendrite for switch1 is unavailable, cannot perform nat cleanup"}
6862026-03-24T18:29:59.842ZDEBGnexus (dropshot_lockstep): roles authenticated = true local_addr = [fd00:1122:3344:101::b]:12232 method = PUT remote_addr = [fd00:1122:3344:101::1]:57008 req_id = d61e93a3-c8c2-428f-931d-f068f92fb917 roles = RoleSet { roles: {} } type = user_builtin uri = /racks/386a345e-f45a-414e-a736-ceb668826f36/initialization-complete user_builtin_id = 001de000-05e4-4000-8000-000000000002
6872026-03-24T18:29:59.843ZDEBGnexus (dropshot_lockstep): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) authenticated = true local_addr = [fd00:1122:3344:101::b]:12232 method = PUT remote_addr = [fd00:1122:3344:101::1]:57008 req_id = d61e93a3-c8c2-428f-931d-f068f92fb917 resource = Database result = Ok(()) type = user_builtin uri = /racks/386a345e-f45a-414e-a736-ceb668826f36/initialization-complete user_builtin_id = 001de000-05e4-4000-8000-000000000002
6882026-03-24T18:29:59.856ZDEBGnexus (BackgroundTasks): roles background_task = probe_distributor roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
6892026-03-24T18:29:59.860ZDEBGnexus (BackgroundTasks): roles background_task = external_endpoints roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
6902026-03-24T18:29:59.860ZDEBGnexus (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = probe_distributor resource = Fleet result = Ok(())
6912026-03-24T18:29:59.860ZDEBGnexus (BackgroundTasks): roles background_task = probe_distributor roles = RoleSet { roles: {} }
6922026-03-24T18:29:59.860ZDEBGnexus (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = probe_distributor resource = Database result = Ok(())
6932026-03-24T18:29:59.862ZDEBGnexus (BackgroundTasks): roles background_task = fm_sitrep_gc roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
6942026-03-24T18:29:59.865ZDEBGnexus (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = external_endpoints resource = Fleet result = Ok(())
6952026-03-24T18:29:59.865ZDEBGnexus (BackgroundTasks): roles background_task = external_endpoints roles = RoleSet { roles: {} }
6962026-03-24T18:29:59.865ZDEBGnexus (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = external_endpoints resource = Database result = Ok(())
6972026-03-24T18:29:59.865ZDEBGnexus (BackgroundTasks): authorize result action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = fm_sitrep_gc resource = Fleet result = Ok(())
6982026-03-24T18:29:59.869ZDEBGnexus (BackgroundTasks): roles background_task = switch_port_config_manager roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
6992026-03-24T18:29:59.869ZDEBGnexus (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
7002026-03-24T18:29:59.871ZDEBGnexus (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
7012026-03-24T18:29:59.874ZDEBGnexus (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = switch_port_config_manager resource = Fleet result = Ok(())
7022026-03-24T18:29:59.874ZDEBGnexus (BackgroundTasks): roles background_task = switch_port_config_manager roles = RoleSet { roles: {} }
7032026-03-24T18:29:59.874ZDEBGnexus (BackgroundTasks): authorize result action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = inventory_collection resource = Inventory result = Ok(())
7042026-03-24T18:29:59.874ZDEBGnexus (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {} }
7052026-03-24T18:29:59.874ZDEBGnexus (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = switch_port_config_manager resource = Database result = Ok(())
7062026-03-24T18:29:59.874ZDEBGnexus (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = inventory_collection resource = Database result = Ok(())
7072026-03-24T18:29:59.876ZDEBGnexus (BackgroundTasks): roles background_task = dns_config_external dns_group = external roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
7082026-03-24T18:29:59.876ZDEBGnexus (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = vpc_route_manager resource = Fleet result = Ok(())
7092026-03-24T18:29:59.876ZDEBGnexus (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
7102026-03-24T18:29:59.877ZDEBGnexus (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = vpc_route_manager resource = Database result = Ok(())
7112026-03-24T18:29:59.878ZDEBGnexus (BackgroundTasks): roles background_task = instance_watcher roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
7122026-03-24T18:29:59.880ZDEBGnexus (BackgroundTasks): activation complete background_task = region_snapshot_replacement_garbage_collection elapsed = 167.637837ms iteration = 1 status = {"errors":[],"garbage_collect_requested":[]}
7132026-03-24T18:29:59.880ZDEBGnexus (BackgroundTasks): activation complete background_task = region_snapshot_replacement_finish elapsed = 164.639147ms iteration = 1 status = {"errors":[],"finish_invoked_ok":[]}
7142026-03-24T18:29:59.882ZDEBGnexus (BackgroundTasks): roles background_task = support_bundle_collector roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
7152026-03-24T18:29:59.883ZDEBGnexus (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = dns_config_external dns_group = external resource = DnsConfig result = Ok(())
7162026-03-24T18:29:59.883ZDEBGnexus (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = instance_watcher resource = Fleet result = Ok(())
7172026-03-24T18:29:59.883ZDEBGnexus (BackgroundTasks): roles background_task = instance_watcher roles = RoleSet { roles: {} }
7182026-03-24T18:29:59.883ZDEBGnexus (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = instance_watcher resource = Database result = Ok(())
7192026-03-24T18:29:59.886ZDEBGnexus (BackgroundTasks): roles background_task = audit_log_cleanup roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
7202026-03-24T18:29:59.887ZDEBGnexus (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = support_bundle_collector resource = Fleet result = Ok(())
7212026-03-24T18:29:59.887ZDEBGnexus (BackgroundTasks): roles background_task = support_bundle_collector roles = RoleSet { roles: {} }
7222026-03-24T18:29:59.887ZDEBGnexus (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = support_bundle_collector resource = Database result = Ok(())
7232026-03-24T18:29:59.888ZDEBGnexus (BackgroundTasks): authorize result action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = audit_log_cleanup resource = AuditLog result = Ok(())
7242026-03-24T18:29:59.888ZDEBGnexus (BackgroundTasks): roles background_task = audit_log_cleanup roles = RoleSet { roles: {} }
7252026-03-24T18:29:59.889ZDEBGnexus (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = audit_log_cleanup resource = Database result = Ok(())
7262026-03-24T18:29:59.889ZDEBGnexus (BackgroundTasks): activation complete background_task = phantom_disks elapsed = 174.154332ms iteration = 1 status = {"phantom_disk_deleted_err":0,"phantom_disk_deleted_ok":0}
7272026-03-24T18:29:59.890ZDEBGnexus (BackgroundTasks): roles background_task = blueprint_loader roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
7282026-03-24T18:29:59.896ZDEBGnexus (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = blueprint_loader resource = BlueprintConfig result = Ok(())
7292026-03-24T18:29:59.896ZDEBGnexus (BackgroundTasks): roles background_task = blueprint_loader roles = RoleSet { roles: {} }
7302026-03-24T18:29:59.896ZDEBGnexus (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = blueprint_loader resource = Database result = Ok(())
7312026-03-24T18:29:59.899ZDEBGnexus (BackgroundTasks): roles background_task = dns_config_internal dns_group = internal roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
7322026-03-24T18:29:59.905ZDEBGnexus (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = dns_config_internal dns_group = internal resource = DnsConfig result = Ok(())
7332026-03-24T18:29:59.912ZDEBGnexus (BackgroundTasks): roles background_task = audit_log_timeout_incomplete roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
7342026-03-24T18:29:59.913ZDEBGnexus (BackgroundTasks): roles background_task = region_snapshot_replacement_step roles = RoleSet { roles: {} }
7352026-03-24T18:29:59.913ZDEBGnexus (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = region_snapshot_replacement_step resource = Database result = Ok(())
7362026-03-24T18:29:59.914ZDEBGnexus (BackgroundTasks): authorize result action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = audit_log_timeout_incomplete resource = AuditLog result = Ok(())
7372026-03-24T18:29:59.914ZDEBGnexus (BackgroundTasks): roles background_task = audit_log_timeout_incomplete roles = RoleSet { roles: {} }
7382026-03-24T18:29:59.914ZDEBGnexus (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = audit_log_timeout_incomplete resource = Database result = Ok(())
7392026-03-24T18:29:59.916ZDEBGnexus (BackgroundTasks): roles background_task = tuf_artifact_replication roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
7402026-03-24T18:29:59.916ZDEBGnexus (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
7412026-03-24T18:29:59.917ZDEBGnexus (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
7422026-03-24T18:29:59.920ZDEBGnexus (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = tuf_artifact_replication resource = Fleet result = Ok(())
7432026-03-24T18:29:59.920ZDEBGnexus (BackgroundTasks): roles background_task = tuf_artifact_replication roles = RoleSet { roles: {} }
7442026-03-24T18:29:59.920ZDEBGnexus (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = tuf_artifact_replication resource = Database result = Ok(())
7452026-03-24T18:29:59.926ZDEBGnexus (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
7462026-03-24T18:29:59.926ZDEBGnexus (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
7472026-03-24T18:29:59.932ZDEBGnexus (BackgroundTasks): activation complete background_task = lookup_region_port elapsed = 212.233642ms iteration = 1 status = {"errors":[],"found_port_ok":[]}
7482026-03-24T18:29:59.934ZDEBGnexus (BackgroundTasks): roles background_task = region_replacement_driver roles = RoleSet { roles: {} }
7492026-03-24T18:29:59.935ZDEBGnexus (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = region_replacement_driver resource = Database result = Ok(())
7502026-03-24T18:29:59.935ZINFOnexus (BackgroundTasks): all webhook delivery tasks completed background_task = webhook_deliverator file = nexus/src/app/background/tasks/webhook_deliverator.rs:204 num_receivers = 0
7512026-03-24T18:29:59.935ZDEBGnexus (BackgroundTasks): activation complete background_task = webhook_deliverator elapsed = 216.384056ms iteration = 1 status = {"by_rx":{},"error":null}
7522026-03-24T18:29:59.936ZDEBGnexus (BackgroundTasks): session cleanup found no expired sessions background_task = session_cleanup cutoff = 2026-03-23 18:29:59.727719112 UTC
7532026-03-24T18:29:59.937ZDEBGnexus (BackgroundTasks): activation complete background_task = session_cleanup elapsed = 209.275302ms iteration = 1 status = {"cutoff":"2026-03-23T18:29:59.727719112Z","deleted":0,"error":null,"limit":10000}
7542026-03-24T18:29:59.944ZDEBGnexus (DnsResolver): lookup_all_ipv6 srv dns_name = _dendrite._tcp.control-plane.oxide.internal response = SrvLookup(Lookup { query: Query { name: Name("_dendrite._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN }, records: [Record { name_labels: Name("_dendrite._tcp.control-plane.oxide.internal."), dns_class: IN, ttl: 0, rdata: SRV(SRV { priority: 0, weight: 0, port: 12224, target: Name("dendrite-32482131-2003-4c82-8bdf-7b718f891115.host.control-plane.oxide.internal.") }) }, Record { name_labels: Name("dendrite-32482131-2003-4c82-8bdf-7b718f891115.host.control-plane.oxide.internal."), dns_class: IN, ttl: 0, rdata: AAAA(AAAA(fd00:1122:3344:101::2)) }], valid_until: Instant { tv_sec: 809, tv_nsec: 750650796 } })
7552026-03-24T18:29:59.944ZINFOnexus (BackgroundTasks): Determining switch slots managed by switch zones background_task = bfd_manager file = nexus/src/app/mod.rs:1392
7562026-03-24T18:29:59.945ZDEBGnexus (DnsResolver): lookup_all_socket_v6 srv dns_name = _mgs._tcp.control-plane.oxide.internal response = SrvLookup(Lookup { query: Query { name: Name("_mgs._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN }, records: [Record { name_labels: Name("_mgs._tcp.control-plane.oxide.internal."), dns_class: IN, ttl: 0, rdata: SRV(SRV { priority: 0, weight: 0, port: 12225, target: Name("dendrite-32482131-2003-4c82-8bdf-7b718f891115.host.control-plane.oxide.internal.") }) }, Record { name_labels: Name("dendrite-32482131-2003-4c82-8bdf-7b718f891115.host.control-plane.oxide.internal."), dns_class: IN, ttl: 0, rdata: AAAA(AAAA(fd00:1122:3344:101::2)) }], valid_until: Instant { tv_sec: 809, tv_nsec: 751653629 } })
7572026-03-24T18:29:59.945ZINFOnexus (BackgroundTasks): Physical Disk Adoption: Rack not yet initialized background_task = physical_disk_adoption file = nexus/src/app/background/tasks/physical_disk_adoption.rs:82 rack_id = 386a345e-f45a-414e-a736-ceb668826f36
7582026-03-24T18:29:59.945ZDEBGnexus (BackgroundTasks): activation complete background_task = physical_disk_adoption elapsed = 226.105103ms iteration = 1 status = {"error":"rack not yet initialized: 386a345e-f45a-414e-a736-ceb668826f36"}
7592026-03-24T18:29:59.948ZINFOnexus (BackgroundTasks): determining switch slot managed by switch zone background_task = bfd_manager file = nexus/src/app/mod.rs:1419 zone_address = fd00:1122:3344:101::2
7602026-03-24T18:29:59.948ZDEBGnexus (MgsClient): client request background_task = bfd_manager body = None method = GET uri = http://[fd00:1122:3344:101::2]:12225/local/switch-id
7612026-03-24T18:29:59.948ZDEBGnexus (MgsClient): client response background_task = bfd_manager result = Ok(Response { url: "http://[fd00:1122:3344:101::2]:12225/local/switch-id", status: 200, headers: {"content-type": "application/json", "x-request-id": "77dedb42-4e94-4e2d-829b-87c0fc8d2692", "content-length": "26", "date": "Tue, 24 Mar 2026 18:29:59 GMT"} })
7622026-03-24T18:29:59.948ZINFOnexus (BackgroundTasks): identified switch slot for switch zone background_task = bfd_manager file = nexus/src/app/mod.rs:1422 slot = SpIdentifier {\n slot: 0,\n type_: Switch,\n} zone_address = fd00:1122:3344:101::2
7632026-03-24T18:29:59.948ZINFOnexus (BackgroundTasks): completed mapping switch zones to switch slots background_task = bfd_manager file = nexus/src/app/mod.rs:1457 mappings = {\n switch0: fd00:1122:3344:101::2,\n}
7642026-03-24T18:29:59.949ZDEBGnexus (DnsResolver): lookup_all_socket_v6 srv dns_name = _mgd._tcp.control-plane.oxide.internal response = SrvLookup(Lookup { query: Query { name: Name("_mgd._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN }, records: [Record { name_labels: Name("_mgd._tcp.control-plane.oxide.internal."), dns_class: IN, ttl: 0, rdata: SRV(SRV { priority: 0, weight: 0, port: 4676, target: Name("dendrite-32482131-2003-4c82-8bdf-7b718f891115.host.control-plane.oxide.internal.") }) }, Record { name_labels: Name("dendrite-32482131-2003-4c82-8bdf-7b718f891115.host.control-plane.oxide.internal."), dns_class: IN, ttl: 0, rdata: AAAA(AAAA(fd00:1122:3344:101::2)) }], valid_until: Instant { tv_sec: 809, tv_nsec: 755937215 } })
7652026-03-24T18:29:59.950ZDEBGnexus (BackgroundTasks): roles background_task = probe_distributor roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
7662026-03-24T18:29:59.950ZDEBGnexus (dropshot_lockstep): roles authenticated = true local_addr = [fd00:1122:3344:101::b]:12232 method = PUT remote_addr = [fd00:1122:3344:101::1]:57008 req_id = d61e93a3-c8c2-428f-931d-f068f92fb917 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} } type = user_builtin uri = /racks/386a345e-f45a-414e-a736-ceb668826f36/initialization-complete user_builtin_id = 001de000-05e4-4000-8000-000000000002
7672026-03-24T18:29:59.951ZDEBGnexus (BackgroundTasks): reconfigurator config load complete background_task = reconfigurator_config_watcher switches = Loaded(ReconfiguratorConfigView { version: 1, config: ReconfiguratorConfig { planner_enabled: true, planner_config: PlannerConfig { add_zones_with_mupdate_override: false }, tuf_repo_pruner_enabled: true }, time_modified: 1970-01-01T00:01:01Z })
7682026-03-24T18:29:59.951ZDEBGnexus (BackgroundTasks): activating background_task = tuf_repo_pruner iteration = 2 reason = Dependency
7692026-03-24T18:29:59.951ZDEBGnexus (BackgroundTasks): activation complete background_task = reconfigurator_config_watcher elapsed = 249.147495ms iteration = 1 status = {"config_updated":true}
7702026-03-24T18:29:59.951ZDEBGnexus (BackgroundTasks): activating background_task = blueprint_planner iteration = 2 reason = Dependency
7712026-03-24T18:29:59.951ZDEBGnexus (BackgroundTasks): roles background_task = tuf_repo_pruner roles = RoleSet { roles: {} }
7722026-03-24T18:29:59.952ZWARNnexus (BackgroundTasks): blueprint planning skipped background_task = blueprint_planner error = no target blueprint available file = nexus/src/app/background/tasks/blueprint_planner.rs:132
7732026-03-24T18:29:59.952ZDEBGnexus (BackgroundTasks): activation complete background_task = blueprint_planner elapsed = 39.131\u{b5}s iteration = 2 status = {"Error":"no target blueprint available"}
7742026-03-24T18:29:59.952ZDEBGnexus (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = tuf_repo_pruner resource = Database result = Ok(())
7752026-03-24T18:29:59.952ZDEBGnexus (BackgroundTasks): activation complete background_task = bfd_manager elapsed = 249.985696ms iteration = 1 status = {}
7762026-03-24T18:29:59.953ZDEBGnexus (dropshot_lockstep): authorize result action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) authenticated = true local_addr = [fd00:1122:3344:101::b]:12232 method = PUT remote_addr = [fd00:1122:3344:101::1]:57008 req_id = d61e93a3-c8c2-428f-931d-f068f92fb917 resource = Fleet result = Ok(()) type = user_builtin uri = /racks/386a345e-f45a-414e-a736-ceb668826f36/initialization-complete user_builtin_id = 001de000-05e4-4000-8000-000000000002
7772026-03-24T18:29:59.954ZDEBGnexus (dropshot_lockstep): roles authenticated = true local_addr = [fd00:1122:3344:101::b]:12232 method = PUT remote_addr = [fd00:1122:3344:101::1]:57008 req_id = d61e93a3-c8c2-428f-931d-f068f92fb917 roles = RoleSet { roles: {} } type = user_builtin uri = /racks/386a345e-f45a-414e-a736-ceb668826f36/initialization-complete user_builtin_id = 001de000-05e4-4000-8000-000000000002
7782026-03-24T18:29:59.954ZDEBGnexus (dropshot_lockstep): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) authenticated = true local_addr = [fd00:1122:3344:101::b]:12232 method = PUT remote_addr = [fd00:1122:3344:101::1]:57008 req_id = d61e93a3-c8c2-428f-931d-f068f92fb917 resource = Database result = Ok(()) type = user_builtin uri = /racks/386a345e-f45a-414e-a736-ceb668826f36/initialization-complete user_builtin_id = 001de000-05e4-4000-8000-000000000002
7792026-03-24T18:29:59.955ZDEBGnexus (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = probe_distributor resource = Fleet result = Ok(())
7802026-03-24T18:29:59.955ZDEBGnexus (BackgroundTasks): roles background_task = probe_distributor roles = RoleSet { roles: {} }
7812026-03-24T18:29:59.955ZDEBGnexus (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = probe_distributor resource = Database result = Ok(())
7822026-03-24T18:29:59.960ZDEBGnexus (BackgroundTasks): activation complete background_task = switch_port_config_manager elapsed = 240.592913ms iteration = 1 status = {}
7832026-03-24T18:29:59.960ZDEBGnexus (BackgroundTasks): roles background_task = external_endpoints roles = RoleSet { roles: {} }
7842026-03-24T18:29:59.961ZDEBGnexus (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = external_endpoints resource = Database result = Ok(())
7852026-03-24T18:29:59.964ZDEBGnexus (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
7862026-03-24T18:29:59.965ZDEBGnexus (BackgroundTasks): activation complete background_task = inventory_loader elapsed = 249.881955ms iteration = 1 status = "NoCollections"
7872026-03-24T18:29:59.968ZDEBGnexus (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = vpc_route_manager resource = Fleet result = Ok(())
7882026-03-24T18:29:59.968ZDEBGnexus (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
7892026-03-24T18:29:59.969ZDEBGnexus (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = vpc_route_manager resource = Database result = Ok(())
7902026-03-24T18:29:59.974ZDEBGnexus (BackgroundTasks): activation complete background_task = fm_sitrep_loader elapsed = 257.048398ms iteration = 1 status = "NoSitrep"
7912026-03-24T18:29:59.977ZDEBGnexus (BackgroundTasks): roles background_task = alert_dispatcher roles = RoleSet { roles: {} }
7922026-03-24T18:29:59.978ZDEBGnexus (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = alert_dispatcher resource = Database result = Ok(())
7932026-03-24T18:29:59.998ZDEBGnexus (BackgroundTasks): roles background_task = region_replacement roles = RoleSet { roles: {} }
7942026-03-24T18:29:59.998ZDEBGnexus (BackgroundTasks): audit log cleanup: no old entries to delete background_task = audit_log_cleanup cutoff = 2025-12-24 18:29:59.727735582 UTC
7952026-03-24T18:29:59.998ZDEBGnexus (BackgroundTasks): activation complete background_task = audit_log_cleanup elapsed = 270.87359ms iteration = 1 status = {"cutoff":"2025-12-24T18:29:59.727735582Z","error":null,"max_deleted_per_activation":10000,"rows_deleted":0}
7962026-03-24T18:29:59.998ZDEBGnexus (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = region_replacement resource = Database result = Ok(())
7972026-03-24T18:30:00.014ZDEBGnexus (BackgroundTasks): roles background_task = region_snapshot_replacement_start roles = RoleSet { roles: {} }
7982026-03-24T18:30:00.015ZDEBGnexus (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = region_snapshot_replacement_start resource = Database result = Ok(())
7992026-03-24T18:30:00.017ZWARNnexus (BackgroundTasks): failed to read target blueprint background_task = blueprint_loader error = Internal Error: no target blueprint set file = nexus/src/app/background/tasks/blueprint_load.rs:81
8002026-03-24T18:30:00.017ZDEBGnexus (BackgroundTasks): activation complete background_task = blueprint_loader elapsed = 314.440951ms iteration = 1 status = {"error":"failed to read target blueprint: Internal Error: no target blueprint set"}
8012026-03-24T18:30:00.024ZDEBGnexus (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
8022026-03-24T18:30:00.024ZDEBGnexus (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
8032026-03-24T18:30:00.034ZDEBGnexus (BackgroundTasks): roles background_task = fm_sitrep_gc roles = RoleSet { roles: {} }
8042026-03-24T18:30:00.034ZINFOnexus (BackgroundTasks): listed instances with destroyed active VMMs background_task = instance_updater count = 0 file = nexus/src/app/background/tasks/instance_updater.rs:59
8052026-03-24T18:30:00.034ZDEBGnexus (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = fm_sitrep_gc resource = Database result = Ok(())
8062026-03-24T18:30:00.034ZDEBGnexus (BackgroundTasks): looking for instances with failed active VMMs... background_task = instance_updater
8072026-03-24T18:30:00.034ZDEBGnexus (BackgroundTasks): roles background_task = instance_updater roles = RoleSet { roles: {} }
8082026-03-24T18:30:00.035ZDEBGnexus (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = instance_updater resource = Database result = Ok(())
8092026-03-24T18:30:00.039ZDEBGnexus (dropshot_lockstep): roles authenticated = true local_addr = [fd00:1122:3344:101::b]:12232 method = PUT remote_addr = [fd00:1122:3344:101::1]:57008 req_id = d61e93a3-c8c2-428f-931d-f068f92fb917 roles = RoleSet { roles: {} } type = user_builtin uri = /racks/386a345e-f45a-414e-a736-ceb668826f36/initialization-complete user_builtin_id = 001de000-05e4-4000-8000-000000000002
8102026-03-24T18:30:00.039ZDEBGnexus (dropshot_lockstep): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) authenticated = true local_addr = [fd00:1122:3344:101::b]:12232 method = PUT remote_addr = [fd00:1122:3344:101::1]:57008 req_id = d61e93a3-c8c2-428f-931d-f068f92fb917 resource = Database result = Ok(()) type = user_builtin uri = /racks/386a345e-f45a-414e-a736-ceb668826f36/initialization-complete user_builtin_id = 001de000-05e4-4000-8000-000000000002
8112026-03-24T18:30:00.041ZDEBGnexus (BackgroundTasks): inventory_prune_one: nothing eligible for removal (too few) background_task = inventory_collection candidates = []
8122026-03-24T18:30:00.042ZDEBGnexus (DnsResolver): lookup_all_socket_v6 srv dns_name = _mgs._tcp.control-plane.oxide.internal response = SrvLookup(Lookup { query: Query { name: Name("_mgs._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN }, records: [Record { name_labels: Name("_mgs._tcp.control-plane.oxide.internal."), dns_class: IN, ttl: 0, rdata: SRV(SRV { priority: 0, weight: 0, port: 12225, target: Name("dendrite-32482131-2003-4c82-8bdf-7b718f891115.host.control-plane.oxide.internal.") }) }, Record { name_labels: Name("dendrite-32482131-2003-4c82-8bdf-7b718f891115.host.control-plane.oxide.internal."), dns_class: IN, ttl: 0, rdata: AAAA(AAAA(fd00:1122:3344:101::2)) }], valid_until: Instant { tv_sec: 809, tv_nsec: 848547969 } })
8132026-03-24T18:30:00.044ZDEBGnexus (BackgroundTasks): roles background_task = external_endpoints roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
8142026-03-24T18:30:00.045ZDEBGnexus (BackgroundTasks): activation complete background_task = alert_dispatcher elapsed = 325.167162ms iteration = 1 status = {"dispatched":[],"errors":[],"glob_version":"242.0.0","globs_reprocessed":{},"no_receivers":[]}
8152026-03-24T18:30:00.047ZDEBGnexus (DnsResolver): lookup_all_socket_v6 srv dns_name = _cockroach._tcp.control-plane.oxide.internal response = SrvLookup(Lookup { query: Query { name: Name("_cockroach._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN }, records: [Record { name_labels: Name("_cockroach._tcp.control-plane.oxide.internal."), dns_class: IN, ttl: 0, rdata: SRV(SRV { priority: 0, weight: 0, port: 32221, target: Name("0c78db80-ae39-499b-902a-fcf6fb9b5462.host.control-plane.oxide.internal.") }) }, Record { name_labels: Name("_cockroach._tcp.control-plane.oxide.internal."), dns_class: IN, ttl: 0, rdata: SRV(SRV { priority: 0, weight: 0, port: 32221, target: Name("20dac5ce-5125-4bf6-8b1b-db51a73309cd.host.control-plane.oxide.internal.") }) }, Record { name_labels: Name("_cockroach._tcp.control-plane.oxide.internal."), dns_class: IN, ttl: 0, rdata: SRV(SRV { priority: 0, weight: 0, port: 32221, target: Name("49ae747f-9b86-4ed5-a14b-e2b0a45eb053.host.control-plane.oxide.internal.") }) }, Record { name_labels: Name("_cockroach._tcp.control-plane.oxide.internal."), dns_class: IN, ttl: 0, rdata: SRV(SRV { priority: 0, weight: 0, port: 32221, target: Name("9021617e-29d4-4899-a501-fcbe2ef200aa.host.control-plane.oxide.internal.") }) }, Record { name_labels: Name("_cockroach._tcp.control-plane.oxide.internal."), dns_class: IN, ttl: 0, rdata: SRV(SRV { priority: 0, weight: 0, port: 32221, target: Name("effbaddf-2078-411d-93c4-e85d230ec802.host.control-plane.oxide.internal.") }) }, Record { name_labels: Name("effbaddf-2078-411d-93c4-e85d230ec802.host.control-plane.oxide.internal."), dns_class: IN, ttl: 0, rdata: AAAA(AAAA(fd00:1122:3344:101::4)) }], valid_until: Instant { tv_sec: 809, tv_nsec: 853654276 } })
8162026-03-24T18:30:00.048ZDEBGnexus (BackgroundTasks): roles background_task = region_snapshot_replacement_step roles = RoleSet { roles: {} }
8172026-03-24T18:30:00.049ZDEBGnexus (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = region_snapshot_replacement_step resource = Database result = Ok(())
8182026-03-24T18:30:00.049ZDEBGnexus (BackgroundTasks): roles background_task = tuf_repo_pruner roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
8192026-03-24T18:30:00.051ZDEBGnexus (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = external_endpoints resource = DnsConfig result = Ok(())
8202026-03-24T18:30:00.051ZDEBGnexus (BackgroundTasks): roles background_task = external_endpoints roles = RoleSet { roles: {} }
8212026-03-24T18:30:00.051ZDEBGnexus (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = external_endpoints resource = Database result = Ok(())
8222026-03-24T18:30:00.054ZDEBGnexus (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = tuf_repo_pruner resource = Fleet result = Ok(())
8232026-03-24T18:30:00.054ZDEBGnexus (BackgroundTasks): roles background_task = tuf_repo_pruner roles = RoleSet { roles: {} }
8242026-03-24T18:30:00.054ZDEBGnexus (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = tuf_repo_pruner resource = Database result = Ok(())
8252026-03-24T18:30:00.057ZINFOnexus (SagaRecoverer): listed in-progress sagas count = 0 file = nexus/src/app/background/tasks/saga_recovery.rs:473
8262026-03-24T18:30:00.058ZINFOnexus (SagaQuiesceHandle): saga recovery pass finished blueprint_id = None file = nexus/types/src/quiesce.rs:525 generation = 1
8272026-03-24T18:30:00.058ZDEBGnexus (BackgroundTasks): activation complete background_task = saga_recovery elapsed = 341.363493ms iteration = 1 status = {"last_pass":{"Success":{"nfailed":0,"nfound":0,"nrecovered":0,"nremoved":0,"nskipped":0}},"ntotal_failures":0,"ntotal_finished":0,"ntotal_recovered":0,"ntotal_sec_errors_bad_state":0,"ntotal_sec_errors_missing":0,"ntotal_started":0,"recent_failures":[],"recent_recoveries":[]}
8282026-03-24T18:30:00.061ZDEBGnexus (CockroachClusterAdminClient): Updated CockroachDB cluster backends added = 5 addresses = [[fd00:1122:3344:101::5]:32222, [fd00:1122:3344:101::6]:32222, [fd00:1122:3344:101::7]:32222, [fd00:1122:3344:101::3]:32222, [fd00:1122:3344:101::4]:32222] removed = 0 total = 5
8292026-03-24T18:30:00.064ZDEBGnexus (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
8302026-03-24T18:30:00.064ZDEBGnexus (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
8312026-03-24T18:30:00.066ZDEBGnexus (BackgroundTasks): roles background_task = fm_sitrep_gc roles = RoleSet { roles: {} }
8322026-03-24T18:30:00.066ZDEBGnexus (BackgroundTasks): begin collection background_task = inventory_collection
8332026-03-24T18:30:00.066ZDEBGnexus (BackgroundTasks): begin collection from MGS background_task = inventory_collection mgs_url = http://[fd00:1122:3344:101::2]:12225
8342026-03-24T18:30:00.066ZDEBGnexus (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[fd00:1122:3344:101::2]:12225 method = GET uri = http://[fd00:1122:3344:101::2]:12225/ignition
8352026-03-24T18:30:00.066ZDEBGnexus (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = fm_sitrep_gc resource = Database result = Ok(())
8362026-03-24T18:30:00.067ZDEBGnexus (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[fd00:1122:3344:101::2]:12225 result = Ok(Response { url: "http://[fd00:1122:3344:101::2]:12225/ignition", status: 200, headers: {"content-type": "application/json", "x-request-id": "7c1ff268-11b5-4fe3-8f07-8fbfc3411d79", "content-length": "476", "date": "Tue, 24 Mar 2026 18:30:00 GMT"} })
8372026-03-24T18:30:00.069ZWARNnexus (BackgroundTasks): failed to read DNS config background_task = dns_config_external dns_group = external error = Internal Error: expected exactly one latest version for DNS group External, found 0 file = nexus/src/app/background/tasks/dns_config.rs:72
8382026-03-24T18:30:00.069ZDEBGnexus (BackgroundTasks): activation complete background_task = dns_config_external dns_group = external elapsed = 366.438222ms iteration = 1 status = {"error":"failed to read DNS config: Internal Error: expected exactly one latest version for DNS group External, found 0"}
8392026-03-24T18:30:00.074ZDEBGnexus (BackgroundTasks): Found zpools on decommissioned disks background_task = decommissioned_disk_cleaner count = 0
8402026-03-24T18:30:00.074ZINFOnexus (BackgroundTasks): Cleaned decommissioned zpools background_task = decommissioned_disk_cleaner deleted = 0 error_count = 0 file = nexus/src/app/background/tasks/decommissioned_disk_cleaner.rs:137 found = 0 not_ready_to_be_deleted = 0
8412026-03-24T18:30:00.074ZDEBGnexus (BackgroundTasks): activation complete background_task = decommissioned_disk_cleaner elapsed = 371.907644ms iteration = 1 status = {"deleted":0,"error":null,"error_count":0,"found":0,"not_ready_to_be_deleted":0}
8422026-03-24T18:30:00.076ZDEBGnexus (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[fd00:1122:3344:101::2]:12225 method = GET uri = http://[fd00:1122:3344:101::2]:12225/sp/switch/0
8432026-03-24T18:30:00.078ZDEBGnexus (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[fd00:1122:3344:101::2]:12225 result = Ok(Response { url: "http://[fd00:1122:3344:101::2]:12225/sp/switch/0", status: 200, headers: {"content-type": "application/json", "x-request-id": "630923b5-98de-40b3-bfe8-f1e96419f2b5", "content-length": "734", "date": "Tue, 24 Mar 2026 18:30:00 GMT"} })
8442026-03-24T18:30:00.078ZDEBGnexus (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[fd00:1122:3344:101::2]:12225 method = GET uri = http://[fd00:1122:3344:101::2]:12225/sp/switch/0/component/sp/caboose?firmware_slot=0
8452026-03-24T18:30:00.081ZDEBGnexus (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[fd00:1122:3344:101::2]:12225 result = Ok(Response { url: "http://[fd00:1122:3344:101::2]:12225/sp/switch/0/component/sp/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "0fa64f51-56d1-43c1-8269-b0096e5b7ef2", "content-length": "111", "date": "Tue, 24 Mar 2026 18:30:00 GMT"} })
8462026-03-24T18:30:00.081ZDEBGnexus (dropshot_lockstep): roles authenticated = true local_addr = [fd00:1122:3344:101::b]:12232 method = PUT remote_addr = [fd00:1122:3344:101::1]:57008 req_id = d61e93a3-c8c2-428f-931d-f068f92fb917 roles = RoleSet { roles: {} } type = user_builtin uri = /racks/386a345e-f45a-414e-a736-ceb668826f36/initialization-complete user_builtin_id = 001de000-05e4-4000-8000-000000000002
8472026-03-24T18:30:00.081ZDEBGnexus (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[fd00:1122:3344:101::2]:12225 method = GET uri = http://[fd00:1122:3344:101::2]:12225/sp/switch/0/component/sp/caboose?firmware_slot=1
8482026-03-24T18:30:00.081ZDEBGnexus (dropshot_lockstep): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) authenticated = true local_addr = [fd00:1122:3344:101::b]:12232 method = PUT remote_addr = [fd00:1122:3344:101::1]:57008 req_id = d61e93a3-c8c2-428f-931d-f068f92fb917 resource = Database result = Ok(()) type = user_builtin uri = /racks/386a345e-f45a-414e-a736-ceb668826f36/initialization-complete user_builtin_id = 001de000-05e4-4000-8000-000000000002
8492026-03-24T18:30:00.081ZDEBGnexus (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[fd00:1122:3344:101::2]:12225 result = Ok(Response { url: "http://[fd00:1122:3344:101::2]:12225/sp/switch/0/component/sp/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "1567e19b-f1fb-4f7b-8753-84d287a64e7d", "content-length": "111", "date": "Tue, 24 Mar 2026 18:30:00 GMT"} })
8502026-03-24T18:30:00.081ZDEBGnexus (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[fd00:1122:3344:101::2]:12225 method = GET uri = http://[fd00:1122:3344:101::2]:12225/sp/switch/0/component/rot/caboose?firmware_slot=0
8512026-03-24T18:30:00.082ZDEBGnexus (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[fd00:1122:3344:101::2]:12225 result = Ok(Response { url: "http://[fd00:1122:3344:101::2]:12225/sp/switch/0/component/rot/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "1c125cc4-0392-4f82-a435-7b7ea7c04d60", "content-length": "163", "date": "Tue, 24 Mar 2026 18:30:00 GMT"} })
8522026-03-24T18:30:00.082ZDEBGnexus (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[fd00:1122:3344:101::2]:12225 method = GET uri = http://[fd00:1122:3344:101::2]:12225/sp/switch/0/component/rot/caboose?firmware_slot=1
8532026-03-24T18:30:00.083ZDEBGnexus (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[fd00:1122:3344:101::2]:12225 result = Ok(Response { url: "http://[fd00:1122:3344:101::2]:12225/sp/switch/0/component/rot/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "648477e1-c623-4575-b7ff-c5f8a02cd076", "content-length": "163", "date": "Tue, 24 Mar 2026 18:30:00 GMT"} })
8542026-03-24T18:30:00.083ZDEBGnexus (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[fd00:1122:3344:101::2]:12225 method = GET uri = http://[fd00:1122:3344:101::2]:12225/sp/switch/0/component/stage0/caboose?firmware_slot=0
8552026-03-24T18:30:00.084ZDEBGnexus (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[fd00:1122:3344:101::2]:12225 result = Ok(Response { url: "http://[fd00:1122:3344:101::2]:12225/sp/switch/0/component/stage0/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "cf072c93-64ae-4b27-8dac-fe04ef7b0eb0", "content-length": "166", "date": "Tue, 24 Mar 2026 18:30:00 GMT"} })
8562026-03-24T18:30:00.084ZDEBGnexus (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[fd00:1122:3344:101::2]:12225 method = GET uri = http://[fd00:1122:3344:101::2]:12225/sp/switch/0/component/stage0/caboose?firmware_slot=1
8572026-03-24T18:30:00.085ZDEBGnexus (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[fd00:1122:3344:101::2]:12225 result = Ok(Response { url: "http://[fd00:1122:3344:101::2]:12225/sp/switch/0/component/stage0/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "99740edf-523b-42d4-8a5a-1968804ee51c", "content-length": "166", "date": "Tue, 24 Mar 2026 18:30:00 GMT"} })
8582026-03-24T18:30:00.085ZDEBGnexus (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[fd00:1122:3344:101::2]:12225 method = GET uri = http://[fd00:1122:3344:101::2]:12225/sp/switch/0/component/rot/cmpa
8592026-03-24T18:30:00.085ZDEBGnexus (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[fd00:1122:3344:101::2]:12225 result = Ok(Response { url: "http://[fd00:1122:3344:101::2]:12225/sp/switch/0/component/rot/cmpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "91fa10a4-ca6d-4b9e-b902-fd9d58ff2c04", "content-length": "702", "date": "Tue, 24 Mar 2026 18:30:00 GMT"} })
8602026-03-24T18:30:00.085ZDEBGnexus (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[fd00:1122:3344:101::2]:12225 method = GET uri = http://[fd00:1122:3344:101::2]:12225/sp/switch/0/component/rot/cfpa
8612026-03-24T18:30:00.086ZDEBGnexus (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[fd00:1122:3344:101::2]:12225 result = Ok(Response { url: "http://[fd00:1122:3344:101::2]:12225/sp/switch/0/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "2fea3aa1-38d9-4dc4-9d05-250e0fe009c8", "content-length": "727", "date": "Tue, 24 Mar 2026 18:30:00 GMT"} })
8622026-03-24T18:30:00.086ZDEBGnexus (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[fd00:1122:3344:101::2]:12225 method = GET uri = http://[fd00:1122:3344:101::2]:12225/sp/switch/0/component/rot/cfpa
8632026-03-24T18:30:00.086ZDEBGnexus (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[fd00:1122:3344:101::2]:12225 result = Ok(Response { url: "http://[fd00:1122:3344:101::2]:12225/sp/switch/0/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "70676d67-5f5a-406f-bfbe-d93c2fd1ff56", "content-length": "729", "date": "Tue, 24 Mar 2026 18:30:00 GMT"} })
8642026-03-24T18:30:00.086ZDEBGnexus (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[fd00:1122:3344:101::2]:12225 method = GET uri = http://[fd00:1122:3344:101::2]:12225/sp/switch/0/component/rot/cfpa
8652026-03-24T18:30:00.087ZDEBGnexus (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[fd00:1122:3344:101::2]:12225 result = Ok(Response { url: "http://[fd00:1122:3344:101::2]:12225/sp/switch/0/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "1aa89714-b778-4b91-b0d8-fe97e8b1314b", "content-length": "728", "date": "Tue, 24 Mar 2026 18:30:00 GMT"} })
8662026-03-24T18:30:00.087ZDEBGnexus (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[fd00:1122:3344:101::2]:12225 method = GET uri = http://[fd00:1122:3344:101::2]:12225/sp/sled/0
8672026-03-24T18:30:00.087ZDEBGnexus (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[fd00:1122:3344:101::2]:12225 result = Ok(Response { url: "http://[fd00:1122:3344:101::2]:12225/sp/sled/0", status: 200, headers: {"content-type": "application/json", "x-request-id": "d630e847-5f7f-409e-9bac-6f8b7527c366", "content-length": "722", "date": "Tue, 24 Mar 2026 18:30:00 GMT"} })
8682026-03-24T18:30:00.087ZDEBGnexus (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[fd00:1122:3344:101::2]:12225 method = GET uri = http://[fd00:1122:3344:101::2]:12225/sp/sled/0/component/host-boot-flash/active-slot
8692026-03-24T18:30:00.088ZDEBGnexus (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[fd00:1122:3344:101::2]:12225 result = Ok(Response { url: "http://[fd00:1122:3344:101::2]:12225/sp/sled/0/component/host-boot-flash/active-slot", status: 200, headers: {"content-type": "application/json", "x-request-id": "cdfecf6b-31a6-4762-8e62-8ac93134f4a3", "content-length": "10", "date": "Tue, 24 Mar 2026 18:30:00 GMT"} })
8702026-03-24T18:30:00.088ZDEBGnexus (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[fd00:1122:3344:101::2]:12225 method = GET uri = http://[fd00:1122:3344:101::2]:12225/sp/sled/0/component/host-boot-flash/hash/0
8712026-03-24T18:30:00.088ZDEBGnexus (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[fd00:1122:3344:101::2]:12225 result = Ok(Response { url: "http://[fd00:1122:3344:101::2]:12225/sp/sled/0/component/host-boot-flash/hash/0", status: 200, headers: {"content-type": "application/json", "x-request-id": "9ae81a7d-55b1-4e07-8acf-6fce2a4bde20", "content-length": "144", "date": "Tue, 24 Mar 2026 18:30:00 GMT"} })
8722026-03-24T18:30:00.088ZDEBGnexus (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[fd00:1122:3344:101::2]:12225 method = GET uri = http://[fd00:1122:3344:101::2]:12225/sp/sled/0/component/host-boot-flash/hash/1
8732026-03-24T18:30:00.088ZDEBGnexus (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[fd00:1122:3344:101::2]:12225 result = Ok(Response { url: "http://[fd00:1122:3344:101::2]:12225/sp/sled/0/component/host-boot-flash/hash/1", status: 200, headers: {"content-type": "application/json", "x-request-id": "7ea884d2-d9a1-4d8f-8530-0e410dd4dd7f", "content-length": "147", "date": "Tue, 24 Mar 2026 18:30:00 GMT"} })
8742026-03-24T18:30:00.088ZDEBGnexus (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[fd00:1122:3344:101::2]:12225 method = GET uri = http://[fd00:1122:3344:101::2]:12225/sp/sled/0/component/sp/caboose?firmware_slot=0
8752026-03-24T18:30:00.089ZDEBGnexus (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[fd00:1122:3344:101::2]:12225 result = Ok(Response { url: "http://[fd00:1122:3344:101::2]:12225/sp/sled/0/component/sp/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "ff48f72a-9c25-4c92-a567-7cd928a76877", "content-length": "109", "date": "Tue, 24 Mar 2026 18:30:00 GMT"} })
8762026-03-24T18:30:00.089ZDEBGnexus (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[fd00:1122:3344:101::2]:12225 method = GET uri = http://[fd00:1122:3344:101::2]:12225/sp/sled/0/component/sp/caboose?firmware_slot=1
8772026-03-24T18:30:00.090ZDEBGnexus (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[fd00:1122:3344:101::2]:12225 result = Ok(Response { url: "http://[fd00:1122:3344:101::2]:12225/sp/sled/0/component/sp/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "2c8402e0-bb81-4772-baa9-d8f3f54a99f9", "content-length": "109", "date": "Tue, 24 Mar 2026 18:30:00 GMT"} })
8782026-03-24T18:30:00.090ZDEBGnexus (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[fd00:1122:3344:101::2]:12225 method = GET uri = http://[fd00:1122:3344:101::2]:12225/sp/sled/0/component/rot/caboose?firmware_slot=0
8792026-03-24T18:30:00.091ZDEBGnexus (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[fd00:1122:3344:101::2]:12225 result = Ok(Response { url: "http://[fd00:1122:3344:101::2]:12225/sp/sled/0/component/rot/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "35193f78-fcd2-47c3-aeb6-eae456809ecb", "content-length": "163", "date": "Tue, 24 Mar 2026 18:30:00 GMT"} })
8802026-03-24T18:30:00.091ZDEBGnexus (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[fd00:1122:3344:101::2]:12225 method = GET uri = http://[fd00:1122:3344:101::2]:12225/sp/sled/0/component/rot/caboose?firmware_slot=1
8812026-03-24T18:30:00.091ZDEBGnexus (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[fd00:1122:3344:101::2]:12225 result = Ok(Response { url: "http://[fd00:1122:3344:101::2]:12225/sp/sled/0/component/rot/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "76f81e60-137a-4d8e-b023-ca585b8e9f5a", "content-length": "163", "date": "Tue, 24 Mar 2026 18:30:00 GMT"} })
8822026-03-24T18:30:00.091ZDEBGnexus (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[fd00:1122:3344:101::2]:12225 method = GET uri = http://[fd00:1122:3344:101::2]:12225/sp/sled/0/component/stage0/caboose?firmware_slot=0
8832026-03-24T18:30:00.092ZDEBGnexus (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[fd00:1122:3344:101::2]:12225 result = Ok(Response { url: "http://[fd00:1122:3344:101::2]:12225/sp/sled/0/component/stage0/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "c48d75f7-5190-4bc5-947c-b1806c950f6b", "content-length": "166", "date": "Tue, 24 Mar 2026 18:30:00 GMT"} })
8842026-03-24T18:30:00.092ZDEBGnexus (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[fd00:1122:3344:101::2]:12225 method = GET uri = http://[fd00:1122:3344:101::2]:12225/sp/sled/0/component/stage0/caboose?firmware_slot=1
8852026-03-24T18:30:00.093ZDEBGnexus (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[fd00:1122:3344:101::2]:12225 result = Ok(Response { url: "http://[fd00:1122:3344:101::2]:12225/sp/sled/0/component/stage0/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "c0787cb0-761b-4735-af64-76320faa8c40", "content-length": "166", "date": "Tue, 24 Mar 2026 18:30:00 GMT"} })
8862026-03-24T18:30:00.093ZDEBGnexus (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[fd00:1122:3344:101::2]:12225 method = GET uri = http://[fd00:1122:3344:101::2]:12225/sp/sled/0/component/rot/cmpa
8872026-03-24T18:30:00.093ZDEBGnexus (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[fd00:1122:3344:101::2]:12225 result = Ok(Response { url: "http://[fd00:1122:3344:101::2]:12225/sp/sled/0/component/rot/cmpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "39f48ca9-664d-4ed7-aabc-14e41d7dab59", "content-length": "702", "date": "Tue, 24 Mar 2026 18:30:00 GMT"} })
8882026-03-24T18:30:00.093ZDEBGnexus (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[fd00:1122:3344:101::2]:12225 method = GET uri = http://[fd00:1122:3344:101::2]:12225/sp/sled/0/component/rot/cfpa
8892026-03-24T18:30:00.094ZDEBGnexus (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[fd00:1122:3344:101::2]:12225 result = Ok(Response { url: "http://[fd00:1122:3344:101::2]:12225/sp/sled/0/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "bc23a220-eb28-49e7-82f4-9e006d1bdcba", "content-length": "727", "date": "Tue, 24 Mar 2026 18:30:00 GMT"} })
8902026-03-24T18:30:00.094ZDEBGnexus (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[fd00:1122:3344:101::2]:12225 method = GET uri = http://[fd00:1122:3344:101::2]:12225/sp/sled/0/component/rot/cfpa
8912026-03-24T18:30:00.094ZDEBGnexus (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[fd00:1122:3344:101::2]:12225 result = Ok(Response { url: "http://[fd00:1122:3344:101::2]:12225/sp/sled/0/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "35f128a4-2e5f-479a-8144-3bcbcbef3f4f", "content-length": "729", "date": "Tue, 24 Mar 2026 18:30:00 GMT"} })
8922026-03-24T18:30:00.094ZDEBGnexus (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[fd00:1122:3344:101::2]:12225 method = GET uri = http://[fd00:1122:3344:101::2]:12225/sp/sled/0/component/rot/cfpa
8932026-03-24T18:30:00.094ZDEBGnexus (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[fd00:1122:3344:101::2]:12225 result = Ok(Response { url: "http://[fd00:1122:3344:101::2]:12225/sp/sled/0/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "649288c6-e1f8-4ab6-8c40-b7ce1e92901e", "content-length": "728", "date": "Tue, 24 Mar 2026 18:30:00 GMT"} })
8942026-03-24T18:30:00.094ZDEBGnexus (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {} }
8952026-03-24T18:30:00.095ZDEBGnexus (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = inventory_collection resource = Database result = Ok(())
8962026-03-24T18:30:00.105ZINFOnexus (BackgroundTasks): Loaded 0 active trust quorum configurations from database background_task = trust_quorum_manager bgtask = TrustQuorumManager file = nexus/src/app/background/tasks/trust_quorum.rs:83
8972026-03-24T18:30:00.105ZDEBGnexus (BackgroundTasks): activation complete background_task = trust_quorum_manager elapsed = 377.657019ms iteration = 1 status = {"PerRackStatus":{"errors":[],"statuses":[]}}
8982026-03-24T18:30:00.107ZWARNnexus (BackgroundTasks): failed to read DNS config background_task = dns_config_internal dns_group = internal error = Internal Error: expected exactly one latest version for DNS group Internal, found 0 file = nexus/src/app/background/tasks/dns_config.rs:72
8992026-03-24T18:30:00.107ZDEBGnexus (BackgroundTasks): activation complete background_task = dns_config_internal dns_group = internal elapsed = 405.044848ms iteration = 1 status = {"error":"failed to read DNS config: Internal Error: expected exactly one latest version for DNS group Internal, found 0"}
9002026-03-24T18:30:00.112ZDEBGnexus (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
9012026-03-24T18:30:00.113ZDEBGnexus (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
9022026-03-24T18:30:00.117ZDEBGnexus (BackgroundTasks): roles background_task = fm_sitrep_gc roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
9032026-03-24T18:30:00.121ZDEBGnexus (BackgroundTasks): authorize result action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = fm_sitrep_gc resource = Fleet result = Ok(())
9042026-03-24T18:30:00.125ZDEBGnexus (dropshot_lockstep): roles authenticated = true local_addr = [fd00:1122:3344:101::b]:12232 method = PUT remote_addr = [fd00:1122:3344:101::1]:57008 req_id = d61e93a3-c8c2-428f-931d-f068f92fb917 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} } type = user_builtin uri = /racks/386a345e-f45a-414e-a736-ceb668826f36/initialization-complete user_builtin_id = 001de000-05e4-4000-8000-000000000002
9052026-03-24T18:30:00.128ZDEBGnexus (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
9062026-03-24T18:30:00.131ZDEBGnexus (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
9072026-03-24T18:30:00.132ZDEBGnexus (dropshot_lockstep): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) authenticated = true local_addr = [fd00:1122:3344:101::b]:12232 method = PUT remote_addr = [fd00:1122:3344:101::1]:57008 req_id = d61e93a3-c8c2-428f-931d-f068f92fb917 resource = Rack { parent: Fleet, key: 386a345e-f45a-414e-a736-ceb668826f36, lookup_type: ById(386a345e-f45a-414e-a736-ceb668826f36) } result = Ok(()) type = user_builtin uri = /racks/386a345e-f45a-414e-a736-ceb668826f36/initialization-complete user_builtin_id = 001de000-05e4-4000-8000-000000000002
9082026-03-24T18:30:00.132ZDEBGnexus (dropshot_lockstep): updating rack subnet for rack 386a345e-f45a-414e-a736-ceb668826f36 to Some( V6( Ipv6Network { addr: fd00:1122:3344:100::, prefix: 56, }, ), ) authenticated = true local_addr = [fd00:1122:3344:101::b]:12232 method = PUT remote_addr = [fd00:1122:3344:101::1]:57008 req_id = d61e93a3-c8c2-428f-931d-f068f92fb917 type = user_builtin uri = /racks/386a345e-f45a-414e-a736-ceb668826f36/initialization-complete user_builtin_id = 001de000-05e4-4000-8000-000000000002
9092026-03-24T18:30:00.132ZDEBGnexus (dropshot_lockstep): roles authenticated = true local_addr = [fd00:1122:3344:101::b]:12232 method = PUT remote_addr = [fd00:1122:3344:101::1]:57008 req_id = d61e93a3-c8c2-428f-931d-f068f92fb917 roles = RoleSet { roles: {} } type = user_builtin uri = /racks/386a345e-f45a-414e-a736-ceb668826f36/initialization-complete user_builtin_id = 001de000-05e4-4000-8000-000000000002
9102026-03-24T18:30:00.133ZDEBGnexus (dropshot_lockstep): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) authenticated = true local_addr = [fd00:1122:3344:101::b]:12232 method = PUT remote_addr = [fd00:1122:3344:101::1]:57008 req_id = d61e93a3-c8c2-428f-931d-f068f92fb917 resource = Database result = Ok(()) type = user_builtin uri = /racks/386a345e-f45a-414e-a736-ceb668826f36/initialization-complete user_builtin_id = 001de000-05e4-4000-8000-000000000002
9112026-03-24T18:30:00.133ZDEBGnexus (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = inventory_collection resource = Fleet result = Ok(())
9122026-03-24T18:30:00.133ZDEBGnexus (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {} }
9132026-03-24T18:30:00.134ZDEBGnexus (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = inventory_collection resource = Database result = Ok(())
9142026-03-24T18:30:00.137ZDEBGnexus (BackgroundTasks): roles background_task = support_bundle_collector roles = RoleSet { roles: {} }
9152026-03-24T18:30:00.137ZDEBGnexus (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = support_bundle_collector resource = Database result = Ok(())
9162026-03-24T18:30:00.138ZDEBGnexus (BackgroundTasks): roles background_task = tuf_repo_pruner roles = RoleSet { roles: {} }
9172026-03-24T18:30:00.138ZDEBGnexus (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = tuf_repo_pruner resource = Database result = Ok(())
9182026-03-24T18:30:00.139ZDEBGnexus (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) } result = Ok(())
9192026-03-24T18:30:00.139ZDEBGnexus (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
9202026-03-24T18:30:00.139ZDEBGnexus (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
9212026-03-24T18:30:00.140ZDEBGnexus (BackgroundTasks): activation complete background_task = read_only_region_replacement_start elapsed = 413.906694ms iteration = 1 status = {"errors":[],"requests_created_ok":[]}
9222026-03-24T18:30:00.141ZDEBGnexus (BackgroundTasks): roles background_task = support_bundle_collector roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
9232026-03-24T18:30:00.141ZINFOnexus (dropshot_lockstep): Using automatic external switchport discovery authenticated = true file = nexus/src/app/rack.rs:309 local_addr = [fd00:1122:3344:101::b]:12232 method = PUT remote_addr = [fd00:1122:3344:101::1]:57008 req_id = d61e93a3-c8c2-428f-931d-f068f92fb917 type = user_builtin uri = /racks/386a345e-f45a-414e-a736-ceb668826f36/initialization-complete user_builtin_id = 001de000-05e4-4000-8000-000000000002
9242026-03-24T18:30:00.143ZDEBGnexus (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
9252026-03-24T18:30:00.144ZDEBGnexus (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
9262026-03-24T18:30:00.144ZDEBGnexus (BackgroundTasks): roles background_task = tuf_repo_pruner roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
9272026-03-24T18:30:00.145ZDEBGnexus (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
9282026-03-24T18:30:00.146ZDEBGnexus (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = support_bundle_collector resource = Fleet result = Ok(())
9292026-03-24T18:30:00.146ZDEBGnexus (BackgroundTasks): roles background_task = support_bundle_collector roles = RoleSet { roles: {} }
9302026-03-24T18:30:00.146ZDEBGnexus (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = support_bundle_collector resource = Database result = Ok(())
9312026-03-24T18:30:00.146ZDEBGnexus (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
9322026-03-24T18:30:00.147ZDEBGnexus (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
9332026-03-24T18:30:00.148ZINFOnexus (BackgroundTasks): VPC route manager sled 32482131-2003-4c82-8bdf-7b718f891115 background_task = vpc_route_manager file = nexus/src/app/background/tasks/vpc_routes.rs:98
9342026-03-24T18:30:00.148ZDEBGnexus (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
9352026-03-24T18:30:00.148ZDEBGnexus (BackgroundTasks): client request SledAgent = 32482131-2003-4c82-8bdf-7b718f891115 background_task = vpc_route_manager body = None method = GET uri = http://[fd00:1122:3344:101::1]:12345/vpc-routes
9362026-03-24T18:30:00.149ZDEBGnexus (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = tuf_repo_pruner resource = Fleet result = Ok(())
9372026-03-24T18:30:00.149ZDEBGnexus (BackgroundTasks): roles background_task = tuf_repo_pruner roles = RoleSet { roles: {} }
9382026-03-24T18:30:00.150ZDEBGnexus (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = tuf_repo_pruner resource = Database result = Ok(())
9392026-03-24T18:30:00.150ZINFOnexus (dropshot_lockstep): discovered ports for switch all_ports = [\n Internal(\n Internal(\n "int0",\n ),\n ),\n Rear(\n Rear(\n "rear0",\n ),\n ),\n Qsfp(\n Qsfp(\n "qsfp0",\n ),\n ),\n] authenticated = true file = nexus/src/app/rack.rs:329 local_addr = [fd00:1122:3344:101::b]:12232 method = PUT remote_addr = [fd00:1122:3344:101::1]:57008 req_id = d61e93a3-c8c2-428f-931d-f068f92fb917 switch_slot = switch0 type = user_builtin uri = /racks/386a345e-f45a-414e-a736-ceb668826f36/initialization-complete user_builtin_id = 001de000-05e4-4000-8000-000000000002
9402026-03-24T18:30:00.150ZINFOnexus (dropshot_lockstep): populating ports for switch authenticated = true file = nexus/src/app/rack.rs:343 local_addr = [fd00:1122:3344:101::b]:12232 method = PUT qsfp_ports = [\n Name(\n "qsfp0",\n ),\n] remote_addr = [fd00:1122:3344:101::1]:57008 req_id = d61e93a3-c8c2-428f-931d-f068f92fb917 switch_slot = switch0 type = user_builtin uri = /racks/386a345e-f45a-414e-a736-ceb668826f36/initialization-complete user_builtin_id = 001de000-05e4-4000-8000-000000000002
9412026-03-24T18:30:00.151ZDEBGnexus (dropshot_lockstep): roles authenticated = true local_addr = [fd00:1122:3344:101::b]:12232 method = PUT remote_addr = [fd00:1122:3344:101::1]:57008 req_id = d61e93a3-c8c2-428f-931d-f068f92fb917 roles = RoleSet { roles: {} } type = user_builtin uri = /racks/386a345e-f45a-414e-a736-ceb668826f36/initialization-complete user_builtin_id = 001de000-05e4-4000-8000-000000000002
9422026-03-24T18:30:00.151ZDEBGnexus (dropshot_lockstep): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) authenticated = true local_addr = [fd00:1122:3344:101::b]:12232 method = PUT remote_addr = [fd00:1122:3344:101::1]:57008 req_id = d61e93a3-c8c2-428f-931d-f068f92fb917 resource = Database result = Ok(()) type = user_builtin uri = /racks/386a345e-f45a-414e-a736-ceb668826f36/initialization-complete user_builtin_id = 001de000-05e4-4000-8000-000000000002
9432026-03-24T18:30:00.152ZDEBGnexus (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = inventory_collection resource = Fleet result = Ok(())
9442026-03-24T18:30:00.152ZDEBGnexus (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {} }
9452026-03-24T18:30:00.153ZDEBGnexus (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = inventory_collection resource = Database result = Ok(())
9462026-03-24T18:30:00.157ZDEBGnexus (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) } result = Ok(())
9472026-03-24T18:30:00.157ZDEBGnexus (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
9482026-03-24T18:30:00.157ZDEBGnexus (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
9492026-03-24T18:30:00.162ZDEBGnexus (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
9502026-03-24T18:30:00.162ZDEBGnexus (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
9512026-03-24T18:30:00.163ZDEBGnexus (BackgroundTasks): client response SledAgent = 32482131-2003-4c82-8bdf-7b718f891115 background_task = vpc_route_manager result = Ok(Response { url: "http://[fd00:1122:3344:101::1]:12345/vpc-routes", status: 200, headers: {"content-type": "application/json", "x-request-id": "e57b9376-59b3-4d6c-a676-9fb1c267f2ae", "content-length": "312", "date": "Tue, 24 Mar 2026 18:30:00 GMT"} })
9522026-03-24T18:30:00.163ZDEBGnexus (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
9532026-03-24T18:30:00.164ZDEBGnexus (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = vpc_route_manager resource = Database result = Ok(())
9542026-03-24T18:30:00.166ZDEBGnexus (BackgroundTasks): Found abandoned VMMs background_task = abandoned_vmm_reaper count = 0 total = 0
9552026-03-24T18:30:00.166ZINFOnexus (BackgroundTasks): Abandoned VMMs reaped background_task = abandoned_vmm_reaper file = nexus/src/app/background/tasks/abandoned_vmm_reaper.rs:170 sled_reservations_deleted = 0 vmms_already_deleted = 0 vmms_deleted = 0 vmms_found = 0
9562026-03-24T18:30:00.166ZDEBGnexus (BackgroundTasks): activation complete background_task = abandoned_vmm_reaper elapsed = 446.198488ms iteration = 1 status = {"errors":[],"sled_reservations_deleted":0,"vmms_already_deleted":0,"vmms_deleted":0,"vmms_found":0}
9572026-03-24T18:30:00.172ZDEBGnexus (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
9582026-03-24T18:30:00.172ZDEBGnexus (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
9592026-03-24T18:30:00.175ZDEBGnexus (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
9602026-03-24T18:30:00.175ZDEBGnexus (BackgroundTasks): roles background_task = tuf_artifact_replication roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
9612026-03-24T18:30:00.175ZDEBGnexus (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
9622026-03-24T18:30:00.178ZDEBGnexus (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
9632026-03-24T18:30:00.178ZDEBGnexus (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
9642026-03-24T18:30:00.179ZDEBGnexus (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = tuf_artifact_replication resource = Fleet result = Ok(())
9652026-03-24T18:30:00.179ZDEBGnexus (BackgroundTasks): roles background_task = tuf_artifact_replication roles = RoleSet { roles: {} }
9662026-03-24T18:30:00.180ZDEBGnexus (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = tuf_artifact_replication resource = Database result = Ok(())
9672026-03-24T18:30:00.185ZDEBGnexus (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
9682026-03-24T18:30:00.185ZDEBGnexus (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
9692026-03-24T18:30:00.188ZDEBGnexus (BackgroundTasks): audit log timeout: no stale entries found background_task = audit_log_timeout_incomplete cutoff = 2026-03-24 14:29:59.727769452 UTC
9702026-03-24T18:30:00.188ZDEBGnexus (BackgroundTasks): activation complete background_task = audit_log_timeout_incomplete elapsed = 460.178101ms iteration = 1 status = {"cutoff":"2026-03-24T14:29:59.727769452Z","error":null,"max_timed_out_per_activation":1000,"timed_out":0}
9712026-03-24T18:30:00.188ZDEBGnexus (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
9722026-03-24T18:30:00.188ZDEBGnexus (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
9732026-03-24T18:30:00.194ZDEBGnexus (BackgroundTasks): activation complete background_task = region_snapshot_replacement_start elapsed = 483.83429ms iteration = 1 status = {"errors":[],"requests_completed_ok":[],"requests_created_ok":[],"start_invoked_ok":[]}
9742026-03-24T18:30:00.197ZINFOnexus (BackgroundTasks): deleted 0 of 0 sitreps alert_requests_deleted = 0 background_task = fm_sitrep_gc case_ereports_deleted = 0 cases_deleted = 0 file = nexus/db-queries/src/db/datastore/fm.rs:980 ids = [] sitreps_deleted = 0
9752026-03-24T18:30:00.197ZINFOnexus (BackgroundTasks): sitrep garbage collection found 0 orphaned sitreps, deleted 0 background_task = fm_sitrep_gc file = nexus/src/app/background/tasks/fm_sitrep_gc.rs:112
9762026-03-24T18:30:00.197ZDEBGnexus (BackgroundTasks): activation complete background_task = fm_sitrep_gc elapsed = 469.474552ms iteration = 1 status = {"errors":[],"orphaned_sitreps_deleted":0,"orphaned_sitreps_found":0}
9772026-03-24T18:30:00.198ZDEBGnexus (BackgroundTasks): activation complete background_task = region_replacement_driver elapsed = 495.97744ms iteration = 1 status = {"drive_invoked_ok":[],"errors":[],"finish_invoked_ok":[]}
9782026-03-24T18:30:00.199ZINFOnexus (BackgroundTasks): all instance checks complete background_task = instance_watcher file = nexus/src/app/background/tasks/instance_watcher.rs:553 pruned_instances = 0 total_completed = 0 total_failed = 0 total_incomplete = 0 total_instances = 0 update_sagas_queued = 0
9792026-03-24T18:30:00.200ZDEBGnexus (BackgroundTasks): activation complete background_task = instance_watcher elapsed = 480.278204ms iteration = 1 status = {"failed_checks":{},"incomplete_checks":{},"instance_states":{},"pruned_instances":0,"total_instances":0,"update_sagas_queued":0}
9802026-03-24T18:30:00.204ZDEBGnexus (BackgroundTasks): activation complete background_task = region_replacement elapsed = 487.982644ms iteration = 1 status = {"errors":[],"requests_completed_ok":[],"requests_created_ok":[],"start_invoked_ok":[]}
9812026-03-24T18:30:00.232ZINFOnexus (BackgroundTasks): listed instances with failed active VMMs background_task = instance_updater count = 0 file = nexus/src/app/background/tasks/instance_updater.rs:59
9822026-03-24T18:30:00.232ZDEBGnexus (BackgroundTasks): looking for instances with terminated active migrations... background_task = instance_updater
9832026-03-24T18:30:00.232ZDEBGnexus (BackgroundTasks): roles background_task = instance_updater roles = RoleSet { roles: {} }
9842026-03-24T18:30:00.232ZDEBGnexus (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = instance_updater resource = Database result = Ok(())
9852026-03-24T18:30:00.236ZDEBGnexus (BackgroundTasks): roles background_task = tuf_repo_pruner roles = RoleSet { roles: {} }
9862026-03-24T18:30:00.237ZDEBGnexus (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = tuf_repo_pruner resource = Database result = Ok(())
9872026-03-24T18:30:00.239ZDEBGnexus (BackgroundTasks): roles background_task = tuf_repo_pruner roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
9882026-03-24T18:30:00.245ZDEBGnexus (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = tuf_repo_pruner resource = TargetReleaseConfig result = Ok(())
9892026-03-24T18:30:00.245ZDEBGnexus (BackgroundTasks): roles background_task = tuf_repo_pruner roles = RoleSet { roles: {} }
9902026-03-24T18:30:00.245ZDEBGnexus (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = tuf_repo_pruner resource = Database result = Ok(())
9912026-03-24T18:30:00.268ZDEBGnexus (BackgroundTasks): activation complete background_task = region_snapshot_replacement_step elapsed = 565.340589ms iteration = 1 status = {"errors":[],"step_garbage_collect_invoked_ok":[],"step_invoked_ok":[],"step_records_created_ok":[],"step_set_volume_deleted_ok":[]}
9922026-03-24T18:30:00.274ZDEBGnexus (BackgroundTasks): roles background_task = instance_reincarnation roles = RoleSet { roles: {} }
9932026-03-24T18:30:00.275ZDEBGnexus (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = instance_reincarnation resource = Database result = Ok(())
9942026-03-24T18:30:00.275ZWARNnexus (BackgroundTasks): failed to read Silo/DNS/TLS configuration background_task = external_endpoints error = Internal Error: expected at least one external DNS zone file = nexus/src/app/background/tasks/external_endpoints.rs:48
9952026-03-24T18:30:00.275ZDEBGnexus (BackgroundTasks): activation complete background_task = external_endpoints elapsed = 555.979547ms iteration = 1 status = {"error":"failed to read Silo/DNS/TLS configuration: Internal Error: expected at least one external DNS zone"}
9962026-03-24T18:30:00.292ZINFOnexus (BackgroundTasks): tuf_repo_prune decision background_task = tuf_repo_pruner file = nexus/src/app/background/tasks/tuf_repo_pruner.rs:153 status = TufRepoPrunerDetails { nkeep_recent_releases: 3, nkeep_recent_uploads: 2, repos_keep_target_release: {}, repos_keep_recent_uploads: {}, repo_prune: None, other_repos_eligible_to_prune: {}, warnings: [] }
9972026-03-24T18:30:00.292ZDEBGnexus (BackgroundTasks): activation complete background_task = tuf_repo_pruner elapsed = 340.393191ms iteration = 2 status = {"nkeep_recent_releases":3,"nkeep_recent_uploads":2,"other_repos_eligible_to_prune":[],"repo_prune":null,"repos_keep_recent_uploads":[],"repos_keep_target_release":[],"status":"enabled","warnings":[]}
9982026-03-24T18:30:00.309ZDEBGnexus (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
9992026-03-24T18:30:00.317ZDEBGnexus (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) } result = Ok(())
10002026-03-24T18:30:00.317ZDEBGnexus (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
10012026-03-24T18:30:00.318ZDEBGnexus (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
10022026-03-24T18:30:00.324ZDEBGnexus (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
10032026-03-24T18:30:00.325ZINFOnexus (BackgroundTasks): No bundles to collect background_task = support_bundle_collector file = nexus/src/app/background/tasks/support_bundle_collector.rs:338
10042026-03-24T18:30:00.325ZDEBGnexus (BackgroundTasks): activation complete background_task = support_bundle_collector elapsed = 605.324333ms iteration = 1 status = {"cleanup_err":null,"cleanup_report":{"db_destroying_bundles_removed":0,"db_failing_bundles_updated":0,"sled_bundles_delete_failed":0,"sled_bundles_deleted_not_found":0,"sled_bundles_deleted_ok":0},"collection_err":null,"collection_report":null}
10052026-03-24T18:30:00.325ZDEBGnexus (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
10062026-03-24T18:30:00.330ZDEBGnexus (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
10072026-03-24T18:30:00.330ZDEBGnexus (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
10082026-03-24T18:30:00.330ZDEBGnexus (BackgroundTasks): listed attached subnets background_task = attached_subnet_manager n_subnets = 0
10092026-03-24T18:30:00.334ZDEBGnexus (BackgroundTasks): activation complete background_task = attached_subnet_manager elapsed = 607.164937ms iteration = 1 status = {"db_error":null,"dendrite":{"switch0":{"errors":[],"n_subnets_added":0,"n_subnets_removed":0,"n_total_subnets":0}},"sled":{}}
10102026-03-24T18:30:00.335ZDEBGnexus (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
10112026-03-24T18:30:00.335ZDEBGnexus (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
10122026-03-24T18:30:00.340ZDEBGnexus (BackgroundTasks): roles background_task = probe_distributor roles = RoleSet { roles: {} }
10132026-03-24T18:30:00.340ZDEBGnexus (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
10142026-03-24T18:30:00.341ZDEBGnexus (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
10152026-03-24T18:30:00.341ZDEBGnexus (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = probe_distributor resource = Database result = Ok(())
10162026-03-24T18:30:00.343ZDEBGnexus (BackgroundTasks): roles background_task = probe_distributor roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
10172026-03-24T18:30:00.348ZDEBGnexus (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = probe_distributor resource = Fleet result = Ok(())
10182026-03-24T18:30:00.348ZDEBGnexus (BackgroundTasks): roles background_task = probe_distributor roles = RoleSet { roles: {} }
10192026-03-24T18:30:00.348ZDEBGnexus (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = probe_distributor resource = Database result = Ok(())
10202026-03-24T18:30:00.355ZINFOnexus (dropshot_lockstep): Recording Rack Network Configuration authenticated = true file = nexus/src/app/rack.rs:370 local_addr = [fd00:1122:3344:101::b]:12232 method = PUT remote_addr = [fd00:1122:3344:101::1]:57008 req_id = d61e93a3-c8c2-428f-931d-f068f92fb917 type = user_builtin uri = /racks/386a345e-f45a-414e-a736-ceb668826f36/initialization-complete user_builtin_id = 001de000-05e4-4000-8000-000000000002
10212026-03-24T18:30:00.355ZDEBGnexus (dropshot_lockstep): roles authenticated = true local_addr = [fd00:1122:3344:101::b]:12232 method = PUT remote_addr = [fd00:1122:3344:101::1]:57008 req_id = d61e93a3-c8c2-428f-931d-f068f92fb917 roles = RoleSet { roles: {} } type = user_builtin uri = /racks/386a345e-f45a-414e-a736-ceb668826f36/initialization-complete user_builtin_id = 001de000-05e4-4000-8000-000000000002
10222026-03-24T18:30:00.356ZDEBGnexus (dropshot_lockstep): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) authenticated = true local_addr = [fd00:1122:3344:101::b]:12232 method = PUT remote_addr = [fd00:1122:3344:101::1]:57008 req_id = d61e93a3-c8c2-428f-931d-f068f92fb917 resource = Database result = Ok(()) type = user_builtin uri = /racks/386a345e-f45a-414e-a736-ceb668826f36/initialization-complete user_builtin_id = 001de000-05e4-4000-8000-000000000002
10232026-03-24T18:30:00.368ZDEBGnexus (BackgroundTasks): roles background_task = v2p_manager roles = RoleSet { roles: {} }
10242026-03-24T18:30:00.369ZDEBGnexus (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = v2p_manager resource = Database result = Ok(())
10252026-03-24T18:30:00.390ZINFOnexus (BackgroundTasks): listed instances with terminated active migrations background_task = instance_updater count = 0 file = nexus/src/app/background/tasks/instance_updater.rs:59
10262026-03-24T18:30:00.391ZINFOnexus (BackgroundTasks): instance updater activation completed background_task = instance_updater destroyed_active_vmms = 0 failed_active_vmms = 0 file = nexus/src/app/background/tasks/instance_updater.rs:225 terminated_active_migrations = 0 update_sagas_completed = 0 update_sagas_started = 0
10272026-03-24T18:30:00.391ZDEBGnexus (BackgroundTasks): activation complete background_task = instance_updater elapsed = 673.695938ms iteration = 1 status = {"destroyed_active_vmms":0,"disabled":false,"failed_active_vmms":0,"query_errors":[],"saga_errors":[],"sagas_completed":0,"sagas_started":0,"terminated_active_migrations":0}
10282026-03-24T18:30:00.396ZDEBGnexus (BackgroundTasks): client request SledAgent = 32482131-2003-4c82-8bdf-7b718f891115 background_task = probe_distributor body = Some(Body) method = PUT uri = http://[fd00:1122:3344:101::1]:12345/probes
10292026-03-24T18:30:00.397ZDEBGnexus (BackgroundTasks): client response SledAgent = 32482131-2003-4c82-8bdf-7b718f891115 background_task = probe_distributor result = Ok(Response { url: "http://[fd00:1122:3344:101::1]:12345/probes", status: 204, headers: {"x-request-id": "dd61e509-5a8b-4c80-b56f-21b5d85053b2", "date": "Tue, 24 Mar 2026 18:30:00 GMT"} })
10302026-03-24T18:30:00.397ZDEBGnexus (BackgroundTasks): Update set of probes on sled background_task = probe_distributor n_probes = 0 sled_id = 32482131-2003-4c82-8bdf-7b718f891115
10312026-03-24T18:30:00.397ZINFOnexus (BackgroundTasks): finished distributing probes to sleds background_task = probe_distributor file = nexus/src/app/background/tasks/probe_distributor.rs:133 n_pushed_probes = 0
10322026-03-24T18:30:00.397ZDEBGnexus (BackgroundTasks): activation complete background_task = probe_distributor elapsed = 669.482514ms iteration = 1 status = {"errors":[],"probes_by_sled":{"32482131-2003-4c82-8bdf-7b718f891115":0}}
10332026-03-24T18:30:00.404ZDEBGnexus (BackgroundTasks): roles background_task = v2p_manager roles = RoleSet { roles: {} }
10342026-03-24T18:30:00.404ZDEBGnexus (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = v2p_manager resource = Database result = Ok(())
10352026-03-24T18:30:00.408ZDEBGnexus (BackgroundTasks): roles background_task = v2p_manager roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
10362026-03-24T18:30:00.412ZDEBGnexus (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = v2p_manager resource = Fleet result = Ok(())
10372026-03-24T18:30:00.412ZDEBGnexus (BackgroundTasks): roles background_task = v2p_manager roles = RoleSet { roles: {} }
10382026-03-24T18:30:00.412ZDEBGnexus (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = v2p_manager resource = Database result = Ok(())
10392026-03-24T18:30:00.415ZDEBGnexus (BackgroundTasks): roles background_task = v2p_manager roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
10402026-03-24T18:30:00.417ZDEBGnexus (BackgroundTasks): begin collection from Sled Agent background_task = inventory_collection sled_agent_url = http://[fd00:1122:3344:101::1]:12345
10412026-03-24T18:30:00.418ZDEBGnexus (BackgroundTasks): client request SledAgent = http://[fd00:1122:3344:101::1]:12345 background_task = inventory_collection body = None method = GET uri = http://[fd00:1122:3344:101::1]:12345/inventory
10422026-03-24T18:30:00.421ZDEBGnexus (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = v2p_manager resource = Fleet result = Ok(())
10432026-03-24T18:30:00.421ZDEBGnexus (BackgroundTasks): roles background_task = v2p_manager roles = RoleSet { roles: {} }
10442026-03-24T18:30:00.421ZDEBGnexus (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = v2p_manager resource = Database result = Ok(())
10452026-03-24T18:30:00.429ZDEBGnexus (BackgroundTasks): roles background_task = tuf_artifact_replication roles = RoleSet { roles: {} }
10462026-03-24T18:30:00.430ZDEBGnexus (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = tuf_artifact_replication resource = Database result = Ok(())
10472026-03-24T18:30:00.434ZDEBGnexus (BackgroundTasks): roles background_task = tuf_artifact_replication roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
10482026-03-24T18:30:00.439ZDEBGnexus (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = tuf_artifact_replication resource = Fleet result = Ok(())
10492026-03-24T18:30:00.439ZDEBGnexus (BackgroundTasks): roles background_task = tuf_artifact_replication roles = RoleSet { roles: {} }
10502026-03-24T18:30:00.439ZDEBGnexus (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = tuf_artifact_replication resource = Database result = Ok(())
10512026-03-24T18:30:00.447ZDEBGnexus (BackgroundTasks): roles background_task = tuf_artifact_replication roles = RoleSet { roles: {} }
10522026-03-24T18:30:00.448ZDEBGnexus (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = tuf_artifact_replication resource = Database result = Ok(())
10532026-03-24T18:30:00.448ZDEBGnexus (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
10542026-03-24T18:30:00.449ZDEBGnexus (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
10552026-03-24T18:30:00.453ZDEBGnexus (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
10562026-03-24T18:30:00.454ZDEBGnexus (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
10572026-03-24T18:30:00.455ZDEBGnexus (BackgroundTasks): roles background_task = tuf_artifact_replication roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
10582026-03-24T18:30:00.457ZDEBGnexus (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
10592026-03-24T18:30:00.460ZDEBGnexus (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = tuf_artifact_replication resource = Fleet result = Ok(())
10602026-03-24T18:30:00.460ZDEBGnexus (BackgroundTasks): roles background_task = tuf_artifact_replication roles = RoleSet { roles: {} }
10612026-03-24T18:30:00.461ZDEBGnexus (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = tuf_artifact_replication resource = Database result = Ok(())
10622026-03-24T18:30:00.464ZDEBGnexus (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000002, lookup_type: ByName("nexus") } result = Ok(())
10632026-03-24T18:30:00.464ZDEBGnexus (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
10642026-03-24T18:30:00.465ZDEBGnexus (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
10652026-03-24T18:30:00.466ZDEBGnexus (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
10662026-03-24T18:30:00.467ZDEBGnexus (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
10672026-03-24T18:30:00.469ZDEBGnexus (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
10682026-03-24T18:30:00.469ZDEBGnexus (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
10692026-03-24T18:30:00.471ZDEBGnexus (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
10702026-03-24T18:30:00.478ZDEBGnexus (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000002, lookup_type: ByName("nexus") } result = Ok(())
10712026-03-24T18:30:00.478ZDEBGnexus (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
10722026-03-24T18:30:00.478ZDEBGnexus (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
10732026-03-24T18:30:00.486ZDEBGnexus (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
10742026-03-24T18:30:00.486ZDEBGnexus (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
10752026-03-24T18:30:00.489ZDEBGnexus (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
10762026-03-24T18:30:00.490ZDEBGnexus (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
10772026-03-24T18:30:00.494ZDEBGnexus (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
10782026-03-24T18:30:00.495ZDEBGnexus (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
10792026-03-24T18:30:00.498ZDEBGnexus (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
10802026-03-24T18:30:00.498ZDEBGnexus (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
10812026-03-24T18:30:00.502ZDEBGnexus (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
10822026-03-24T18:30:00.502ZDEBGnexus (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
10832026-03-24T18:30:00.505ZDEBGnexus (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
10842026-03-24T18:30:00.505ZDEBGnexus (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
10852026-03-24T18:30:00.507ZDEBGnexus (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
10862026-03-24T18:30:00.508ZDEBGnexus (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
10872026-03-24T18:30:00.510ZDEBGnexus (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
10882026-03-24T18:30:00.518ZDEBGnexus (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000001, lookup_type: ByName("external-dns") } result = Ok(())
10892026-03-24T18:30:00.518ZDEBGnexus (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
10902026-03-24T18:30:00.518ZDEBGnexus (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())